Created on: 
January 7, 2026
Updated on: 
January 7, 2026

CIP vs CDD vs EDD: Understanding the Three Pillars of Customer Verification

An illustration with the text: CIP vs CDD vs EDD.

In the world of regulatory compliance, few areas generate as much confusion as the relationship between CIP, CDD, and EDD. These three acronyms (Customer Identification Program, Customer Due Diligence, and Enhanced Due Diligence) are often used interchangeably, treated as synonyms, or simply lumped together under the umbrella of "Know Your Customer (KYC)."

But they're not the same thing. Each serves a distinct purpose in your anti-money laundering (AML) program, requires different procedures, and applies to different situations. Understanding these distinctions isn't academic. It's essential for building a compliance program that actually works.

Failure to properly distinguish between these requirements leads to real problems: over-verification that frustrates low-risk customers, under-verification that exposes the institution to regulatory action, and compliance programs that are simultaneously too burdensome and not effective enough.

This guide clarifies the differences between CIP, CDD, and EDD, explains when each applies, and shows how they work together to create a comprehensive customer verification framework.

The Quick Answer: How CIP, CDD, and EDD Differ

Before diving into the details, here's the essential distinction:

CIP (Customer Identification Program) answers the question: "Is this customer who they claim to be?" It's about verifying identity at account opening.

CDD (Customer Due Diligence) answers the question: "What should I expect from this customer?" It's about understanding the customer's profile to enable effective monitoring.

EDD (Enhanced Due Diligence) answers the question: "What additional information do I need about this higher-risk customer?" It's about applying deeper scrutiny when standard due diligence reveals elevated risk.

Think of it as a progression: CIP confirms identity, CDD establishes baseline expectations, and EDD provides additional scrutiny when circumstances warrant it.

Now let's examine each in detail.

What Is CIP (Customer Identification Program)?

The Customer Identification Program (CIP) is a regulatory requirement established under Section 326 of the USA PATRIOT Act. It mandates that financial institutions verify the identity of customers opening accounts.

CIP Requirements at a Glance

What information must be collected:

  • Full legal name
  • Date of birth (for individuals)
  • Address (residential or business)
  • Identification number (SSN for U.S. persons; passport number, alien ID, or government-issued document number for non-U.S. persons)

When it applies:

  • At account opening
  • Before the customer is allowed to conduct transactions (or within a "reasonable time" after opening in limited circumstances)

How verification occurs:

  • Documentary verification (reviewing government-issued ID)
  • Non-documentary verification (database checks, credit bureau data, references)
  • Often a combination of both

What records must be kept:

  • All identifying information collected
  • Description of verification methods and results
  • Retained for five years after account closure

The Purpose of CIP

CIP serves a singular, critical function: confirming that the person or entity opening an account is who they claim to be. It's the gateway to the customer relationship. Without verified identity, all subsequent compliance activities lose their foundation.

CIP is mandatory. Every customer opening an account must go through CIP procedures. There's no risk-based exception that allows institutions to skip identity verification for "low-risk" customers. The depth of verification may vary based on risk, but the requirement to verify identity applies universally.

CIP Limitations

CIP tells you who the customer is. It does not tell you:

  • What the customer plans to do with the account
  • Whether the customer's expected transaction patterns are consistent with their profile
  • Whether the customer poses elevated money laundering or terrorist financing risk

That's where CDD comes in.

What Is CDD (Customer Due Diligence)?

Customer Due Diligence (CDD) extends beyond identity verification to develop an understanding of who the customer is, what they do, and what their expected account activity should look like. While CIP confirms identity, CDD establishes the context needed for effective ongoing monitoring.

The FinCEN CDD Rule and Its Four Pillars

In 2016, FinCEN issued the Customer Due Diligence Requirements for Financial Institutions rule, which formalized CDD requirements and established four core elements. Understanding these four pillars is essential for compliance.

The first pillar addresses identifying and verifying customer identity. This overlaps significantly with CIP: financial institutions must collect and verify the same core identifying information (name, date of birth, address, and identification number) using documentary and non-documentary methods.

The second pillar focuses on beneficial ownership. For legal entity customers, institutions must identify each individual who owns 25% or more of the equity interests, along with at least one individual who has significant responsibility for controlling or managing the entity, regardless of ownership percentage. This requirement addresses shell company abuse and ensures at least one natural person is accountable for the entity's activities.

