Step 1 of 2
Run a Free Risk Check
Tell us who you want to research. We’ll ask for your details in the next step.
When a regulator or auditor asks you to justify a decision, your report is your defence. Here's what a professional-grade due diligence report must include.
Regulators now expect due diligence reports that can be independently verified, step-by-step, without requiring further explanation or context. A report that cannot demonstrate how conclusions were reached, or lacks timestamped evidence of screening, is treated as procedurally deficient—triggering penalties, extended scrutiny, and mandatory remediation programs.
The Financial Action Task Force (FATF) Mutual Evaluation process systematically tests whether institutions can produce contemporaneous, auditable records of KYC/KYB screening. OFAC enforcement actions routinely cite “failure to maintain adequate due diligence documentation” as a primary violation, even when the underlying screening was technically performed. The European Union’s 5th Anti-Money Laundering Directive (5AMLD) requires explicit documentation of beneficial ownership verification methods and data sources, with member state supervisors increasingly demanding sample reports during on-site inspections.
Recent enforcement trends reveal the scale of exposure. A 2023 OFAC settlement involved a $4.2 million penalty for a financial institution that conducted sanctions screening but failed to log query parameters, data source versions, or timestamps—making it impossible to prove the screening was current at the time of transaction. A UK Financial Conduct Authority (FCA) enforcement action in 2024 centered on a firm’s inability to reproduce risk scores during audit, leading to a finding of “inadequate risk assessment controls” and a two-year enhanced monitoring requirement.
Auditors now operate from a presumption of insufficiency: if the methodology, data provenance, or decision logic is not explicitly documented in the report itself, it is treated as absent. The cost of retrofitting compliance—re-running historical screenings, reconstructing UBO maps, and rebuilding audit trails—can exceed the cost of performing audit-ready due diligence from the outset by a factor of 10 or more.
The threshold question for compliance officers, legal teams, and risk managers is no longer “Did we screen this entity?” but “Can we prove, to a regulator’s standard, exactly how we screened this entity, when, and with what result?” The answer lies in the structural integrity of the due diligence report itself.
Case 1: OFAC Settlement—Missing Query Parameters and Timestamps. A mid-sized financial services firm conducted sanctions screening using a reputable third-party vendor but failed to log the exact query parameters, data source version, or as-of date for each screening. During an OFAC audit, the firm could not prove that screening was current at the time of transaction. OFAC assessed a $4.2 million penalty for “failure to maintain adequate records” under 31 CFR 501.603, despite the firm’s assertion that all transactions had been screened. The settlement agreement required the firm to implement timestamped audit trails and reproduce two years of historical screenings at an estimated cost of $1.8 million.
Case 2: FCA Enforcement—Opaque Risk Scoring Methodology. A UK investment firm used a proprietary risk scoring model to assess counterparties but did not disclose the weighting scheme, data sources, or remediation impact in its due diligence reports. During an FCA inspection, auditors could not reproduce the risk scores for a sample of 10 cases. The FCA issued a finding of “inadequate risk assessment controls” and imposed a two-year enhanced monitoring requirement, with mandatory external audit of all risk reports. The firm’s remediation costs—including methodology documentation, re-scoring of 3,500 historical cases, and external audit fees—exceeded $2.5 million.
Case 3: EU Supervisor—Unverifiable UBO Claims. A payments institution operating across the EU identified beneficial owners for its corporate clients but did not document the verification method or confidence level. During a national supervisor inspection (under 5AMLD), the institution could not demonstrate whether UBO claims were based on corporate registry extracts, third-party data, or client declarations. The supervisor concluded that the institution had not “taken adequate measures to verify beneficial ownership” and issued a formal warning with a six-month deadline to re-verify and re-document all UBOs. The institution’s compliance team spent 4,500 hours re-performing UBO due diligence, at an internal cost of approximately $900,000.
External auditors and internal audit functions now operate from a standardized playbook when evaluating due diligence reports. The core test: Can this report be independently verified without access to internal systems or personnel?
What Auditors Look For:
Current Market Practice (Where Most Reports Fall Short):
The gap between auditor expectations and current practice creates systemic exposure. Firms that rely on legacy due diligence workflows—manual research, vendor portals without automated logging, or internal systems that do not preserve query provenance—are structurally unable to produce audit-ready reports without significant manual remediation.
Diligard reports are designed to satisfy regulatory and audit expectations at the moment of generation, not through post-hoc remediation. Every report includes:
This architecture eliminates the need for post-hoc documentation, reduces audit preparation time by 80–90%, and ensures that every report can withstand regulatory scrutiny without further explanation. For compliance officers preparing for legal and compliance intelligence, M&A due diligence, or vendor and partner onboarding, the Diligard standard represents the minimum defensible threshold.
An audit-ready due diligence report must survive independent regulatory scrutiny without supplemental explanation. Any missing structural element renders the entire file defensible only through post-hoc reconstruction—a position no compliance officer or legal team can afford during a live audit.
