Compliance reference · AUSTRAC AML/CTF

AML/CTF programs that survive a real review.

AUSTRAC expects an AML/CTF program that runs as advertised — a written Part A and Part B, customer due diligence kept current, monitoring tuned to actual risk, and reports filed inside the window. This page is the plain-English version.

Regulator
AUSTRAC
Authority
AML/CTF Act 2006
Applies to
Reporting entities
Program
Part A + Part B

What it actually requires

Four obligations. One operational rhythm.

AUSTRAC compliance is not a one-time program design. It is an operational rhythm that runs every day across customer records, transactions, and reports. The four obligations below are the floor.

AML/CTF program

A documented program with two parts. Part A covers enterprise-wide risk assessment and the general program. Part B covers customer due diligence procedures. The program must be approved by the governing body, kept current, and tested in practice — not filed and forgotten.

Customer due diligence

Identify and verify customers at onboarding, understand the nature and purpose of the relationship, and apply enhanced procedures for higher-risk customers. Ongoing customer due diligence keeps the picture current as risk profiles shift.

Transaction monitoring

Monitor transactions for unusual patterns relative to the customer profile and the entity-wide risk assessment. Monitoring rules must be calibrated, documented, and regularly tested — and the alerts they generate need timely human review.

Reporting to AUSTRAC

Threshold transaction reports for cash transactions of A$10,000 or more. International funds transfer instruction reports. Suspicious matter reports within the prescribed window. An annual compliance report. Each has its own format and timing — the reporting cadence is part of the program design.

Where AML programs fail in review

Four failure modes that recur across AUSTRAC enforcement outcomes.

False positives drown the team

Transaction monitoring rules generate hundreds of alerts per week. Most are false positives. The analyst team disposes of them at speed and the genuine signal hides among the noise. SMR-worthy patterns get cleared in eight seconds.

Your monitoring runs, your detection does not.

CDD evidence ages without you noticing

Customer profiles were verified at onboarding. Two years on, the customer has changed profession, citizenship, or beneficial ownership and the file does not reflect it. Ongoing CDD is documented as a policy but not in the records.

Your file says one customer; reality says another.

Reporting templates drift

TTRs, IFTIs, and SMRs go out of formats that worked last year. AUSTRAC submission errors compound. Each rejected report is a small fire that burns operations time you could have spent on the actual risk work.

Compliance becomes a submission-fixing function.

Independent review surprises everyone

Independent review of the AML/CTF program is required at appropriate intervals. The reviewer arrives expecting evidence of how the program operates day-to-day, not just the policy that says it should. Programs that were paper-only get exposed.

Your policy lives in Word; your program lives elsewhere.

How BackPro maps to AML/CTF

Evidence as a side effect.

The aim is not to replace your TM platform — it is to make the AML program produce its own evidence. Each row maps an AUSTRAC obligation to the part of BackPro that does the work.

AML/CTF obligation

AML/CTF program governance

Program documents — Part A and Part B — live in the platform with version history, approval signatures, and review cadence. Each material change is signed in the audit chain. The Control Monitor agent flags overdue reviews before the program drifts out of date.

AML/CTF obligation

Customer due diligence

CDD records carry the verification evidence, the rationale for risk rating, and the trail of revisions. Ongoing CDD triggers — adverse media, beneficial ownership change, sanctions list updates — generate findings on the customer record so the team acts before the file ages.

AML/CTF obligation

Transaction monitoring tuning

Monitoring rule logic, calibration tests, and alert dispositions are traceable end-to-end. Tuning decisions tie to test outputs, not analyst memory. The Risk Correlator agent surfaces patterns across customer files, sanctions hits, and transaction alerts that no single rule would catch.

AML/CTF obligation

Threshold and suspicious matter reporting

TTRs, IFTIs, and SMRs are generated from the source of record with the formats AUSTRAC expects. Submission status, rejections, and resubmissions are tracked in the same chain. The reporting cadence becomes a deterministic process rather than a quarterly fire drill.

AML/CTF obligation

Independent review evidence

Programs that run on BackPro produce evidence as a side effect. The independent reviewer asks how the program operates; the platform answers with the audit chain — every CDD, every alert disposition, every report, every approval signed and chained. No retrospective evidence reconstruction.

Frequently asked questions

What reporting entities ask before bringing AI inside the AML/CTF perimeter.

Who does the AML/CTF Act apply to?
The AML/CTF Act 2006 applies to "reporting entities" — businesses that provide designated services. The list includes banks and other deposit-taking institutions, financial planners, fund managers, payment service providers, gambling operators, bullion dealers, and digital currency exchange providers. Reforms passed in 2024 extend the regime to additional sectors (often called Tranche 2 entities); commencement is staged. Check the AUSTRAC website for the current list and your obligations.
What does AUSTRAC expect on transaction monitoring?
AUSTRAC expects monitoring to be risk-based and tuned to the entity's actual exposure. That means rules calibrated against historical data, regular testing of those rules, prompt human review of alerts, and clear documentation of why each alert was cleared or escalated. Monitoring that exists on paper but cannot demonstrate disposition rationale at scale is a recurring AUSTRAC finding.
How quickly do suspicious matter reports need to be filed?
Suspicious matter reports must be filed within the timeframe set by the AML/CTF Act and Rules. The window is short for matters connected to terrorism financing and longer for other suspicious matters. The clock starts when the suspicion forms — not when the analyst finishes the investigation. Programs need detection-to-decision processes that get the SMR filed inside the window without sacrificing the quality of the report.
How does BackPro support AML/CTF compliance?
BackPro provides the source of record for the program — Part A and Part B documentation, CDD records, transaction monitoring rule libraries, alert dispositions, and AUSTRAC reports. The audit log signs every action with HMAC-SHA256 and chains it to the previous entry, so the chain of custody an independent reviewer expects is produced as a side effect of running the program. The Risk Correlator agent surfaces cross-domain patterns that single rules miss.
Does BackPro replace our transaction monitoring system?
No. BackPro complements transaction monitoring systems (Actimize, Quantexa, SAS, Mantas, custom platforms). Your TM system remains the rule engine and the alert generator. BackPro automates the documentation, the disposition trail, the program governance, and the reporting workflows around it — and surfaces the cross-domain risk patterns that span CDD, sanctions, and transactions.
How does BackPro itself meet our security review for an AML/CTF program?
BackPro deploys entirely inside your Azure, AWS, or GCP tenant. Customer PII and transaction data never leave your perimeter. The platform aligns with APRA CPS 234 (Information Security) — encryption at rest and in transit, role-based access control, audit logging on by default, tenant isolation, and a tamper-evident HMAC-chained audit log. SOC 2 Type II and ISO/IEC 27001 readiness programs are underway.

Ready to make your AML program produce its own evidence?

One walkthrough covers architecture, audit chain, deployment model, and how the platform maps to each AML/CTF obligation.