The third pillar requires institutions to understand the nature and purpose of customer relationships. This means developing a "customer risk profile" that enables the institution to understand what normal and expected transactions look like for this particular customer, identify transactions that would be unusual, and form a reasonable belief about the legitimacy of the relationship. This information gathering goes beyond simple identity verification and establishes the baseline for ongoing monitoring.

The fourth pillar mandates ongoing monitoring. CDD isn't complete at account opening. Institutions must monitor for suspicious activity on a risk-based schedule, update customer information when triggered by events or periodic reviews, and re-evaluate customer risk ratings as circumstances change.

These four pillars work together. Verified identity enables accurate risk profiling, which enables effective ongoing monitoring, which may trigger re-verification or enhanced due diligence.

The Three Tiers of Customer Due Diligence

Not all customers require the same level of scrutiny. CDD operates on a tiered basis, with the level of due diligence calibrated to the customer's risk profile.

Simplified Due Diligence (SDD) applies to the lowest-risk customers where the money laundering and terrorist financing risk is minimal. SDD may involve reduced identity verification requirements, less detailed information gathering about business purpose, and streamlined ongoing monitoring. Government bodies, publicly traded companies on regulated exchanges, regulated financial institutions, and pension funds typically qualify for SDD treatment.

It's important to note that SDD is not the same as "no due diligence." Institutions must still verify identity and be alert to red flags. SDD simply allows for a lighter touch when risk is demonstrably low.

Standard CDD is the baseline level of due diligence applied to most customers. It includes full CIP procedures for identity verification, beneficial ownership identification for entities, understanding the nature and purpose of the relationship, and ongoing monitoring appropriate to the customer's risk level. Most retail and commercial customers fall into this category.

Enhanced Due Diligence (EDD) applies to higher-risk customers who present elevated money laundering or terrorist financing risk. EDD involves all standard CDD elements plus additional scrutiny, which we detail in the EDD section below.

The key principle is that resources should be allocated based on risk. Applying EDD to all customers wastes resources on low-risk relationships while potentially diluting focus on genuinely high-risk customers.

CDD Requirements in Practice

Beneficial Ownership Identification

For legal entity customers (corporations, LLCs, partnerships, trusts), institutions must identify and verify:

  • Each individual who owns 25% or more of the entity
  • One individual who controls the entity (regardless of ownership percentage)

This beneficial ownership requirement addresses a major vulnerability: criminals using shell companies to obscure their identities. The 25% threshold catches significant owners, while the controlling individual requirement ensures at least one natural person is identified.

Nature and Purpose of the Relationship

CDD requires institutions to understand:

  • The customer's occupation or business type
  • The expected account activity (transaction types, volumes, geographic patterns)
  • The purpose of the account (operating account, investment, payroll, etc.)

This information establishes the baseline against which future activity will be compared. Without understanding what's normal for a customer, detecting abnormal activity becomes impossible.

Risk Rating

Based on CDD information, institutions assign customers a risk rating that determines:

  • The level of ongoing monitoring applied
  • Whether enhanced due diligence is required
  • The frequency of periodic reviews

When CDD Applies

CDD applies to all customer relationships, but the depth of due diligence should be calibrated to risk. A straightforward individual savings account may require minimal additional information beyond CIP. A complex corporate customer with international operations requires much more extensive due diligence.

This risk-based approach is essential. Applying the same due diligence intensity to every customer regardless of risk creates two problems: it burdens low-risk customers unnecessarily, and it dilutes resources that should be focused on higher-risk relationships.

Learn how Zyphe's risk-based verification streamlines CDD while maintaining compliance →

What Is EDD (Enhanced Due Diligence)?

Enhanced Due Diligence (EDD) is exactly what the name suggests: due diligence that goes beyond standard requirements when circumstances indicate elevated risk. While CDD establishes baseline understanding, EDD provides deeper scrutiny for customers who pose greater potential for money laundering, terrorist financing, or other illicit activity.

When EDD Is Required

EDD is triggered by various risk factors. While some situations mandate EDD by regulation, institutions should also apply EDD whenever their risk assessment indicates elevated risk.

Regulatory EDD Triggers:

Politically Exposed Persons (PEPs) are individuals who hold or have held prominent public positions, along with their family members and close associates. PEPs present elevated corruption and bribery risk.

Correspondent Banking Relationships with other financial institutions require enhanced scrutiny due to the potential for nested access to the financial system.

Private Banking Relationships with high-net-worth individuals receive enhanced attention due to the potential for larger illicit flows.

Customers from High-Risk Jurisdictions include those from countries identified by FATF or OFAC as having weak AML controls or as being subject to sanctions.

