FinCEN

FinCEN NPRM 2026: Risk Assessments Are Now Required. Here's How to Build One an Examiner Will Actually Trust.

Published
May 19, 2026
Read Time
9
mins
Gal Perelman
Gal Perelman
Product Marketing Lead, Unit21
Subscribe to stay informed
Table of contents

For years, a documented AML risk assessment has been a best practice. The institution that actually wrote one, kept it current, and tied it back to their detection logic was doing things right. The institution that didn't might have skated by anyway, because there was no formal regulatory hook requiring it.

FinCEN's 2026 NPRM changes that. Under the proposed rule, a documented risk assessment would become a formal requirement under the BSA program framework. It would need to cover your products, services, customers, and geographies. It would need to incorporate FinCEN's National AML/CFT Priorities. And it would need to be updated whenever material changes occur. The AML Act of 2020's risk assessment provision is finally getting codified into the program rule.

But here's the part most institutions aren't thinking about yet: a risk assessment is only as defensible as the evidence behind it. And the evidence behind it is only trustworthy if every detection decision in your program is explainable and traceable. This is where explainable AI stops being a product feature and starts being a compliance requirement.

This post walks through what the proposed FinCEN risk assessment requirement actually means, what examiners will look for when they review yours, and how to build one that holds up.

From Best Practice to Formal Requirement: What the FinCEN NPRM Proposes

Under current rules, risk assessments are expected but not explicitly mandated as a program component. The NPRM would change that by codifying risk assessments as a formal part of the AML/CFT program framework.

What the proposed requirement covers:

Products and services. Each product your institution offers carries its own risk profile. Wire transfers, crypto on-ramps, ACH origination, trade finance, and prepaid cards don't carry equal risk, and your risk assessment needs to reflect that. If your program treats them identically, that's a gap.

Customer base. Who are you doing business with? The proposed rule requires institutions to assess customer risk by looking at customer segments, not just individual transactions. PEPs, high-risk industries, and customers whose transaction patterns don't match their stated business profile.

Channels. How do customers onboard and transact? Fully digital, API-based origination, or third-party aggregator channels carry different risk than branch-based relationships. The channel itself is a risk dimension.

Geographies. Where is money flowing? FATF grey-listed jurisdictions, secrecy havens, high-risk corridors: geographic risk needs to be documented and connected to how you monitor for it.

The proposed rule also requires institutions to map their risk assessments to FinCEN's National AML/CFT Priorities, which currently cover areas such as corruption, cybercrime, drug trafficking, fraud, human trafficking, proliferation financing, terrorist financing, and virtual assets. This is the provision that connects your internal program design to the regulatory policy agenda.

Finally, the proposed rule would require that risk assessments be updated "promptly" when material changes occur: new product launches, new customer segments, expansion into new geographies, and significant shifts in transaction patterns.

This isn't a once-every-three-years exercise anymore. It's a living document.

What Examiners Will Actually Look For

A written risk assessment is the starting point, not the finish line. What examiners will probe is whether your risk assessment is connected to how your program actually operates.

The two-prong evaluation framework in the NPRM (covered in Part 1 of this series) is relevant here. Prong 1 evaluates program design. Prong 2 evaluates operational execution. Your risk assessment sits at the intersection: it's the document that should explain why your program is designed the way it is, and it's the baseline against which operational performance gets measured.

Concretely, that means examiners will look for:

Logical consistency between risk assessment and detection logic. If your risk assessment identifies high-risk geographies, your monitoring rules should reflect that. If your risk assessment calls out wire transfer fraud as elevated risk, your alert thresholds and typologies for wires should be tighter than for lower-risk channels. Gaps between what the risk assessment says and what the rules do are enforcement vulnerabilities.

Documentation of why each rule exists. Not just "we have a rule for large cash transactions." The question is: what risk does that rule address? What evidence informed the threshold? When was it last tuned, and what did the tuning show? An examiner reviewing your risk assessment is looking for a coherent story connecting risk identification to detection design.

Evidence of ongoing management. A risk assessment dated two years ago, with no updates reflecting a new product launch or a change in the customer base, signals that the document is decorative. The proposed rule's "promptly updated" language puts this squarely on the table.

Quantitative evidence of effectiveness. Under the proposed effectiveness standard, risk assessments can't be purely qualitative. You need data: false positive rates, alert volumes by channel, investigation outcomes, SAR filing rates, rule tuning history. These metrics are what turn a well-written document into a defensible one.

