Your Payments System Is Now a RegTech System (Whether You Like It or Not)

Why this matters this week
Fintech infrastructure used to be “do payments first, bolt on compliance later.” That’s now a reliable way to lose bank partners, get de-risked by processors, or eat a multi-million-dollar remediation project.
Three converging pressures are turning every payments stack into a de facto regtech product:
- Real-time or near real-time payments (RTP, FedNow, instant SEPA): fraud and AML/KYC controls have to operate closer to transaction time. Batch jobs and next-day reviews are no longer enough.
- Tightening expectations from banks and regulators: partner banks are pushing fintechs to demonstrate control effectiveness, not just policy existence. That translates into concrete questions about your logs, rule changes, model governance, and kill switches.
- Open banking + API-first everything: More integrations mean more surface area for fraud, mule accounts, and compliance failures. The infrastructure itself is part of your risk profile.
If you own or influence payments, fraud, AML/KYC, or risk systems, your architecture either:
- Makes it easy to prove you’re in control, or
- Becomes the bottleneck that legal, compliance, and partners start designing around.
This post assumes you care about:
- Time to market vs time to approval by your bank/compliance.
- Authorization rate vs fraud and chargeback losses.
- Unit economics (cost per transaction, cost per review).
- Auditability under pressure.
What’s actually changed (not the press release)
Ignoring the marketing around “regtech” and “AI for compliance,” the real changes on the ground:
-
Latency expectations for risk decisions tightened
- Real-time rails (RTP, FedNow, UPI, PIX) and aggressive payout products (instant wage access, same-day settlements) move risk decisions in-band with the payment.
- Your fraud/AML checks can’t be a separate overnight batch; they have to be:
- Pre-transaction (screening)
- In-transaction (rule/model decision)
- Immediately post-transaction (fast secondary checks / holds)
-
Bank partners now ask for technical evidence, not just policy docs
- “Show me your KYC process” has shifted to:
- “Show me your onboarding decision fields, retention, and audit trail.”
- “Show me how you prevent silent rule changes.”
- “Show me how you roll back a bad fraud rule.”
- Expect questionnaires that drill into:
- Data lineage (where did this risk feature come from?)
- Model versioning and rollback
- Alert handling SLAs
- “Show me your KYC process” has shifted to:
-
Regulators expect explainability and replayability
- You don’t need fancy ML interpretability in most regimes; you do need:
- Deterministic decision logs (inputs → rules/models → output).
- Ability to replay the same event through today’s logic vs historical logic.
- Human-readable rationales: “Blocked due to prior card testing behavior” beats “Score = 0.12.”
- You don’t need fancy ML interpretability in most regimes; you do need:
-
Fraud patterns are evolving faster than your quarterly releases
- Card testing, synthetic identities, account takeover, and money mule networks update weekly.
- If risk logic changes require:
- Full app redeploy, or
- Core DB migration
…you’re functionally always behind.
-
Infrastructure and compliance are blending
- Many orgs now have:
- “Risk as a service” internal platforms: event bus, rules engine, model scoring, and case management as shared infra.
- DevOps teams owning alerting and SLAs for fraud/AML pipelines.
- Whether you call it regtech or just “our risk stack,” you’re building compliance-critical infrastructure.
- Many orgs now have:
How it works (simple mental model)
A workable mental model for modern fintech infrastructure: “risk envelope around money movement.”
Every money-movement action passes through the same conceptual layers:
-
Identity & Intent Layer (KYC / KYB / Authentication)
- Who is this entity? (person, business, platform)
- How do we know it’s the same entity as last time?
- What are they trying to do (pay, cash out, onboard sub-merchant)?
Mechanisms:
- KYC/KYB vendors, document verification, sanctions/PEP screening.
- Device fingerprinting, 2FA, behavioral signals.
-
Contextual Risk Layer (Fraud, Credit, Behavioral)
- Given who/what they are:
- Does this action look normal for them?
- Does it look normal for the population?
- Outputs:
- Risk score, suggested action (approve, step-up, block, hold).
Mechanisms:
- Rules engine (velocity checks, country limits, device reuse).
- ML models (supervised fraud detection, anomaly detection).
- Graph/relationship analysis for mule/ring detection.
- Given who/what they are:
-
Policy & Obligation Layer (AML, sanctions, regulatory)
- Independent of business desire to approve:
- Are we allowed to do this?
- Do we need to generate any regulatory artifacts?
- Outputs:
- SAR/STR flags.
- Monitoring queues and escalations.
Mechanisms:
- List screening (sanctions, PEP, adverse media).
- AML scenarios (structuring, smurfing, high-risk geographies).
- Post-event transaction monitoring with human review.