Risk-Based EDD Triggers:

  • Unusual or complex ownership structures
  • Cash-intensive businesses (casinos, check cashers, money service businesses)
  • Businesses in high-risk industries (precious metals, real estate, art dealing)
  • Customers with adverse media coverage
  • Customers with previous suspicious activity reports

EDD Procedures

EDD involves additional information gathering and enhanced scrutiny. Specific procedures vary by institution and situation, but typically include:

Source of Wealth Verification

  • Understanding how the customer accumulated their wealth
  • Reviewing documentation supporting wealth claims (tax returns, business records, inheritance documentation)
  • Verifying consistency between claimed wealth and employment/business history

Source of Funds Verification

  • Identifying the origin of funds flowing through the account
  • Distinguishing between legitimate business proceeds, investment returns, inheritance, etc.
  • Obtaining documentation to support fund sources

Enhanced Background Research

  • Expanded adverse media searches
  • Review of litigation history and court records
  • Investigation of business relationships and associates

More Frequent Monitoring

  • Transaction review at lower thresholds
  • More frequent periodic reviews
  • Tighter scrutiny of transaction patterns

Senior Management Approval

  • Requiring senior-level approval to open or maintain the relationship
  • Periodic management review of the relationship status

EDD Documentation

EDD decisions and procedures must be documented thoroughly. This documentation should capture the risk factors that triggered EDD, what additional information was gathered, how that information was verified, the determination to open or maintain the account, and approval by appropriate personnel.

This documentation is critical for regulatory examinations. Examiners will want to see not just that EDD was performed, but that it was performed thoughtfully and consistently.

EDD Triggers Checklist

Use this checklist to determine when enhanced due diligence is warranted:

Regulatory EDD Triggers (typically mandatory)

  • Customer is a Politically Exposed Person or close associate/family member of a PEP
  • Customer is from a country subject to OFAC sanctions or FATF designation
  • Correspondent banking relationship with foreign financial institution
  • Private banking relationship with high-net-worth individual
  • Customer appears on adverse media databases for financial crime

Risk-Based EDD Triggers (institution discretion)

  • Complex or opaque ownership structure involving multiple jurisdictions
  • Cash-intensive business (casinos, check cashing, money services)
  • High-risk industry (precious metals, real estate, art dealing, cryptocurrency)
  • Unusual transaction patterns inconsistent with stated business purpose
  • Customer previously filed in a Suspicious Activity Report
  • Beneficial owner resides in high-risk jurisdiction despite entity being domestic
  • Significant unexplained changes in account activity
  • Customer reluctant to provide requested information

When any of these triggers is present, institutions should escalate from standard CDD to enhanced due diligence procedures.

Practical Examples: CIP, CDD, and EDD in Action

Understanding these distinctions is easier with concrete examples. Here's how CIP, CDD, and EDD apply to different customer scenarios:

Example 1: Individual Retail Customer

Scenario: Sarah, a 32-year-old marketing manager in Chicago, wants to open a personal checking account.

CIP procedures: The bank collects Sarah's full name, date of birth, home address, and Social Security number. She provides her driver's license, which the bank authenticates. Database verification confirms her information matches credit bureau records.

CDD procedures: The bank asks about her employment, expected deposit sources (primarily payroll), and anticipated transaction patterns (direct deposit, debit card purchases, occasional transfers). Based on this information, Sarah is assigned a low-risk rating.

EDD procedures: None required. Sarah presents no elevated risk factors.

Result: Account opened with standard monitoring. The bank will flag activity that deviates significantly from the established baseline (e.g., sudden large cash deposits inconsistent with her salary).

Example 2: Small Business Account

Scenario: Marcus operates a landscaping business in Dallas and wants to open a business checking account for his LLC.

CIP procedures: The bank collects the business name, EIN, and principal place of business. Marcus provides his personal identification as the sole owner and controller. The bank verifies the LLC's existence through state records.

CDD procedures: The bank gathers beneficial ownership information (Marcus owns 100%), understands the nature of the business (residential landscaping services), and documents expected activity patterns (customer payments by check and card, regular expenses for supplies and payroll). Marcus is asked about his customer base, geographic area of operation, and typical transaction sizes.

EDD procedures: None required. Standard small business with straightforward operations.

Result: Account opened with standard monitoring appropriate for a cash-and-check business.

Example 3: Corporate Account with PEP Involvement

Scenario: A consulting firm applies for a business account. During beneficial ownership collection, the bank discovers that one 30% owner is the spouse of a sitting member of the European Parliament.