The Evidence Problem: Why Opaque AI Creates a Risk Assessment You Can't Defend

Here's the challenge facing institutions that have deployed black-box ML models for detection: if your detection logic is opaque, your risk assessment is untethered.

Consider what an examiner actually needs to trace. Your risk assessment says high-risk geography X is a priority area for your program. Your detection layer fires an alert. An investigator reviews it and closes it without filing. Later, a similar pattern reoccurs, and a SAR is filed. The examiner wants to understand that chain: why did the first alert close? What reasoning supported the investigator's decision? How does that decision connect back to the risk assessment's identification of that geography as elevated risk?

If your detection layer produces a risk score with no accompanying reasoning, that trace breaks. The examiner sees a number, not a rationale. And a rationale is what they're asking for when they evaluate whether your program demonstrates effectiveness.

This is the practical reason explainability matters in the context of the proposed FinCEN risk assessment requirement. It's not a philosophical preference for transparency. It's that an opaque system makes the evidence chain required by the proposed rule nearly impossible to reconstruct.

The institutions that will be in the strongest position under this proposed framework are the ones where every detection decision is traceable from the alert through the reasoning to the outcome. Not because regulators are asking them to prove something after the fact, but because they built the system that way to begin with.

How Unit21 Delivers Audit-Ready Risk Assessment Evidence

This is the section that gets practical. Here's what "explainable AI" actually means in terms of specific capabilities, and why each one matters for the proposed risk assessment requirement.

Full alert-to-filing reasoning chains. When a Unit21 AI Agent reviews an alert, it doesn't produce a score. It produces a recommendation with the reasoning behind it: what data was reviewed, what patterns were identified, what conclusion was reached. An investigator sees the same chain an examiner would. A risk assessment backed by this kind of documentation has a coherent paper trail at every step.

Self-service rule management with documented rationale. Every rule in Unit21 is created and managed by the compliance team, without engineering dependency. More importantly, the rule itself can be documented in terms of the risk it addresses. When an examiner asks "why does this rule exist?", the answer lives in the system. The risk assessment and the detection layer are connected, not siloed.

Rule performance analytics as quantitative evidence. False positive rates, alert volumes by rule, investigation close rates, tuning history: these aren't reports you have to generate manually. They're part of the operational record. When your risk assessment needs quantitative evidence of effectiveness, this is where it comes from.

Shadow mode and validation testing. Unit21's shadow and validation mode lets compliance teams test proposed rule changes against historical transaction data before deploying them. This means you can document, in advance, what the risk impact of a program change would be. That kind of prospective evidence is exactly what an examiner needs to see when evaluating whether a material change to your program was appropriately managed and reflected in your risk assessment.

Coverage across all risk dimensions. Products, customers, channels, geographies: Unit21's transaction monitoring operates across all payment rails and data types, which means the quantitative evidence it produces covers the same dimensions the proposed risk assessment requirement covers. You're not working from five separate tools and trying to stitch the evidence together. It's one system.

For a deeper look at how AI agents work end-to-end in financial crime operations, see how custom AI agents are transforming fraud and AML operations.

Practical Next Steps Before June 9

The comment period for the NPRM closes June 9 (Docket: FINCEN-2026-0034). The final rule is expected late 2026 or early 2027. That means now is the right time to get ahead of it.

Start your risk assessment refresh now. Don't wait for the final rule. If your current risk assessment is more than 12 months old, or hasn't been updated since you launched a new product or entered a new market, it's already out of sync with the proposed standard. Start the update now, using the proposed rule's dimensions as your structure.

Map your detection rules to FinCEN's AML/CFT Priorities. For each priority area, identify which rules in your program are designed to address it. Where there are gaps, document why the gap exists. Maybe your institution doesn't have exposure to a specific risk area. That rationale belongs in the risk assessment. An examiner who sees a gap without a rationale will ask questions. One who sees a gap with a documented explanation understands your risk-based approach.

Document the rationale for each rule. For every active rule, record what risk it addresses, what evidence informed the original threshold, and when it was last tuned. This doesn't need to be elaborate. Two to three sentences per rule is often enough. But the documentation needs to exist.

Collect baseline metrics now so you can show improvement. False positive rates, alert volumes, investigation cycle times, SAR filing rates: start tracking these now if you aren't already. When the final rule takes effect and your program is evaluated for effectiveness, the examiner will want to see a trend, not a snapshot. The baseline you establish today becomes the evidence of progress you'll cite in the exam.

Submit a comment if you have a substantive view. The comment period is an opportunity to shape how the final rule is written. If there are provisions in the NPRM that would be operationally difficult, or that don't reflect how risk-based programs actually work in practice, this is the moment to say so on the record.

