Cryptographic Key and Wallet Management Under VARA
Learn

Cryptographic Key and Wallet Management Under VARA

·Alexander Sverdlov
Editorial illustration related to Cryptographic Key and Wallet Management Under VARA

If you get key management right, VARA compliance becomes dramatically easier. If you get it wrong, nothing else matters - because you won’t have a licence.

I spent a week in early 2025 helping a Dubai-based custody provider rebuild their key management documentation for their VARA application. They’d been running secure operations for two years - hardware security modules, multi-signature schemes, air-gapped key ceremonies, the works. Operationally, they were excellent.

Their documentation, however, was a disaster. Key generation procedures lived in one engineer’s head. Rotation schedules were “when we feel like it.” Backup procedures existed as a Confluence page that hadn’t been updated since 2023. There was no documented destruction process at all.

VARA returned their application with 14 findings, every single one in the key management section. Not because their security was bad - it was actually quite good - but because they couldn’t prove it. This article is about making sure you can prove it.

Why Key Management Is the Heart of VARA Compliance

Framework anchoring diagram for Cryptographic Key and Wallet Management Under VARA

Traditional financial regulation doesn’t have anything like this section. In banking, your assets are entries in a database - protected by access controls, encryption at rest, and audit trails. In crypto, your assets are cryptographic keys. Lose the keys, lose the assets. Compromise the keys, compromise everything.

VARA gets this at a fundamental level, and it’s reflected in the depth of the requirements. The key management section of the Technology and Information Rulebook (including Schedule 1) is arguably the most detailed and prescriptive section of the entire document. It covers every stage of the cryptographic key lifecycle, and it leaves very little room for interpretation.

Let me walk through each stage.

Key Generation: Where Everything Starts

Live compliance dashboard preview related to Cryptographic Key and Wallet Management Under VARA

VARA requires that cryptographic keys be generated using approved algorithms and cryptographically secure random number generators. That sounds obvious, but “approved algorithms” means specific standards - not “whatever the developer picked.”

In practice, VARA expects:

  • Industry-standard algorithms: ECDSA (secp256k1 for Bitcoin/Ethereum), EdDSA (Ed25519), RSA (2048-bit minimum for non-blockchain uses). Custom or proprietary algorithms are a red flag.
  • Hardware-based entropy: Keys should be generated inside hardware security modules (HSMs) or secure enclaves, not in software running on general-purpose servers.
  • Key ceremonies: For high-value keys (master keys, cold storage keys), VARA expects documented ceremonies with multiple witnesses, segregated roles, and tamper-evident procedures.
  • Audit trails: Every key generation event should be logged: when, where, by whom, using what hardware, with what witnesses.

Real talk: the key ceremony.

A proper key ceremony for a custodian looks like this: a secured room, no phones, at least two authorised participants plus an independent witness, a Faraday cage or air-gapped machine, tamper-evident bags for backup media, every step photographed and logged. Sound like overkill? VARA doesn’t think so. And frankly, given what these keys control, neither do I.

Key Storage: Where Most VASPs Fall Short

Key statistics infographic for Cryptographic Key and Wallet Management Under VARA

Key storage is where VARA gets very specific about the difference between acceptable and unacceptable approaches.

What VARA expects:

  • Private keys must be stored in HSMs, secure enclaves, or equivalent tamper-resistant hardware - especially for hot wallet operations
  • Cold storage keys should be in offline, physically secured environments with access controls
  • No private keys in plaintext, anywhere, ever. Not in databases, not in config files, not in environment variables
  • Encryption of key material at rest using a separate key encryption key (KEK) hierarchy
  • Physical security controls for any location housing key material

What I’ve seen go wrong:

A worrying number of crypto companies still store key material in software-based solutions without adequate protection. “We encrypt the keys in our database” is not the same as HSM-grade storage. VARA knows the difference, and so will their auditors.

Cloud-based HSM services (AWS CloudHSM, Azure Dedicated HSM, Google Cloud HSM) are generally acceptable for hot wallet operations, provided you can demonstrate that the key material never leaves the HSM boundary and that your access controls meet VARA’s requirements. For cold storage, VARA typically expects on-premises or co-located HSMs with physical access controls.

Hot/Cold Wallet Segregation

Step-by-step process flow for Cryptographic Key and Wallet Management Under VARA

VARA requires VASPs that hold client assets to maintain a clear separation between hot wallets (online, connected to the internet) and cold wallets (offline, air-gapped). This isn’t just a best practice suggestion - it’s a regulatory requirement with specific parameters.

Hot Wallets

  • Only hold the minimum balance required for operational liquidity
  • Balance thresholds must be defined and monitored
  • Automated alerts when thresholds are breached
  • Transaction velocity limits
  • Real-time monitoring of all transactions

Cold Wallets

  • Hold the majority of client assets
  • Air-gapped from all network connectivity
  • Multi-signature requirements for withdrawals
  • Physical access controls and surveillance
  • Geographically distributed for resilience

The common question is: what percentage should be in hot vs. cold storage? VARA doesn’t prescribe a specific ratio, but industry best practice - and what VARA reviewers expect - is that hot wallets hold no more than 2-5% of total client assets. Some exchanges operate with even less.