The seven non-negotiable pillars are:
Legal name, all known aliases, incorporation jurisdiction, registration numbers (e.g., EIN, VAT, Companies House number), and key identifiers (LEI, DUNS). Ambiguous entity identification collapses the entire screening process; a regulator cannot verify sanctions hits or UBO chains if the entity itself is not precisely defined.
Live feed timestamps for each database (OFAC SDN, EU Consolidated List, UN Sanctions, UK HM Treasury, PEP databases, adverse media), exact query parameters logged, and full matching records attached or referenced with unique identifiers. A screening result without an as-of date cannot demonstrate compliance with FATF Recommendation 10 (“KYC measures must be kept up-to-date”).
Ownership chain from entity to ultimate beneficial owner (natural person or controlling entity), confidence level (High/Medium/Low) based on corroboration method (on-chain verification, corporate registry extract, cross-corroborated public records), and conflict resolution logic if sources disagree. EU 5AMLD and FATF Recommendation 24 require beneficial ownership to be identified and verified; auditors expect to see the method and corroboration behind each UBO claim.
Explicit weighting scheme (e.g., “Sanctions match: +50 points; PEP affiliation: +15 points; High-risk jurisdiction: +10 points”), severity and likelihood mapping, residual risk after remediation, and worked example so an auditor can reproduce the score for 5–10 sample cases. Unexplained risk scores are treated as subjective judgments, which undermines the credibility of the entire due diligence process.
Data sources (vendors, refresh cadence, coverage gaps), screening rules (fuzzy matching threshold, de-duplication logic, alias handling), heuristic rules and decision trees, and known limitations (e.g., “UBO mapping relies on publicly available corporate registries; if beneficial owner is obscured by offshore structures, confidence level is noted and further due diligence may be required”). Auditors verify rigor by checking whether the methodology is consistent and defensible across all cases.
Generation timestamp (ISO 8601 format), data currency marker (as-of date for each screening feed), immutable log of each processing step (entry timestamp, action type, user ID, outcome), and version control for methodology changes. A report without as-of dates cannot demonstrate that screening was contemporaneous, which can invalidate the entire due diligence file during a sanctions audit.
Alignment statement with FATF, OFAC, EU/UK/US KYC/KYB requirements, explicit disclosure of data gaps or uncertainties, remediation evidence (resolved red flags, responsible parties, deadlines), and supporting artifacts (screenshots, export files, source documents) attached or referenced. Regulators expect to see exactly how due diligence is performed so they can assess whether the process is rigorous and consistent.
A single missing element—an undated screening result, an unexplained risk score, or an opaque UBO claim—can trigger a regulatory finding of “failure to implement adequate due diligence controls.” The cost is not hypothetical: OFAC, EU sanctions authorities, and financial supervisors routinely issue penalties for due diligence gaps, even when the underlying business relationship was legitimate. Audit-ready reports eliminate this exposure by embedding defensibility from the moment they are generated.
Diligard’s reports are architected around these seven pillars, with automated timestamping, immutable audit trails, and transparent UBO confidence scoring built into every legal and compliance intelligence workflow.
Audit-ready reports begin with entity identification that eliminates ambiguity across every global database, corporate registry, and sanctions list an auditor will cross-reference. A single misidentified entity name invalidates every downstream screening result—and turns your due diligence file into a liability.
Capture every legal name, trade name, DBA, and known alias. Regulators expect you to screen the entity as it appears in sanctions lists, adverse media, and corporate filings—not just the name your counterparty provided.
FATF Recommendation 10 requires “identifying the customer and verifying that customer’s identity.” Auditors verify this by reproducing your entity search across sanctions feeds. If you only searched the primary legal name and missed a known alias, you have a gap.
Unique identifiers anchor entity resolution. Without them, auditors cannot independently verify that your screening targeted the correct entity.
Sanctions screening systems match on name and identifiers. A regulator will compare your screening log against official OFAC or EU lists. If you cannot show that you verified incorporation number or LEI, you cannot prove you screened the correct entity.
Jurisdiction defines which corporate registry holds authoritative records and which sanctions lists apply. High-risk jurisdictions (FATF grey/blacklists, offshore secrecy havens) trigger enhanced due diligence requirements.
FATF Recommendation 10 requires risk-based customer due diligence. Auditors check whether you applied enhanced measures to entities in high-risk jurisdictions. If your report does not document jurisdiction risk, you have no audit trail for your risk rating.
When data sources conflict or entity details are incomplete, document how you resolved ambiguity. Auditors expect to see your decision logic—not just the final answer.
Auditors test reproducibility. If two analysts running the same query reach different conclusions about entity identity, your process is not defensible. Documented reconciliation rules close this gap.
Diligard reports capture entity details with zero ambiguity:
See how Diligard automates entity resolution for M&A due diligence, vendor screening, and legal compliance intelligence.
A verifiable screening result must include exact query parameters, live feed timestamps, and lossless provenance from raw data to final hit-or-miss determination. Without these elements, an auditor cannot independently reproduce your screening—rendering the entire due diligence file indefensible.
Every screening result must document the currency of the underlying data. FATF Recommendation 10 requires KYC measures to be “kept up-to-date,” which auditors verify by checking when data was last refreshed.
