Secure verifications for every industry
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.

In the world of regulatory compliance, few areas generate as much confusion as the relationship between CIP, CDD, and EDD. These three acronyms (Customer Identification Program, Customer Due Diligence, and Enhanced Due Diligence) are often used interchangeably, treated as synonyms, or simply lumped together under the umbrella of "Know Your Customer (KYC)."
But they're not the same thing. Each serves a distinct purpose in your anti-money laundering (AML) program, requires different procedures, and applies to different situations. Understanding these distinctions isn't academic. It's essential for building a compliance program that actually works.
Failure to properly distinguish between these requirements leads to real problems: over-verification that frustrates low-risk customers, under-verification that exposes the institution to regulatory action, and compliance programs that are simultaneously too burdensome and not effective enough.
This guide clarifies the differences between CIP, CDD, and EDD, explains when each applies, and shows how they work together to create a comprehensive customer verification framework.
Before diving into the details, here's the essential distinction:
CIP (Customer Identification Program) answers the question: "Is this customer who they claim to be?" It's about verifying identity at account opening.
CDD (Customer Due Diligence) answers the question: "What should I expect from this customer?" It's about understanding the customer's profile to enable effective monitoring.
EDD (Enhanced Due Diligence) answers the question: "What additional information do I need about this higher-risk customer?" It's about applying deeper scrutiny when standard due diligence reveals elevated risk.
Think of it as a progression: CIP confirms identity, CDD establishes baseline expectations, and EDD provides additional scrutiny when circumstances warrant it.
Now let's examine each in detail.
The Customer Identification Program (CIP) is a regulatory requirement established under Section 326 of the USA PATRIOT Act. It mandates that financial institutions verify the identity of customers opening accounts.
What information must be collected:
When it applies:
How verification occurs:
What records must be kept:
CIP serves a singular, critical function: confirming that the person or entity opening an account is who they claim to be. It's the gateway to the customer relationship. Without verified identity, all subsequent compliance activities lose their foundation.
CIP is mandatory. Every customer opening an account must go through CIP procedures. There's no risk-based exception that allows institutions to skip identity verification for "low-risk" customers. The depth of verification may vary based on risk, but the requirement to verify identity applies universally.
CIP tells you who the customer is. It does not tell you:
That's where CDD comes in.
Customer Due Diligence (CDD) extends beyond identity verification to develop an understanding of who the customer is, what they do, and what their expected account activity should look like. While CIP confirms identity, CDD establishes the context needed for effective ongoing monitoring.
In 2016, FinCEN issued the Customer Due Diligence Requirements for Financial Institutions rule, which formalized CDD requirements and established four core elements. Understanding these four pillars is essential for compliance.
The first pillar addresses identifying and verifying customer identity. This overlaps significantly with CIP: financial institutions must collect and verify the same core identifying information (name, date of birth, address, and identification number) using documentary and non-documentary methods.
The second pillar focuses on beneficial ownership. For legal entity customers, institutions must identify each individual who owns 25% or more of the equity interests, along with at least one individual who has significant responsibility for controlling or managing the entity, regardless of ownership percentage. This requirement addresses shell company abuse and ensures at least one natural person is accountable for the entity's activities.
The third pillar requires institutions to understand the nature and purpose of customer relationships. This means developing a "customer risk profile" that enables the institution to understand what normal and expected transactions look like for this particular customer, identify transactions that would be unusual, and form a reasonable belief about the legitimacy of the relationship. This information gathering goes beyond simple identity verification and establishes the baseline for ongoing monitoring.
The fourth pillar mandates ongoing monitoring. CDD isn't complete at account opening. Institutions must monitor for suspicious activity on a risk-based schedule, update customer information when triggered by events or periodic reviews, and re-evaluate customer risk ratings as circumstances change.
These four pillars work together. Verified identity enables accurate risk profiling, which enables effective ongoing monitoring, which may trigger re-verification or enhanced due diligence.
Not all customers require the same level of scrutiny. CDD operates on a tiered basis, with the level of due diligence calibrated to the customer's risk profile.
Simplified Due Diligence (SDD) applies to the lowest-risk customers where the money laundering and terrorist financing risk is minimal. SDD may involve reduced identity verification requirements, less detailed information gathering about business purpose, and streamlined ongoing monitoring. Government bodies, publicly traded companies on regulated exchanges, regulated financial institutions, and pension funds typically qualify for SDD treatment.
It's important to note that SDD is not the same as "no due diligence." Institutions must still verify identity and be alert to red flags. SDD simply allows for a lighter touch when risk is demonstrably low.
Standard CDD is the baseline level of due diligence applied to most customers. It includes full CIP procedures for identity verification, beneficial ownership identification for entities, understanding the nature and purpose of the relationship, and ongoing monitoring appropriate to the customer's risk level. Most retail and commercial customers fall into this category.
Enhanced Due Diligence (EDD) applies to higher-risk customers who present elevated money laundering or terrorist financing risk. EDD involves all standard CDD elements plus additional scrutiny, which we detail in the EDD section below.
