Broker-Dealer Compliance Controls & Supervisory Evidence
The audit trail doesn't run alongside operations. It is operations.
Maker-checker enforcement, Write Once Read Many (WORM) audit trail, and role-based segregation of duties are structural properties of Devancore's event stream — not a compliance module activated after implementation, not a reporting layer queried the night before a review.
The standard approach to compliance controls in post-trade software is additive: build the operational system, then add an audit log. Build the workflow, then document the written supervisory procedures (WSPs). Build the access model, then configure the permissions that encode segregation of duties. The controls are layers on top of a system that was designed without them.
The weakness of additive controls is that they can be subtracted. An audit log that exists alongside the data it's supposed to protect can, in principle, be modified, or simply not queried when it matters. A permission list that encodes segregation can be temporarily expanded under operational pressure. A documented supervisory procedure can be followed or not followed with no structural enforcement either way.
In a system with additive controls, the audit trail is a mirror of what happened. In Devancore, the audit trail is the engine — no action can occur without being recorded first. Every state change is an immutable lifecycle event: there is no edit operation, only new events that supersede previous ones. Maker-checker enforcement is not a workflow setting; it is the only mechanism by which a material action can complete. Segregation of duties is not a permission list; it is the shape of the role model.
The implication for a FINRA or SEC examination is operational rather than theoretical: supervisory evidence is not produced by assembling records the night before a review. It is generated, continuously, as the byproduct of normal daily operations.
The examination question answered in advance. A FINRA examiner reviewing supervisory controls asks two questions: what do your written supervisory procedures say, and show me that you followed them. Devancore's event stream answers the second question structurally: every maker submission, every checker decision, every principal sign-off is a timestamped, attributed, immutable event. The supervisory record produces itself.
Compliance posture callout
The examination question answered in advance. A FINRA examiner reviewing supervisory controls asks two questions: what do your written supervisory procedures say, and show me that you followed them. Devancore's event stream answers the second question structurally — every maker submission, every checker decision, every principal sign-off is a timestamped, attributed, immutable event. The supervisory record produces itself.
Maker-checker workflow: FINRA Rule 3110 supervisory evidence as a structural output
Every action classified as material under the firm's control matrix, trade amendment, settlement instruction release, position override, compliance rule modification, on-chain delivery authorization, requires a second authorized user to review and approve before the action takes effect. "Material" is defined explicitly: trade amendments, instruction overrides, position adjustments, role changes, rule changes, and break-glass actions. The action does not execute until the checker approves. There is no single-actor bypass path.
- Workflow design, not policy
This is not a policy requirement enforced by trust in the operations team. It is the workflow design. The maker submits. The system creates a pending event and holds the action until a qualified checker responds. The checker approves or rejects. Whether approved or rejected, both events are immutable lifecycle entries with actor ID, timestamp, IP address, device, source, and the full state of the record at the moment of each action. The elapsed time between maker submission and checker response is a derived fact: visible to a compliance examiner without any additional processing.
- FINRA Rule 3110 and digital evidence
FINRA Rule 3110 requires broker-dealers to establish, maintain, and enforce a system of supervisory controls. For distributed and remote teams, this requirement is increasingly difficult to satisfy with sign-off sheets, email approvals, or attestation logs: none of which are cryptographically tied to the operational event they're supposed to supervise. Devancore provides digital evidence of supervisory review that travels with the operational event itself: a trade amendment carries its supervisory approval record as a structural property of the amendment event, not as a separate document that must be located and matched. The event stream contains the evidence, regardless of where the maker and checker are sitting.
- Break-glass scenario
Operations teams need to move quickly under market stress. Devancore handles this through a designated escalated-access role for time-critical situations. Emergency actions taken under this role still require a second authorized actor: the 4-eyes principle is maintained even in emergency workflows. Every step of an escalated-access action is logged in real time: the actor, the emergency action type, the authorization chain, and the resolution. Speed is not purchased by suspending supervisory integrity.