For a deeper look at the two-prong evaluation framework and what "program effectiveness" means operationally, read Part 1 of this series. For the case that AI use under this proposed framework is not just permissible but a supervisory advantage, see Part 2.

The Bottom Line

The proposed FinCEN risk assessment requirement is less of a new burden than it is a formalization of what good programs already do. The institutions that have been building documented, evidence-backed, internally consistent risk assessments will have a relatively straightforward compliance path. The ones that haven't will need to do real work.

What's changing is the evidentiary standard. It's no longer enough to have a risk assessment document. The document needs to be connected to a detection program that produces traceable, measurable evidence of effectiveness. And that evidence needs to be available in a form an examiner can follow.

The comment period closes June 9. The time to build the infrastructure that makes your risk assessment defensible is now, not after the final rule is published.

See how Unit21 helps compliance teams build audit-ready AML programs. Book a demo or visit the FinCEN AML Program Rule hub for the full series.

Frequently Asked Questions

Does the proposed FinCEN rule require a specific format for the risk assessment?

No. The proposed rule establishes that a documented risk assessment covering products, services, customers, and geographies is required, and that it must be updated promptly on material changes. It does not prescribe a specific template or format. The substance and the connection to how the program actually operates matter more than the format.

What does "map to AML/CFT Priorities" actually mean in practice?

FinCEN publishes National AML/CFT Priorities periodically. The proposed rule would require that institutions incorporate those priorities into their risk assessment. In practice, that means reviewing each priority area, assessing your institution's exposure to it, and documenting how your detection program addresses the relevant risks. It doesn't require equal coverage of every priority. It requires a documented, reasoned analysis of your exposure.

Can an examiner penalize us if our risk assessment methodology differs from what they would have done?

Under the proposed framework, no. The NPRM explicitly states that examiners should not substitute their own subjective judgment for the institution's risk-based approach, provided the program design is sound and documented. That's one of the most significant protections in the proposed rule: your risk-based decisions are defensible if they're documented and internally consistent.

How often does a risk assessment need to be updated?

The proposed rule requires "prompt" updates on material changes. What counts as material is not defined with precision in the NPRM, but the intent is clear: launching a new product, entering a new customer segment, or expanding into a new geography should trigger a review. Annual review of the full assessment is reasonable as a baseline, with targeted updates whenever the institution's risk profile changes.

What's the difference between a risk assessment and transaction monitoring rules?

The risk assessment identifies and documents your institution's risk exposure across products, customers, channels, and geographies. Transaction monitoring rules are the operational response to that exposure: the specific detection logic designed to surface the behaviors associated with the risks your assessment identifies. The two should be connected. If your risk assessment and your rules can't be traced back to each other, you have a documentation gap that an examiner will surface.

Gal Perelman
Gal Perelman
Product Marketing Lead, Unit21

Gal Perelman is the Product Marketing Lead at Unit21, where she spearheads go-to-market strategies for AI-driven risk and compliance solutions. With over a decade of experience in the fintech and fraud sectors, she has led high-impact launches for products like Watchlist Screening and AI Rule Recommendations.

Previously, Gal held marketing leadership roles at Design Pickle, Sightfull, and Lusha. She holds a Master’s degree from American University and a Bachelor’s from UCLA, and is dedicated to helping banks and fintechs navigate complex regulatory landscapes through innovative technology.

Learn more about Unit21
Unit21 is the leader in AI Risk Infrastructure, trusted by over 200 customers across 90 countries, including Sallie Mae, Chime, Intuit, and Green Dot. Our platform unifies fraud and AML with agentic AI that executes investigations end-to-end—gathering evidence, drafting narratives, and filing reports—so teams can scale safely without expanding headcount.
Nacha
|
7
min

Documenting Your ACH Fraud Detection Program for Nacha 2026

Gal Perelman
Gal Perelman
Product Marketing Lead, Unit21
This is some text inside of a div block.
Unit21 for AML
|
8
min

What the CLARITY Act means for your bank's AML program

Nick Bennet
Nick Bennet
GTM Engineer, Unit21
This is some text inside of a div block.
Unit21 for AML
|
8
min

What the CLARITY Act means for your fintech's AML program

Nick Bennet
Nick Bennet
GTM Engineer, Unit21
This is some text inside of a div block.
See Us In Action

Boost fraud prevention & AML compliance

Fraud can’t be guesswork. Invest in a platform that puts you back in control.
Get a Demo