The key principle is that resources should be allocated based on risk. Applying EDD to all customers wastes resources on low-risk relationships while potentially diluting focus on genuinely high-risk customers.
Beneficial Ownership Identification
For legal entity customers (corporations, LLCs, partnerships, trusts), institutions must identify and verify:
This beneficial ownership requirement addresses a major vulnerability: criminals using shell companies to obscure their identities. The 25% threshold catches significant owners, while the controlling individual requirement ensures at least one natural person is identified.
Nature and Purpose of the Relationship
CDD requires institutions to understand:
This information establishes the baseline against which future activity will be compared. Without understanding what's normal for a customer, detecting abnormal activity becomes impossible.
Risk Rating
Based on CDD information, institutions assign customers a risk rating that determines:
CDD applies to all customer relationships, but the depth of due diligence should be calibrated to risk. A straightforward individual savings account may require minimal additional information beyond CIP. A complex corporate customer with international operations requires much more extensive due diligence.
This risk-based approach is essential. Applying the same due diligence intensity to every customer regardless of risk creates two problems: it burdens low-risk customers unnecessarily, and it dilutes resources that should be focused on higher-risk relationships.
Learn how Zyphe's risk-based verification streamlines CDD while maintaining compliance →
Enhanced Due Diligence (EDD) is exactly what the name suggests: due diligence that goes beyond standard requirements when circumstances indicate elevated risk. While CDD establishes baseline understanding, EDD provides deeper scrutiny for customers who pose greater potential for money laundering, terrorist financing, or other illicit activity.
EDD is triggered by various risk factors. While some situations mandate EDD by regulation, institutions should also apply EDD whenever their risk assessment indicates elevated risk.
Regulatory EDD Triggers:
Politically Exposed Persons (PEPs) are individuals who hold or have held prominent public positions, along with their family members and close associates. PEPs present elevated corruption and bribery risk.
Correspondent Banking Relationships with other financial institutions require enhanced scrutiny due to the potential for nested access to the financial system.
Private Banking Relationships with high-net-worth individuals receive enhanced attention due to the potential for larger illicit flows.
Customers from High-Risk Jurisdictions include those from countries identified by FATF or OFAC as having weak AML controls or as being subject to sanctions.
Risk-Based EDD Triggers:
EDD involves additional information gathering and enhanced scrutiny. Specific procedures vary by institution and situation, but typically include:
Source of Wealth Verification
Source of Funds Verification
Enhanced Background Research
More Frequent Monitoring
Senior Management Approval
EDD decisions and procedures must be documented thoroughly. This documentation should capture the risk factors that triggered EDD, what additional information was gathered, how that information was verified, the determination to open or maintain the account, and approval by appropriate personnel.
This documentation is critical for regulatory examinations. Examiners will want to see not just that EDD was performed, but that it was performed thoughtfully and consistently.
Use this checklist to determine when enhanced due diligence is warranted:
Regulatory EDD Triggers (typically mandatory)
Risk-Based EDD Triggers (institution discretion)
When any of these triggers is present, institutions should escalate from standard CDD to enhanced due diligence procedures.
Understanding these distinctions is easier with concrete examples. Here's how CIP, CDD, and EDD apply to different customer scenarios:
Scenario: Sarah, a 32-year-old marketing manager in Chicago, wants to open a personal checking account.
CIP procedures: The bank collects Sarah's full name, date of birth, home address, and Social Security number. She provides her driver's license, which the bank authenticates. Database verification confirms her information matches credit bureau records.
CDD procedures: The bank asks about her employment, expected deposit sources (primarily payroll), and anticipated transaction patterns (direct deposit, debit card purchases, occasional transfers). Based on this information, Sarah is assigned a low-risk rating.
EDD procedures: None required. Sarah presents no elevated risk factors.
Result: Account opened with standard monitoring. The bank will flag activity that deviates significantly from the established baseline (e.g., sudden large cash deposits inconsistent with her salary).
Scenario: Marcus operates a landscaping business in Dallas and wants to open a business checking account for his LLC.
CIP procedures: The bank collects the business name, EIN, and principal place of business. Marcus provides his personal identification as the sole owner and controller. The bank verifies the LLC's existence through state records.
CDD procedures: The bank gathers beneficial ownership information (Marcus owns 100%), understands the nature of the business (residential landscaping services), and documents expected activity patterns (customer payments by check and card, regular expenses for supplies and payroll). Marcus is asked about his customer base, geographic area of operation, and typical transaction sizes.
EDD procedures: None required. Standard small business with straightforward operations.
Result: Account opened with standard monitoring appropriate for a cash-and-check business.
Scenario: A consulting firm applies for a business account. During beneficial ownership collection, the bank discovers that one 30% owner is the spouse of a sitting member of the European Parliament.
CIP procedures: Standard identity verification for the entity and all beneficial owners.
CDD procedures: Standard information collection on the consulting business, client base, and expected transaction patterns.
EDD procedures triggered: The PEP connection requires enhanced scrutiny. The bank investigates the source of the PEP spouse's wealth and investment in the firm. It reviews adverse media for any corruption allegations. It requires senior management approval to open the account. It establishes enhanced monitoring with lower transaction thresholds and more frequent reviews.
