AML Transaction Monitoring:

A business will establish AML transaction monitoring rules based on the nature, size and complexity of its business operations.

AML Transaction Monitoring

AML Transaction Monitoring: Development and Implementation

The following factors are commonly cited as being important to a successful AML Transaction Monitoring (TM) system development and implementation:

  • A clear understanding of what the system will deliver and what constraints will be imposed by the limitations of the available data (including any issues arising from data cleanliness or legacy systems).

  • Consideration of whether the vendor has the skills, resources and ability to deliver the promised service and provide adequate ongoing support.

  • Maintenance of good working relations with the vendor, e.g. when collaborating to agree detailed system configuration.

  • Use of recommended hardware, not necessarily a firm’s own standard, to reduce processing problems, or otherwise finding a solution that is a good fit with a firm’s existing infrastructure.

  • A full understanding of the data being entered into the system and of the business’s requirements.

  • Regular housekeeping and database maintenance (operational resilience is vital to ensure that queries do not bank up).

  • Careful consideration of the risks of commissioning a bespoke vendor system, which may be incompatible with future standard product upgrades.

  • Continued allocation of sufficient resources to ensuring manual internal suspicion reporting is effective, as TM can supplement, but not replace, human awareness in day-to-day business.


To have an effective AML transaction monitoring system, firms should:

  • Analyse system performance at a sufficiently detailed level, for example on a rule-by-rule basis, to understand the real underlying drivers of the performance results.

  • Set systems so they do not generate fewer alerts simply to improve performance statistics. There is a risk of ‘artificially’ increasing the proportion of alerts that are ultimately reported as suspicious activity reports without generating an improvement in the quality and quantity of the alerts being generated.

  • Deploy analytical tools to identify suspicious activity that is currently not being flagged by existing rules or profile-based monitoring.

  • Allocate adequate resources to analysing and assessing system performance, in particular to define how success is measured and produce robust objective data to analyse performance against these measures.

  • Consistently monitor from one period to another, rather than on an intermittent basis, to ensure that performance data is not distorted by, for example, ad hoc decisions to run particular rules at different times.

  • Measure performance as far as possible against like-for-like comparators, e.g. peers operating in similar markets and using similar profiling and rules.


Senior management should be in a position to monitor the performance of AML transaction monitoring systems, particularly at firms that are experiencing operational or performance issues with their systems, so that issues are resolved in a timely fashion.


Close involvement of the project management process by major business unit stakeholders and IT departments is an important component of successful system implementation.


Reporting and Review

There should be a clear allocation of responsibilities for reviewing, investigating and reporting details of alerts generated by TM systems. Those responsible for this work should have appropriate levels of skill and be subject to effective operational control and quality assurance processes.


Click here for AML360’s transaction monitoring information.