CIP procedures: Standard identity verification for the entity and all beneficial owners.

CDD procedures: Standard information collection on the consulting business, client base, and expected transaction patterns.

EDD procedures triggered: The PEP connection requires enhanced scrutiny. The bank investigates the source of the PEP spouse's wealth and investment in the firm. It reviews adverse media for any corruption allegations. It requires senior management approval to open the account. It establishes enhanced monitoring with lower transaction thresholds and more frequent reviews.

Result: Account opened after EDD completion, with ongoing enhanced monitoring. The relationship receives annual senior management review.

Example 4: Cryptocurrency Exchange

Scenario: A startup cryptocurrency exchange applies for banking services.

CIP procedures: Standard verification of the entity and beneficial owners.

CDD procedures: Detailed understanding of the business model, customer onboarding procedures, transaction volumes, and geographic markets served.

EDD procedures triggered: The cryptocurrency industry presents elevated risk. The bank requests detailed information on the exchange's own AML/KYC procedures, examines its licensing status in relevant jurisdictions, reviews the background of all principals, and requires demonstration of adequate transaction monitoring systems.

Result: After extensive EDD, the bank may accept, decline, or accept with significant restrictions (such as limits on transaction volumes or requirements for periodic compliance attestations).

Aspect CIP CDD EDD
Primary Question Is this person who they claim? What should I expect from this customer? What additional scrutiny does this high-risk customer require?
When Applied Account opening All relationships (depth varies) Higher-risk relationships only
Mandatory? Yes, for all customers Yes, for all customers (intensity varies) Required for specific triggers; discretionary for other elevated risk
Key Information Name, DOB, address, ID number Beneficial owners, nature/purpose, expected activity Source of wealth, source of funds, enhanced background
Regulatory Source USA PATRIOT Act Section 326 FinCEN CDD Rule (2016) Various regulations + institution policy
Recordkeeping 5 years after account closure Ongoing during relationship Enhanced documentation requirements
Risk-Based? Verification depth is risk-based; requirement is universal Yes, intensity scales with risk Applied when risk assessment warrants

How CIP, CDD, and EDD Work Together

These three components don't operate in isolation. They form a continuous, interconnected process that spans the entire customer lifecycle.

At Account Opening

The process begins with CIP: verifying the customer's identity before opening the account. Simultaneously, CDD information is gathered to understand the customer's profile and assign an initial risk rating.

If CDD reveals elevated risk factors (the customer is a PEP, operates a cash-intensive business, or has complex ownership structures), EDD is triggered before or shortly after account opening.

During the Relationship

CDD isn't a one-time event. Ongoing monitoring compares actual account activity against the expected patterns established during initial CDD. When activity deviates from expectations, it triggers investigation.

Periodic reviews refresh CDD information and reassess risk ratings. A customer who was low-risk at opening may become higher-risk due to changed circumstances: new business activities, adverse media, or changed geographic exposure.

If periodic review or ongoing monitoring reveals new risk factors, EDD may be triggered even for customers who initially required only standard due diligence.

For Suspicious Activity

When monitoring identifies potentially suspicious activity, the investigation draws on all three components:

  • CIP records confirm the customer's verified identity
  • CDD information provides context for whether the activity is unusual for this customer
  • EDD documentation (if applicable) provides additional background for high-risk customers

If investigation confirms suspicion, a Suspicious Activity Report (SAR) is filed with FinCEN, drawing on information from all three sources.

Common Misconceptions

"CIP and CDD Are the Same Thing"

They're not. CIP is about identity verification, confirming the customer is who they claim. CDD is about understanding the customer: their business, expected activity, and risk profile. A customer can pass CIP (their identity is verified) while failing CDD (their business model presents unacceptable risk).

"We Only Need EDD for PEPs"

PEPs are one EDD trigger, but not the only one. Institutions should apply EDD whenever their risk assessment indicates elevated risk, regardless of whether a specific regulation mandates it. A non-PEP customer with complex ownership, a cash-intensive business, and operations in high-risk countries may require EDD just as much as a foreign official.

"EDD Means We Can't Do Business with the Customer"

EDD is enhanced scrutiny, not automatic rejection. Many high-risk customers are entirely legitimate. They simply require more information to understand and monitor effectively. The purpose of EDD is to obtain enough information to make an informed decision and enable effective monitoring, not to create barriers to account opening.