You also need documented procedures for moving assets between hot and cold storage, including who authorises transfers, what approvals are needed, and how those transactions are monitored and reconciled.

Multi-Signature and Threshold Controls

VARA requires multi-signature (or equivalent multi-party computation) controls for high-value transactions. The specific requirements depend on your activity type and risk profile, but the general principles are:

  • No single individual should be able to authorise a transaction above a defined threshold
  • Multi-sig configurations must involve a minimum number of signers (typically 2-of-3 or 3-of-5)
  • Signers must be drawn from different organisational roles (no two signers from the same team)
  • The threshold triggering multi-sig must be documented and proportionate to your risk appetite
  • All multi-sig events must be logged with full audit trails

MPC (multi-party computation) is increasingly accepted as an alternative to traditional multi-sig, particularly for operational efficiency. VARA doesn’t mandate one approach over the other, but whatever you choose, you need to document the security model and demonstrate that it provides equivalent protections against single-point-of-failure risks.

Rotation, Backup, Recovery, and Destruction

The lifecycle doesn’t end at generation and storage. VARA requires documented procedures for every subsequent stage:

Key Rotation

Keys must be rotated on a defined schedule, and immediately upon suspected compromise. VARA doesn’t mandate specific rotation periods, but expects you to justify your rotation policy based on risk. For hot wallet keys, quarterly rotation is common. For cold storage keys, annual rotation is typical unless triggered by an event. Every rotation needs to be documented: old key decommissioned, new key generated, all dependent systems updated.

Key Backup and Recovery

You need a backup strategy that can survive catastrophic failure - fire, flood, building collapse - without exposing key material. This typically means:

  • Shamir’s Secret Sharing or similar threshold schemes for backup distribution
  • Geographically distributed backup locations
  • Tamper-evident storage for backup media
  • Regular recovery testing (at least annually) to confirm backups are viable
  • Documented procedures for who can initiate recovery and under what circumstances

The recovery testing is critical. I’ve seen companies discover during a real incident that their “backup” was corrupted, incomplete, or relied on a password that nobody current remembers. Test your recovery process. Then test it again. Then document the test.

Key Destruction

When keys are decommissioned, they need to be destroyed in a way that’s verifiable and irreversible. For HSM-stored keys, this means cryptographic erasure with audit log confirmation. For backup media, physical destruction with witnessed procedures. You need to demonstrate that once a key is destroyed, it can’t be recovered from any location - including backups. This is often the most overlooked part of the lifecycle, and VARA checks for it.

The Documentation VARA Actually Wants

Let me be direct: every requirement above needs to be documented, and the documentation needs to be current, detailed, and accessible for regulatory review. Here’s the minimum set of documents VARA expects:

Document What It Covers Review Frequency
Key Management Policy Overall governance of cryptographic key operations Annual
Key Generation Procedures Step-by-step ceremony procedures, algorithms, hardware specs Annual + on change
Wallet Architecture Document Hot/cold segregation, thresholds, multi-sig configurations Annual + on change
Backup & Recovery Plan Backup locations, Shamir thresholds, recovery procedures Annual + after test
Key Rotation Schedule Rotation frequencies by key type, triggered rotation criteria Quarterly
Key Destruction Records Evidence of secure key destruction, including backup media On occurrence
Access Control Matrix Who can access key material, with what approvals Quarterly

Managing this documentation in scattered locations is a recipe for audit failure. Tools like Venvera let you centralise key management documentation alongside your broader VARA compliance tracking, cross-mapped to DESC and other frameworks. When VARA asks for your key rotation records during a review, you don’t want to be searching through Confluence pages and shared drives.

The Bottom Line

Cryptographic key and wallet management isn’t just another compliance checkbox. It’s the foundation your entire VASP is built on. VARA understands this, which is why the requirements are so specific and so thorough.

The companies that sail through this section aren’t necessarily the ones with the most expensive hardware. They’re the ones with the most rigorous documentation, the clearest procedures, and the most consistent execution. A well-documented key management programme using cloud HSMs will pass VARA review more easily than an undocumented programme using state-of-the-art hardware.

Document everything. Test your recovery. Rotate your keys. Destroy what you don’t need. And for the love of everything, don’t store private keys in plaintext.

Track Your Key Management Compliance

Venvera helps VASPs manage key management documentation, VARA assessments, and cross-framework compliance across 13 regulatory frameworks - starting at €399/month.

Book a Demo →

Last updated: March 2026. Requirements based on VARA Technology and Information Rulebook, including Schedule 1. Always verify current requirements with VARA directly.

Alexander Sverdlov

Alexander Sverdlov

CEO & Founder

Alexander is the founder of Venvera and a 20+ year veteran of European cybersecurity and compliance. He has led security and risk programmes for regulated financial institutions, fintechs and SaaS companies operating under DORA, NIS2, GDPR, ISO 27001 and the EU AI Act. Before Venvera, he founded Atlant Security, an offensive security consultancy that ran penetration tests, red-team exercises and ISO 27001 readiness programmes for clients across the EU and the Middle East. He writes on the cross-framework realities of running modern compliance: how to map one control to many obligations, where the spreadsheets fall apart, and what regulators are actually asking for once the auditor sits down.

More articles by Alexander

RELATED POSTS