# What institutions require

Source: https://docs.settlemint.com/docs/executive-overview/market-challenges
Institutional digital asset programs require more than issuance. This page explains the operating capabilities needed after launch: embedded compliance, approval governance, custody-policy controls, settlement handling, servicing, exception management, observability, and audit evidence.



## Key terms [#key-terms]

* **Integration point**: Connection between separate systems requiring custom
  development and ongoing maintenance
* **Ex-ante control**: Compliance checks that happen before a transaction
  executes, preventing violations
* **Ex-post control**: Compliance checks that happen after execution, requiring
  reversal if violations are found

See the [Glossary](/docs/executive-overview/glossary) for complete definitions.

![Operational visibility starts with a unified dashboard across tokenized asset activity.](/docs/screenshots/dashboard/dashboard-1.webp)

## Unified infrastructure across the lifecycle [#unified-infrastructure-across-the-lifecycle]

Institutional digital asset programs require more than token creation. Once an
asset is live, operations teams need to control investor onboarding, compliance,
custody-policy boundaries, approvals, transfers, settlement handling, servicing,
reporting, and audit evidence. A viable platform consolidates these functions
into one system with a single source of truth.

<Mermaid
  chart="`
flowchart TB
  ORG(Your Organization)

  FLOW1(Token Creation)
  FLOW2(KYC/Onboarding)
  FLOW3(Custody Wallets)
  FLOW4(Trading/Marketplace)
  FLOW5(Settlement & Banking)
  FLOW6(Reporting & Compliance)

  OUTCOMES1(Single Source<br/>of Truth)
  OUTCOMES2(Atomic<br/>Operations)
  OUTCOMES3(Unified<br/>Control)

  ORG --> FLOW1
  ORG --> FLOW2
  ORG --> FLOW3
  ORG --> FLOW4
  ORG --> FLOW5
  ORG --> FLOW6

  FLOW1 --> OUTCOMES1
  FLOW3 --> OUTCOMES2
  FLOW5 --> OUTCOMES3

  style ORG fill:#8571d9,stroke:#654bad,stroke-width:2px,color:#fff
  style FLOW1 fill:#5fc9bf,stroke:#3a9d96,stroke-width:2px,color:#fff
  style FLOW2 fill:#5fc9bf,stroke:#3a9d96,stroke-width:2px,color:#fff
  style FLOW3 fill:#5fc9bf,stroke:#3a9d96,stroke-width:2px,color:#fff
  style FLOW4 fill:#5fc9bf,stroke:#3a9d96,stroke-width:2px,color:#fff
  style FLOW5 fill:#5fc9bf,stroke:#3a9d96,stroke-width:2px,color:#fff
  style FLOW6 fill:#5fc9bf,stroke:#3a9d96,stroke-width:2px,color:#fff
  style OUTCOMES1 fill:#6ba4d4,stroke:#4a7ba8,stroke-width:3px,color:#fff
  style OUTCOMES2 fill:#6ba4d4,stroke:#4a7ba8,stroke-width:3px,color:#fff
  style OUTCOMES3 fill:#6ba4d4,stroke:#4a7ba8,stroke-width:3px,color:#fff

`"
/>

### One platform, one source of truth [#one-platform-one-source-of-truth]

When all six functions operate on a shared registry, there is no nightly batch
reconciliation, no data drift between systems, and no ambiguity about who owns
what. Auditors see one definitive record. Compliance officers query one system.
Operations teams monitor one dashboard.

### Fewer contracts, faster procurement [#fewer-contracts-faster-procurement]

One vendor relationship means one security review, one legal contract, one SLA
negotiation. Procurement cycles shrink from months to weeks. When something
breaks at 2 a.m., there is one support line to call — not five vendors pointing
at each other.

### Development velocity [#development-velocity]

New asset classes, compliance rule changes, and feature additions happen inside
one codebase. There are no cross-vendor API coordination delays, no waiting for
third-party release cycles, no multi-system regression testing.

## Embedded compliance enforced before execution [#embedded-compliance-enforced-before-execution]

![Compliance visibility across identities, trusted issuers, and active verifications.](/docs/screenshots/dashboard/dashboard-3.webp)

## Off-chain compliance creates legal risk [#off-chain-compliance-creates-legal-risk]

Compliance checks must happen in the token's transfer path — before any state
change occurs — not in off-chain middleware that runs after the fact.

