How It Works

12 Steps to
Audit-Ready Compliance

From firm setup to evidence pack generation — see exactly how Sentine structures your Tranche 2 compliance workflow, who does what, and what evidence is captured at every step.

Overview

Structured Compliance, Step by Step

Sentine converts your Tranche 2 obligations into a structured workflow. Each step has a clear owner, defined evidence requirements, and automatic audit trail capture. The result is a complete, defensible compliance record for every designated service engagement.

Workflow

The Complete Workflow

12 steps from firm setup to audit-ready evidence pack. Each step shows who does it and what evidence is captured.

01

Firm Setup

Firm Admin

Admin configures firm settings, vertical packs, reporting types, user roles.

Evidence Captured

  • Firm configuration record
  • Vertical pack selection
  • Reporting type toggles
  • User role assignments
02

Matter Creation

Staff

Create matter, assign owner and team, link to client/entity.

Evidence Captured

  • Matter record created
  • Team assignment logged
  • Client linkage recorded
03

Scoping Gate

Staff

Determine if engagement involves a designated service (Yes/No/Unsure).

Evidence Captured

  • Scoping decision
  • Rationale (mandatory for No/Unsure)
  • Service type classification
04

Customer Identification

Client / Staff

Collect customer identity information and documents via client portal or staff upload.

Evidence Captured

  • Identity documents
  • Upload timestamps
  • File hashes
05

BO/Controller Identification

Staff

For entities — identify beneficial owners (25%+), trustees, directors, controllers.

Evidence Captured

  • BO/controller records
  • Ownership percentages
  • Unknown reasons (where applicable)
06

Document Upload

Client

Clients upload supporting documents through the secure portal.

Evidence Captured

  • Document receipts
  • Upload timestamps
  • File integrity hashes
07

Verification

Staff / System

Run identity checks via provider adapter (safe harbour, non-safe harbour, or manual).

Evidence Captured

  • Verification method path
  • Provider reference IDs
  • Normalised results
08

Screening

System / Staff

Sanctions, PEP, and optional adverse media screening of all parties.

Evidence Captured

  • Screening results
  • Decision and rationale
  • Cleared/escalated status
09

Risk Assessment

Staff

Complete guided risk wizard with multi-factor scoring and mandatory rationale.

Evidence Captured

  • Risk rating (low/medium/high)
  • Factor assessments
  • Decision rationale
10

Enhanced CDD

Staff / Approver

If triggered — source of funds, source of wealth, additional verification.

Evidence Captured

  • ECDD case record
  • SOF/SOW documentation
  • Required actions completed
11

Approval

Approver

Route to senior management for sign-off on the engagement.

Evidence Captured

  • Approval record
  • Approver identity
  • Timestamp and notes
12

Evidence Pack

Staff

Generate tamper-evident evidence pack snapshot with SHA-256 hash.

Evidence Captured

  • Versioned evidence pack
  • SHA-256 integrity hash
  • Redaction rules applied
  • Retention anchor set
By the Numbers

Compliance at a Glance

0
Compliance Steps
0
Report Types
0
Verification Paths
7 years
Retention Period
Evidence

What Gets Captured

Every step in the workflow produces evidence that feeds into your matter's audit-ready evidence pack.

Scoping decisions with rationale
Customer identity documents
Beneficial owner records
Verification method paths
Provider reference IDs
Screening results and decisions
Risk ratings with factor analysis
ECDD actions and outcomes
Approval records with timestamps
SHA-256 integrity hashes

Ready to See It in Action?

Get started now and experience the structured compliance workflow firsthand.

Get Started