What you’ll need
- Understanding of policies and how they work
- Users configured with appropriate permissions
- Wallets tagged for policy targeting (e.g.,
treasury,cold-storage)
Components to configure
Multi-signature approvals
Require multiple approvers for high-value transactions. Configure approval quorums (e.g., 2-of-3, 3-of-5) that trigger based on transaction amount thresholds. See how to create policies or manage via API.Spending limits
Control risk with transaction amount limits and velocity controls:- Single transaction limits - Maximum amount per transaction
- Daily/hourly caps - Total value within a time window
- Frequency limits - Maximum transactions per time period
Recipient whitelisting
Restrict outbound transfers to known addresses. Transactions to non-whitelisted recipients can require approval or be blocked entirely. See how to manage your address book and create whitelist policies.Policy evaluation
Policies evaluate transactions through layered checks:Example configurations
Conservative treasury
For organizations prioritizing security:| Policy | Configuration | Action |
|---|---|---|
| All transactions | Always trigger | 2-of-3 approval |
| Large transactions (>$100k) | Amount limit | 3-of-5 approval |
| Daily cap ($500k) | Velocity limit | Block |
Balanced operations
For organizations balancing security with efficiency:| Policy | Configuration | Action |
|---|---|---|
| Transactions >$10k | Amount limit | 1-of-2 approval |
| Transactions >$100k | Amount limit | 2-of-3 approval |
| Non-whitelisted recipients | Recipient whitelist | 2-of-3 approval |
| Daily cap ($1M) | Velocity limit | Block |
Tiered by wallet type
Apply different limits based on wallet tags:| Wallet Tag | Single Limit | Daily Cap | Approval |
|---|---|---|---|
hot-wallet | $10,000 | $100,000 | 1-of-2 |
warm-wallet | $100,000 | $1,000,000 | 2-of-3 |
treasury | $500,000 | $5,000,000 | 3-of-5 |
Foundation policies
Protect your security configuration itself:- Permission assignment protection - Require approval when granting permissions
- Permission modification protection - Require approval when changing existing roles
- Policy modification protection - Require approval when changing policies
Related solutions
Wallet management
Organize wallets with tags and permissions
Compliance
KYT integration and audit trails
Security best practices
Permissions, policies, and security controls