"Once CDD Is Done, We're Finished"

CDD is ongoing, not one-time. The information gathered at account opening becomes stale. Customers change jobs, start new businesses, move countries, and evolve in ways that affect their risk profile. Periodic CDD refresh is essential for effective ongoing monitoring.

"KYC Covers Everything"

KYC is an umbrella term that encompasses CIP, CDD, and EDD. But using "KYC" loosely can obscure important distinctions. When discussing procedures, policies, or regulatory requirements, precision matters. "We need to complete KYC" could mean initial identity verification, ongoing due diligence refresh, or enhanced scrutiny for a high-risk customer. These are very different activities requiring different procedures.

The Technology Advantage: Streamlining CIP, CDD, and EDD

Traditional approaches to customer verification are labor-intensive, friction-heavy, and often inconsistent. Manual document review introduces human error. Paper-based processes create delays. Siloed systems prevent information from flowing between CIP, CDD, and EDD processes.

Modern identity verification platforms address these challenges:

For CIP

  • Automated document authentication detects fraudulent documents more reliably than human review
  • Database verification confirms information against authoritative sources in real-time
  • Biometric matching prevents impersonation
  • Decentralized identity enables reusable verification, reducing friction for customers who've already verified elsewhere

For CDD

  • Digital beneficial ownership questionnaires standardize data collection
  • Integration with business registries and corporate databases automates verification
  • Risk scoring algorithms ensure consistent risk assessment
  • API-first architectures enable information flow between systems

For EDD

  • Adverse media monitoring continuously scans for new risk indicators
  • PEP database matching identifies politically exposed persons
  • Enhanced data services provide deeper background information
  • Workflow automation ensures EDD procedures are applied consistently

The Zyphe Approach

Zyphe's decentralized identity verification platform integrates CIP, CDD, and EDD workflows into a unified system. Key capabilities include:

  • Multi-source identity verification that strengthens CIP through database cross-referencing and biometric confirmation
  • Beneficial ownership tools that streamline CDD for entity customers
  • Risk-based escalation that automatically triggers EDD procedures when risk factors are identified
  • Ongoing monitoring integration that surfaces new risk indicators requiring CDD refresh or EDD application
  • Decentralized credential storage that reduces data breach exposure while maintaining compliance records

The result: stronger verification with less friction, lower costs, and more consistent compliance.

See how Zyphe transforms your customer verification workflow →

Building an Integrated Verification Framework

Effective compliance programs don't treat CIP, CDD, and EDD as separate obligations. They integrate them into a coherent framework that spans the customer lifecycle.

Policy Integration

Written policies should clearly articulate:

  • How CIP, CDD, and EDD relate to each other
  • The specific triggers for EDD
  • How information flows between processes
  • How risk ratings are assigned and updated
  • Escalation and approval requirements

Process Integration

Operational workflows should:

  • Collect CIP and initial CDD information simultaneously at account opening
  • Automatically flag EDD triggers based on CDD information
  • Feed monitoring results back into CDD for risk rating updates
  • Standardize EDD procedures while allowing for risk-specific customization

Technology Integration

Systems should:

  • Share customer data across CIP, CDD, and EDD processes
  • Automate risk-based escalation
  • Provide unified audit trails
  • Enable consistent reporting and analysis

Training Integration

Staff training should:

  • Explain the distinctions between CIP, CDD, and EDD
  • Clarify when each applies
  • Ensure consistent application across the organization
  • Address scenario-based decision-making

Conclusion

CIP, CDD, and EDD are not interchangeable. Each serves a distinct purpose in your compliance framework. CIP verifies identity. CDD establishes understanding. EDD provides enhanced scrutiny when risk warrants it.

Understanding these distinctions enables you to build a compliance program that is simultaneously more effective and more efficient: applying the right level of scrutiny to each customer rather than treating all customers identically regardless of risk.

The institutions that excel in this area share common characteristics: they have clear policies that articulate how these three components work together, they invest in technology that streamlines information collection and risk assessment, and they train their staff to understand not just the procedures but the purposes behind them.

As identity verification technology continues to advance, the opportunity to strengthen compliance while improving customer experience only grows. Decentralized identity, automated risk assessment, and integrated workflows enable verification that is faster, more accurate, and more secure than traditional approaches.

The question isn't whether to modernize your approach to CIP, CDD, and EDD. It's how quickly you can do so while maintaining regulatory compliance.

Ready to integrate your customer verification processes?Book a demo with Zyphe to see how our platform unifies CIP, CDD, and EDD into a seamless, compliant workflow.

Secure verifications for every industry

We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.