- Pre-execution governance for on-chain operations
For firms with digital asset operations, a specific vulnerability exists: the Single-Key Risk: the cryptographic signing of an on-chain settlement instruction can, depending on the custody model, be performed by a single actor who holds the relevant key. Devancore operates as the pre-execution governance layer upstream of the custody layer — no on-chain instruction can reach the signing vault without a verified maker-checker event in the audit log. The custody layer handles cryptographic signing; Devancore controls the decision to sign. The policy plane and the signing plane are structurally separate.
WORM audit vault: the immutable ledger of truth for every operational event
Devancore's event log is designed as an append-only record: an immutable ledger of truth that spans traditional and on-chain operations in one retrievable data set. Events are written and, as a structural property of the architecture, are not subject to modification or deletion through normal system operations. This is the Write Once, Read Many (WORM) design principle at the center of SEC Rule 17a-4(f)'s electronic records requirements for broker-dealer books and records.
- Five attribution attributes
Every event in the log carries five attribution attributes. Who: actor type (USER, SYSTEM, or SERVICE) and actor ID, including the specific FIX gateway, automated workflow, or API integration when the actor is not a human. What: action and subject: what occurred and to which entity. When: the timestamp of when the event occurred, not just when it was ingested into the log. Where: IP address and device identifier. Source: FIX message, UI action, API call, or autonomous system transition: the mechanism by which the action was initiated. These five attributes make the event record self-describing. An examiner querying the audit vault for every action taken against a specific trade record receives a complete, attributed chain from capture through settlement, without operations staff reconstructing the sequence from memory or assembling it from separate systems.
- On-chain and off-chain in one log
For digital asset operations: an on-chain settlement instruction and a DTC settlement instruction are both lifecycle events in the same log: with the same five-attribute structure, the same design properties, and the same retrieval path. On-chain and off-chain events share a single audit trail. There is no separate digital asset log that an examiner would need to request separately.
- Examination-ready retrieval — Response to Inquiry (RTI)
Because the event stream is queryable by entity, actor, time range, event type, and source, a Response to Inquiry (RTI) package can be assembled from the event record directly — not reconstructed from email, spreadsheets, or separate system exports. Reduce RTI preparation time from weeks to days: Ops Copilot, Devancore's explain-only AI assistant, creates plain-English narratives from event sequences, translating complex chains of system and on-chain actions into summaries appropriate for an RTI package. Ops Copilot generates the first draft; the compliance team reviews and submits. Every Ops Copilot session is logged for auditability and internal governance.
- Protect the Principal
In an era of heightened individual accountability for compliance officers and registered principals, Devancore provides structural proof of supervision that travels with every operational event. A Series 24 principal who reviewed and approved an exception carries that review as an attributed, timestamped, immutable entry in the WORM vault — not as a verbal authorization that must be reconstructed from recollection. The firm's evidence exists because the workflow produced it.
- Scope clarification
SEC Rule 17a-4(f) requires more than non-rewritable storage: it also requires indexing, access controls, the ability to produce records promptly to regulators, and written undertakings where a third-party vendor provides the storage. Immutability depends on the full deployment and retention configuration, including storage controls and administrative governance. Devancore's event log is designed to support these requirements; the firm's compliance function and legal counsel determine adequacy of the full 17a-4 implementation, including any third-party storage arrangements.
WSP evidence mapping: written supervisory procedures as a navigable evidence chain
Written supervisory procedures (WSPs) describe what a firm's supervisory controls require. An examination asks whether those controls were actually applied. The gap between the document and the evidence is where most compliance teams spend their examination preparation time.
- Procedure to control to evidence
Devancore's WSP evidence mapping layer connects supervisory procedures to the system controls that implement them: creating a navigable chain from procedure to operational evidence. Devancore is not a WSP authoring or document management system; it is the evidence generation layer. A WSP requirement for supervisory review of trade amendments maps to the maker-checker event record for every trade amendment executed during the examination period. A WSP requirement for principal review of settlement exceptions maps to the escalation and principal sign-off events for every case that triggered the escalation workflow.
- Principal sign-offs in the WORM vault
Principal sign-offs, the designated Series 24 or Series 14 supervisory approvals required under FINRA Rule 3110, are timestamped, attributed events in the WORM vault. A principal reviewing and approving an exception is not documenting a verbal decision after the fact. The approval is the event. The timestamp is the moment the approval occurred. The actor ID identifies the principal by name and role.
