Single Blog

  • Home
  • KYC periodic reviews that stand up to scrutiny
KYC periodic reviews that stand up to scrutiny

KYC periodic reviews that stand up to scrutiny

February 23, 2026

A periodic review is where good onboarding decisions either stay good or quietly become liabilities.

Most audit findings we see are not because a firm failed to collect an ID document in year one. They happen because the client changed, the risk changed, or the firm could not evidence that anyone noticed. A defensible KYC periodic review cycle is less about re-running onboarding and more about proving you actively managed the relationship across time – with risk-based frequency, clear triggers, and a clean evidence trail.

What a KYC periodic review cycle actually is

A periodic review cycle is the structured process for reassessing an existing customer relationship at defined intervals and when certain events occur. It sits alongside ongoing monitoring and transaction monitoring, and it should be anchored to your risk assessment framework (customer risk rating, product/service risk, geography, delivery channel, and any sector-specific exposures).

Done properly, periodic reviews do three things. They confirm the customer is still who you think they are, they test whether your original risk rating still makes sense, and they update the due diligence file so decisions remain defensible to internal audit, external audit, and the regulator.

It also has a practical operational purpose: it is your cadence for keeping data accurate. Bad data undermines screening, monitoring, reporting lines, and ultimately your ability to make consistent go/no-go decisions.

How to perform KYC periodic review cycle: start with your risk cadence

If you try to review everyone annually, you will either fail the SLA or reduce the review to a checkbox. A risk-based cadence is what makes the cycle sustainable.

Set review frequency by risk tier, and ensure the tiering itself is documented and consistently applied. The exact timeframes will depend on your regulatory obligations and your risk appetite, but the principle is consistent: higher-risk customers get more frequent, deeper reviews; lower-risk customers get lighter-touch reviews with longer intervals.

Where teams get caught out is treating “standard” and “low” as the same. A genuinely low-risk profile can justify an extended cycle – but only if you can evidence why it is low, and only if you have triggers that pull the customer forward when risk changes.

Build in event-driven reviews, not just calendar reviews

Calendar-driven reviews alone create blind spots. You need event-driven triggers that force a review when something material changes, even if the next periodic review is months away.

Triggers should be practical enough to be used by first-line teams, not just written into a policy. Think in terms of what you can realistically detect through onboarding systems, screening outputs, transaction monitoring, relationship manager contact, and back-office operations. If the trigger cannot be captured, routed, and evidenced, it will not protect you.

Define review scope by customer type and risk

The review scope should be modular. A high-risk corporate customer review should not look like a low-risk individual review. The core components remain consistent, but the depth changes.

At minimum, structure the periodic review around identity and ownership, purpose and nature of the relationship, risk factors, and ongoing monitoring outputs. For corporates, ownership and control is often the failure point – especially where structures evolve, shareholders change, or there is a complex group.

A practical way to keep this controlled is to define “baseline”, “enhanced”, and “targeted” review packs. Baseline covers the essentials for lower-risk customers. Enhanced includes deeper source of funds/wealth analysis, more intensive adverse media review, and stronger rationale narratives. Targeted is used where the trigger relates to a specific risk – for example, an unexpected geographic exposure or a new UBO.

Run the review like a governed process, not a task

A periodic review should move through clear stages with ownership and escalation rules. Treat it like a mini-case lifecycle.

Stage 1: Triage and file health check

Start with a file health check: what evidence is missing, expired, inconsistent, or never collected. This is where you reconcile what your systems say with what the file actually contains.

This stage is also where you decide whether the review is straightforward or needs escalation. A clean low-risk file might be resolved quickly. A file with missing ownership evidence, outdated screening, or unclear purpose and nature should not be allowed to drift.

Stage 2: Refresh data and re-perform screening

Refresh identification and key attributes based on what is reasonable and proportionate. Then re-run screening against sanctions, PEPs, and adverse media, ensuring you can evidence the search logic, the date, and the outcome.

Do not underestimate the evidencing requirement. “No hits” is not a conclusion without a record of what was searched, when, and under what matching rules. If you rely on a vendor tool, your procedure should still explain the controls around configuration, alert handling, and quality checks.

Stage 3: Reassess risk rating with rationale

Recalculate the risk rating using your current methodology. This sounds simple, but it is often where inconsistency enters.

A defensible reassessment does not just output a score – it includes a short narrative explaining what changed (or why nothing changed) and why the result is reasonable. Regulators and auditors look for evidence of judgement, not just tooling.

Where the risk rating increases, your process must automatically drive additional actions: enhanced due diligence, higher monitoring intensity, senior approval, or even exit consideration. Where the risk rating decreases, be cautious. De-risking is permitted, but it needs evidence. If your firm has previously applied EDD measures, you should be able to justify why they are no longer needed.

Stage 4: Decide, document, and implement outcomes

Each periodic review should end in a decision. Continue, continue with conditions, restrict certain services, or exit. Indecision is a control failure.

Implementation matters as much as the decision. If you decide on conditions – for example, obtaining missing ownership evidence within a set period – log the action, set a deadline, and define what happens if it is missed. If you exit, record the rationale and ensure the offboarding process does not create additional risks (for example, tipping off or mishandling suspicious activity concerns).

Quality assurance: the control that proves the process works

Periodic reviews fail quietly when the second line does not test them.

Build a QA programme that samples completed reviews across risk tiers and customer types. The objective is not to punish reviewers, but to validate consistency, adequacy of evidence, and quality of rationale. QA should also test timeliness, because overdue high-risk reviews are a clear governance weakness.

A useful discipline is to separate “technical completeness” from “risk judgement quality”. A file can be complete and still miss the story – for example, the economic rationale for activity does not align with the customer’s profile.

Managing the backlog without creating new risk

Backlogs happen. The mistake is pretending they are only an operational problem.

Treat backlog as a risk issue with a documented remediation plan. Prioritise high-risk and triggered reviews first, then standard, then low. If resourcing is constrained, adjust the cycle temporarily but document the rationale, the compensating controls (for example, increased monitoring), and board or senior management oversight.

If you are in a regulated environment, be careful about setting unrealistic remediation dates. Regulators tend to respond better to a realistic plan with clear milestones than to an aspirational one that slips repeatedly.

Governance and audit defensibility: what regulators expect to see

When a regulator or auditor asks about periodic reviews, they are testing whether you can evidence control design and operating effectiveness.

You should be able to show who owns the cycle, how customers are assigned to review populations, how overdue items are escalated, and how exceptions are approved. Minutes, MI, and escalation logs often matter as much as the individual files.

MI should be decision-useful. Track completion rates by risk tier, overdue counts, trigger volumes, outcome types (continue, EDD applied, exit), and recurring root causes (for example, missing beneficial ownership evidence). If MI does not lead to actions, it is just reporting.

For firms operating in Malta or servicing Maltese clients, align your cycle with the expectations of the FIAU and the broader EU risk-based approach. The principle remains the same globally: you must show that periodic reviews are proportionate, consistent, and actually performed.

When to bring in independent support

There is a trade-off between speed and certainty. Internal teams know your customers and systems, but independence can help when you need to evidence objectivity, clear remediation, or readiness for an inspection.

A partner such as Complipal can help you design or recalibrate the review methodology, clear a backlog with controlled QA, and translate regulatory change into procedures that work in the real operating model – without turning the cycle into a paperwork exercise.

Closing thought

The strongest periodic review cycles do not feel like a recurring fire drill. They feel like a managed rhythm: risk tells you who to look at, triggers tell you when to look sooner, and governance proves you did it properly. If you can achieve that rhythm, the next audit is no longer something to survive – it becomes an opportunity to demonstrate control.