- Independent of business desire to approve:
-
Execution Layer (Core Payments & Ledger)
- Once above layers say “go”:
- Route payment (card network, ACH, RTP, SEPA, local rails).
- Update internal ledger and/or wallets.
- Feedback to risk stack:
- Authorizations, declines, chargebacks, reversals, disputes.
Mechanisms:
- Payment processors, issuer/acquirer APIs.
- Internal ledger, reconciliation pipelines.
- Once above layers say “go”:
A sane architecture wires this so that:
- All 4 layers see a consistent event model (e.g., “PaymentAttemptCreated”).
- Decisions are computed at the edge of the envelope:
- As close as reasonable to where money actually moves.
- You can:
- Add/change rules without changing core payment code.
- Add a new sanctions vendor without rewiring everything.
- Prove, after the fact, why a given transaction was or wasn’t allowed.
Where teams get burned (failure modes + anti-patterns)
Patterns seen repeatedly across fintech and payment platforms:
-
Risk and AML bolted directly into product microservices
- Symptom:
- Every service calls third-party KYC, fraud, sanctions checks directly.
- Problems:
- Vendor lock-in at the code level.
- Inconsistent logic (different services implement slightly different checks).
- Hard to prove to auditors what the actual process is.
- Symptom:
-
No separation of “configuration” from “deployment” for rules
- Symptom:
- Fraud/AML rules live in code. Changing threshold from 3 → 2 requires a release.
- Problems:
- Response time to new fraud patterns measured in weeks.
- Weekend “emergency hotfix” releases to adjust limits.
- No clear audit log of who changed which rule when.
- Symptom:
-
Metrics stop at “fraud loss” vs “system performance”
- Symptom:
- Risk dashboards show total fraud loss, chargeback rate, and dispute win rate, but:
- No p95/p99 latency for risk decisions.
- No metrics on rule hit rate, false positives, or review queue backlog.
- Risk dashboards show total fraud loss, chargeback rate, and dispute win rate, but:
- Problems:
- Trade-offs are made blind; “just tighten rules” kills conversion silently.
- Incidents misdiagnosed (e.g., risk service latency causing user drop-off).
- Symptom:
-
Over-reliance on a single regtech vendor
- Symptom:
- One platform does KYC, KYB, watchlist, fraud scoring, and case management.
- Problems:
- Outage = full KYC/AML blackout.
- Hard to negotiate or migrate; switching cost is massive.
- You inherit vendor’s limitations on data access and feature engineering.
- Symptom:
-
No replay/compliance sandbox
- Symptom:
- Can’t safely test new rules or AML scenarios on historical data.
- Problems:
- Either changes are too conservative (“don’t touch it”) or reckless (“push and pray”).
- Root-cause analyses take days because you can’t reproduce behavior bound to historical logic.
- Symptom:
-
AML and fraud built as competing stacks
- Symptom:
- Separate pipelines, separate customer profiles, separate IDs.
- Problems:
- Duplicate cost and engineering effort.
- Gaps where one system flags but the other never sees it.
- Confusing evidence trail for regulators and bank partners.
- Symptom:
Practical playbook (what to do in the next 7 days)
You can’t rebuild your fintech infrastructure in a week, but you can establish a clear path and reduce immediate risk.
1. Map your “risk envelope” in concrete terms
Produce a 1–2 page internal doc:
- For each money-movement path (card payment, ACH pull, RTP payout, wallet transfer):
- Where is identity established? (Which vendors, which data fields?)
- Where are fraud checks done? (Pre-auth, post-auth, post-settlement?)
- Where are AML/sanctions checks done? (Onboarding only? Recurring?)
- What happens on:
- Vendor timeout?
- Risk service timeout?
- Rule engine failure?
This isn’t architecture astronauting; it’s your current reality. Expect to find gaps.
2. Quantify your control health with 6 metrics
Implement or gather:
- p95/p99 latency for risk decisioning per path.
- Percentage of transactions hitting any manual review queue.
- Average age of items in review queues.
- Change frequency of rules/config (per week/month).
- Percentage of traffic covered by your “standard” risk stack vs bypass paths.
- Count of critical dependencies without circuit breakers or fallbacks.
Use this as your baseline; your CTO or risk lead will care more about these than another fraud-loss graph.
3. Decouple rules/config from deployments (first step only)
You don’t need a full rules engine overhaul to start:
- Identify 3–5 high-impact thresholds that currently require code changes (e.g., max daily payout, KYC risk score cutoff).
- Move them to:
- A database table with:
- version
- createdby
- createdat
- A minimal UI or even an admin-only API, guarded by:
- Authz
- Audit logging
- A database table with:
- Add a simple “dry run” mode for new configs against a sample of historical events.
This gives compliance/risk teams a safer way to adapt quickly without dragging eng into every tweak.