Result: Account opened after EDD completion, with ongoing enhanced monitoring. The relationship receives annual senior management review.
Scenario: A startup cryptocurrency exchange applies for banking services.
CIP procedures: Standard verification of the entity and beneficial owners.
CDD procedures: Detailed understanding of the business model, customer onboarding procedures, transaction volumes, and geographic markets served.
EDD procedures triggered: The cryptocurrency industry presents elevated risk. The bank requests detailed information on the exchange's own AML/KYC procedures, examines its licensing status in relevant jurisdictions, reviews the background of all principals, and requires demonstration of adequate transaction monitoring systems.
Result: After extensive EDD, the bank may accept, decline, or accept with significant restrictions (such as limits on transaction volumes or requirements for periodic compliance attestations).
These three components don't operate in isolation. They form a continuous, interconnected process that spans the entire customer lifecycle.
The process begins with CIP: verifying the customer's identity before opening the account. Simultaneously, CDD information is gathered to understand the customer's profile and assign an initial risk rating.
If CDD reveals elevated risk factors (the customer is a PEP, operates a cash-intensive business, or has complex ownership structures), EDD is triggered before or shortly after account opening.
CDD isn't a one-time event. Ongoing monitoring compares actual account activity against the expected patterns established during initial CDD. When activity deviates from expectations, it triggers investigation.
Periodic reviews refresh CDD information and reassess risk ratings. A customer who was low-risk at opening may become higher-risk due to changed circumstances: new business activities, adverse media, or changed geographic exposure.
If periodic review or ongoing monitoring reveals new risk factors, EDD may be triggered even for customers who initially required only standard due diligence.
When monitoring identifies potentially suspicious activity, the investigation draws on all three components:
If investigation confirms suspicion, a Suspicious Activity Report (SAR) is filed with FinCEN, drawing on information from all three sources.
They're not. CIP is about identity verification, confirming the customer is who they claim. CDD is about understanding the customer: their business, expected activity, and risk profile. A customer can pass CIP (their identity is verified) while failing CDD (their business model presents unacceptable risk).
PEPs are one EDD trigger, but not the only one. Institutions should apply EDD whenever their risk assessment indicates elevated risk, regardless of whether a specific regulation mandates it. A non-PEP customer with complex ownership, a cash-intensive business, and operations in high-risk countries may require EDD just as much as a foreign official.
EDD is enhanced scrutiny, not automatic rejection. Many high-risk customers are entirely legitimate. They simply require more information to understand and monitor effectively. The purpose of EDD is to obtain enough information to make an informed decision and enable effective monitoring, not to create barriers to account opening.
CDD is ongoing, not one-time. The information gathered at account opening becomes stale. Customers change jobs, start new businesses, move countries, and evolve in ways that affect their risk profile. Periodic CDD refresh is essential for effective ongoing monitoring.
KYC is an umbrella term that encompasses CIP, CDD, and EDD. But using "KYC" loosely can obscure important distinctions. When discussing procedures, policies, or regulatory requirements, precision matters. "We need to complete KYC" could mean initial identity verification, ongoing due diligence refresh, or enhanced scrutiny for a high-risk customer. These are very different activities requiring different procedures.
Traditional approaches to customer verification are labor-intensive, friction-heavy, and often inconsistent. Manual document review introduces human error. Paper-based processes create delays. Siloed systems prevent information from flowing between CIP, CDD, and EDD processes.
Modern identity verification platforms address these challenges:
Zyphe's decentralized identity verification platform integrates CIP, CDD, and EDD workflows into a unified system. Key capabilities include:
The result: stronger verification with less friction, lower costs, and more consistent compliance.
See how Zyphe transforms your customer verification workflow →
Effective compliance programs don't treat CIP, CDD, and EDD as separate obligations. They integrate them into a coherent framework that spans the customer lifecycle.
Written policies should clearly articulate:
Operational workflows should:
Systems should:
Staff training should:
CIP, CDD, and EDD are not interchangeable. Each serves a distinct purpose in your compliance framework. CIP verifies identity. CDD establishes understanding. EDD provides enhanced scrutiny when risk warrants it.
Understanding these distinctions enables you to build a compliance program that is simultaneously more effective and more efficient: applying the right level of scrutiny to each customer rather than treating all customers identically regardless of risk.
The institutions that excel in this area share common characteristics: they have clear policies that articulate how these three components work together, they invest in technology that streamlines information collection and risk assessment, and they train their staff to understand not just the procedures but the purposes behind them.
As identity verification technology continues to advance, the opportunity to strengthen compliance while improving customer experience only grows. Decentralized identity, automated risk assessment, and integrated workflows enable verification that is faster, more accurate, and more secure than traditional approaches.
The question isn't whether to modernize your approach to CIP, CDD, and EDD. It's how quickly you can do so while maintaining regulatory compliance.
Ready to integrate your customer verification processes?Book a demo with Zyphe to see how our platform unifies CIP, CDD, and EDD into a seamless, compliant workflow.
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.