A typical off-chain compliance setup works like this: an investor buys tokens,
the transfer executes on-chain instantly, and then — sometime later — a
compliance officer checks whether that investor should have been eligible. If
they weren't, unwinding a settled transaction creates evidence of
non-compliance on an immutable ledger.

### Ex-ante controls prevent violations structurally [#ex-ante-controls-prevent-violations-structurally]

With compliance embedded in the transfer path, non-compliant transactions
revert immediately. The blockchain state never changes. There is no "undo"
process, no cleanup operation, no regulator seeing evidence of a violation.
Every transfer that succeeds is provably compliant.

### Consistent rules across all tokens [#consistent-rules-across-all-tokens]

Different tokens may have different compliance rules — accreditation
requirements, jurisdiction restrictions, holding limits. When those rules live
in a unified policy engine rather than scattered external databases, there is
no drift between what the compliance system thinks is enforced and what the
token actually enforces.

### Real-time eligibility, not manual overrides [#real-time-eligibility-not-manual-overrides]

Legitimate investors are not blocked by stale off-chain status checks. Identity
verification happens in real time, credentials are portable across assets, and
support tickets from incorrectly blocked investors drop significantly.

## Institutional custody with multi-signature controls [#institutional-custody-with-multi-signature-controls]

Banks and asset managers require segregation of duties, dual control,
maker-checker workflows, transaction limits, and formal approval processes.
Single-key wallets do not meet these standards.

### Multi-signature governance [#multi-signature-governance]

Treasury operations require M-of-N approval — multiple independent parties
must authorize high-value actions. No single person can transfer all assets,
inflate supply, or deploy malicious contract logic. Emergency pause capabilities
protect against compromised accounts.

### Key loss recovery [#key-loss-recovery]

Institutional custody requires formal key ceremony processes, geographic
distribution of key shards, time-locked recovery mechanisms, and clear legal
accountability. When a risk committee asks "what happens if your CTO is
unavailable?" the answer must be a documented recovery procedure — not "we hope
someone finds the password."

### HSM compatibility and custodian integration [#hsm-compatibility-and-custodian-integration]

Private keys controlling substantial value belong in hardware security modules
(HSMs) — tamper-resistant devices where keys never leave the secure enclave.
Platforms should also integrate with configured custody providers, such as
Fireblocks and DFNS, so institutions can route signing through approved custody
arrangements instead of concentrating control in an application hot wallet.

## Atomic settlement with DvP guarantees [#atomic-settlement-with-dvp-guarantees]

Blockchain promises instant settlement, and the token does move instantly
on-chain. But the cash leg often settles on traditional banking rails operating
on T+1 or T+2 cycles.

### Delivery versus payment eliminates counterparty risk [#delivery-versus-payment-eliminates-counterparty-risk]

True atomic settlement — delivery versus payment (DvP) where both legs happen
simultaneously or neither happens at all — requires both assets and cash to be
on-chain. When the asset and cash legs execute together in a single transaction,
there is no window for counterparty default, no reconciliation work, and no
need for trusted intermediaries.

### On-chain cash integration [#on-chain-cash-integration]

Atomic settlement requires tokenized cash: tokenized deposits, regulated
stablecoins, or Central Bank Digital Currency when available. The platform must
provide settlement infrastructure that coordinates these atomic exchanges,
including multi-party settlement (XvP) where any number of participants exchange
tokens atomically.

### Reconciliation eliminated [#reconciliation-eliminated]

Operations teams that spend hours matching blockchain transactions against bank
statements get that time back. When both legs settle atomically, the
reconciliation problem disappears entirely. The promise of instant settlement
becomes real.

## Automated corporate actions [#automated-corporate-actions]

Quarterly coupons, dividend distributions, shareholder votes, and redemptions
should execute programmatically — not through spreadsheets, manual wire
transfers, and email chains.

### Scheduled yield management [#scheduled-yield-management]

Configure payment schedules once during issuance. The platform calculates
entitlements automatically on payment dates. Token holders claim their yields
directly through smart contracts with cryptographic proof of entitlement. No
spreadsheets, no reconciliation, no manual wire transfers to thousands of
investors.

### On-chain voting [#on-chain-voting]

Voting power derives automatically from token holdings at snapshot blocks.
Votes are tallied on-chain. There is no export-to-Excel, no manual identity
matching, no spreadsheet tallying, and no challenge to the results.

### Automated redemptions [#automated-redemptions]

An investor submits a redemption request. The platform verifies their holdings,
checks liquidity, executes the burn transaction, and processes the cash
payment — as a coordinated workflow, not a five-person relay chain.