- Escalation and compliance closure
For escalations from Operations to Compliance, a settlement fail that exceeds the notification threshold, an on-chain position that triggers a compliance review, the escalation is a formal recorded workflow state. The escalation event, the compliance review event, and the principal decision event are all in the same log, with elapsed times and actor attributions. Escalation resolution can be configured to require a compliance closure event for specific case types before the case can be marked resolved: ensuring that escalated items carry a full disposition record, not just an open-close timestamp.
Segregation of duties: self-approval structurally prevented
The access control list approach to segregation of duties has a known failure mode: under operational pressure, permissions are temporarily expanded. A supervisor grants a settlement operations user the ability to approve their own instructions to cover an emergency. The permission is never revoked. The segregation is silently broken. The next examination asks who noticed.
- Structural prevention
Devancore's role model is designed so that self-approval is structurally prevented. The same user cannot be both maker and checker on the same action. A user authorized to create settlement instructions cannot authorize them, because the creator and approver roles carry structurally incompatible capabilities for that action type. Segregation is enforced by workflow constraints and recorded role changes, making any expansion explicit, supervised, and auditable: adding the authorizer capability to a creator role is itself a role configuration change: a recorded, maker-checker-controlled event in the audit log. You cannot accidentally break the segregation, because breaking it is a supervised action. Devancore's zero-trust architecture enforces the principle of least privilege at the role model level — access is never assumed; it must be explicitly granted and is bounded by functional separation.
- Role architecture
Devancore's role-based access control (RBAC) layer is organized around functional separation: Front Office (trade capture, no settlement access), Operations (settlement desk, case management, no compliance rule modification), Compliance (audit vault access, WSP evidence mapping, no trade capture), FinOps (capital and reserve computation, reporting, no settlement instruction release), and Administrator (role configuration, no operational access). The default role taxonomy reflects common broker-dealer functional separation; it is configurable by firm structure to accommodate specific organizational models. Each role carries only the capabilities its function requires.
- Maker-checker matrix configuration
The RBAC layer includes a configurable maker-checker matrix: defining, for each action type, which roles can make and which can check. The matrix is the record of the firm's segregation design. Changes to the matrix are subject to the same maker-checker controls as any other material system action. An administrator cannot unilaterally reconfigure the maker-checker matrix without a second authorized actor approving the change.
Trade surveillance and MNPI monitoring: post-trade supervisory workflows
Supervisory controls extend beyond settlement operations. FINRA Rule 3110 and the broader supervisory framework require firms to monitor trading activity for patterns that may indicate potential misconduct, and to maintain structured workflows for MNPI-related review.
- Post-trade supervisory monitoring
Devancore's post-trade supervisory monitoring layer surfaces surveillance-relevant events from the unified operational event stream and routes them into structured compliance workflows. Trading patterns that span traditional and on-chain activity are visible in the same operational record: a cross-rail pattern doesn't require cross-system querying to surface. Positions in securities flagged on the firm's MNPI watchlist are identifiable against the same position and trade history that drives settlement and capital computation. Surveillance-relevant events, position concentration anomalies, trades in flagged securities, settlement exception patterns, open compliance cases in the same case management queue as operational exceptions. The case carries the standard attributed lifecycle: what triggered it, who reviewed it, what the principal decided, and when each step occurred. The principal sign-off on case resolution is a WORM event.
- Communications surveillance integration
For communications surveillance and archiving, review of electronic communications associated with flagged trading activity or supervisory exceptions, Devancore is designed to route relevant operational context to the firm's existing communications surveillance and archiving infrastructure. The firm's communications surveillance system and Devancore's operational event record work in parallel; Devancore does not replace communications archiving capability but provides the operational event context that makes surveillance review more precise.
Controls are only as strong as the architecture underneath them. The maker-checker workflow generates supervisory evidence because every action is a lifecycle event the moment it occurs — not reconstructed after the fact. The WORM audit vault carries the append-only design property because the event stream, by design, does not overwrite records. Segregation of duties is structural because self-approval is prevented at the workflow level, not just documented.
The controls layer connects to everything else
For the technical foundation and regulatory framing