Stock splits, dividend distributions, rights offerings, tender offers — every
corporate action that traditionally requires custom projects should be handled
by the platform. Operations teams shrink instead of growing.

## Enterprise deployment with SSO, RBAC, and audit trails [#enterprise-deployment-with-sso-rbac-and-audit-trails]

Banks and asset managers operate with strict IT controls. A tokenization
platform must integrate with these existing enterprise systems, not bypass them.

### Identity and access management [#identity-and-access-management]

The platform connects to existing identity providers via SAML or OIDC for
single sign-on (SSO). Multi-factor authentication (MFA) aligns with corporate
security policies. Role-based access control (RBAC) or attribute-based access
control (ABAC) maps to organizational hierarchies. Employee onboarding and
offboarding flows through existing IAM systems — not a shadow IT system with
separate credentials.

### Audit and compliance logging [#audit-and-compliance-logging]

Enterprise audit requirements go beyond basic transaction logs. The platform
must capture who accessed what data, who approved what transactions, who changed
what settings, with precise timestamps and immutable evidence. Security
Information and Event Management (SIEM) integration feeds all events into
centralized monitoring.

### Data residency and deployment flexibility [#data-residency-and-deployment-flexibility]

European customers need data stored in EU data centers. Asian customers need
data in their local region. Banks with specific regulatory constraints need
on-premises deployment. The platform must support on-premises, bring-your-own-cloud,
and dedicated SaaS deployment models — not force multi-tenant SaaS on a public
chain.

### Integration with existing systems [#integration-with-existing-systems]

Core banking systems, fund administration platforms, ERPs, and CRMs must
connect to the tokenization platform through well-documented APIs, SDKs, and
transaction status patterns. Integrators need to know when a call returns
immediate data and transaction hashes, and when a long-running blockchain
operation returns a transaction ID, current status, and polling URL instead of
requiring reverse-engineering.

## Multi-network deployment flexibility [#multi-network-deployment-flexibility]

Regulated securities often require permissioned networks where only authorized
participants can run validators, submit transactions, or read the ledger.

### Network choice [#network-choice]

The platform should support public chains (Ethereum, Polygon), permissioned
networks (Hyperledger Besu, Quorum), consortium deployments, and private
networks — not assume one chain fits all use cases.

### Predictable costs [#predictable-costs]

Gas fees on public networks create unpredictable operational costs. For
thousands of small distributions, gas costs become prohibitive. The platform
should support networks with predictable fee structures or batching mechanisms.

### Throughput and privacy [#throughput-and-privacy]

Ethereum processes about 15 transactions per second. Distributing tokens to
10,000 holders requires batching support. Regulated securities also often
require privacy controls — the platform should handle private or encrypted
transactions where holder identities, amounts, or trade existence cannot be
disclosed publicly.

## Evaluation criteria [#evaluation-criteria]

When evaluating digital asset operations platforms, map each capability to
specific technical implementations:

* **Unified infrastructure** — Is there a single source of truth for
  ownership? If reconciling multiple systems is required, the platform does not
  meet this criterion.
* **Embedded compliance** — Are rules enforced before or after transfers
  execute? If checks happen asynchronously after settlement, violations are
  possible.
* **Institutional custody** — Does the platform support multi-signature
  controls, HSM integration, and formal recovery procedures?
* **Atomic settlement** — Can the platform demonstrate DvP where both legs
  succeed together or revert together?
* **Automated servicing** — Are corporate actions handled programmatically or
  through manual processes?
* **Enterprise deployment** — Does the platform integrate with your IAM,
  support your deployment model, and meet your data residency requirements?

## Key takeaways [#key-takeaways]

Understanding these institutional requirements helps you:

* **Evaluate platforms concretely** — Ask vendors how they address each
  capability with specific technical implementations
* **Budget accurately** — Unified platforms reduce integration, reconciliation,
  and operational overhead costs
* **Set success criteria** — Define measurable outcomes (T+0 settlement %,
  compliance breach count, reconciliation hours saved) rather than feature
  checklists
* **Scope your evaluation** — Include realistic workflows that exercise
  compliance, custody, settlement, and servicing capabilities

## Where to next [#where-to-next]

* [DALP solution](/docs/executive-overview/dalp-solution) – How unified
  lifecycle platforms address these requirements
* [DALP overview](/docs/executive-overview/dalp-overview) – SettleMint's
  implementation in practice
* [Glossary](/docs/executive-overview/glossary) – Define technical terms