Audit-ready timestamp structure:
A report that shows only the generation date—without as-of dates for each data source—cannot prove the screening was contemporaneous. This gap can invalidate the entire due diligence file during a sanctions audit.
Auditors and regulators expect to see the precise search logic used for each entity. OFAC guidance and FATF standards require institutions to demonstrate they ran appropriate screening against official lists.
Required query documentation:
If a regulator requests proof of screening, you must be able to reproduce the query on the same data snapshot. Without logged parameters, you cannot demonstrate compliance—even if the outcome was correct.
Each screening category requires explicit source citation and result detail. Generic statements like “no sanctions match” are insufficient; auditors need to verify which lists were checked and how matches were handled.
Sanctions Screening:
PEP Screening:
Adverse Media Screening:
Source attribution ensures an auditor can verify the screening result by consulting the same database snapshot. It also prevents disputes over data quality or coverage gaps.
A defensible screening result requires an unbroken chain from query submission to final determination. This provenance chain is the backbone of audit readiness.
Provenance elements:
Diligard’s platform automates this provenance chain, logging every query, result, and decision with immutable timestamps and user attribution. The result is a screening trail that can be reproduced by an auditor without relying on manual notes or memory.
Audit-ready reports document not only the initial screening but also the plan for ongoing monitoring. Regulators expect entities to be re-screened at defined intervals or when material events occur.
Re-screening schedule:
Document the cadence and trigger rules in the methodology disclosure. During an audit, regulators will verify that re-screening actually occurred per the stated policy.
Auditors scrutinize negative results as closely as positive hits. A report that simply states “no match found” without documenting which databases were searched is insufficient.
Audit-ready no-match documentation:
This level of detail allows an auditor to independently verify that the screening was comprehensive and current—removing any ambiguity about coverage or data currency.
A screening result without timestamps, query parameters, or source attribution cannot be independently verified. This opacity is treated as a control failure by regulators, even if the underlying screening was performed correctly.
Regulatory consequences:
For organizations conducting M&A due diligence, vendor onboarding, or legal compliance reviews, verifiable screening results are non-negotiable. A single undated or unsourced screening verdict can invalidate months of due diligence work.
Diligard’s platform is designed to deliver audit-ready screening results by default. Every query is logged with exact parameters, data source snapshots are timestamped and versioned, and results are traced back to primary feeds with lossless provenance. The system automatically generates a screening summary that includes:
This structure ensures that compliance teams, auditors, and regulators can independently verify every screening result—eliminating the risk of unexplained or undocumented verdicts. For executives overseeing executive due diligence or risk managers conducting investor screening, Diligard’s source-of-truth architecture delivers the defensibility required to satisfy the highest audit standards.
Beneficial ownership must be traced to natural persons or controlling entities with explicit confidence levels and corroboration sources, or the report cannot withstand audit scrutiny. Auditors and regulators demand proof that you identified the ultimate beneficial owner through a documented, verifiable method—not inference or assumption.
Ownership Chain Documentation: Present a clear trace from the entity through all intermediate holding companies, trusts, or nominee arrangements to the ultimate beneficial owner. Use visual diagrams or narrative descriptions that show each layer of control. The chain must identify both direct (equity stakes) and indirect (voting rights, control agreements) ownership links.
Confidence Level Assignment: Every UBO identification must carry an explicit confidence rating tied to verification strength:
Source Attribution and Extract Dates: Cite the specific registry or verification method with timestamp. Example: “UK Companies House PSC Register, extract dated 2025-01-10, confirming John Smith holds 75% voting rights and qualifies as UBO under Companies Act 2006.” If using blockchain verification, include transaction hash and block timestamp.
Conflict Resolution Protocol: When sources disagree on beneficial ownership, document the reconciliation logic. Identify which source was prioritized, why (e.g., official registry trumps media reports; recent data supersedes stale records), and what steps were taken to resolve the conflict. Attach supporting artifacts: registry screenshots, cross-reference tables, or third-party verification reports.
Obfuscation Pattern Identification: Flag structures that complicate UBO identification:
For each obfuscation pattern, document the remediation steps: beneficial ownership questionnaires sent to the entity, follow-up corporate registry searches, third-party investigative reports commissioned, or escalation to legal counsel. If UBO cannot be verified to high confidence, state the limitation explicitly and recommend enhanced due diligence or transaction rejection.
FATF Recommendation 24 and EU 5AMLD Compliance: Regulators require that beneficial ownership be identified and verified. Auditors verify by checking the method and corroboration behind each UBO claim. A statement like “UBO: John Smith” without source attribution or confidence level is insufficient and will trigger audit findings.
Natural Person vs. Controlling Entity: If the UBO is a natural person, capture full name, date of birth, nationality, residential address (jurisdiction), and any PEP or sanctions flags. If the UBO is a controlling entity (e.g., a trust or foundation), identify the natural persons who exercise ultimate control (settlor, trustee, protector) and apply the same verification standards.
Traceability to Primary Records: Attach or reference the underlying evidence: corporate registry extract PDFs, blockchain explorer links, certified beneficial ownership declarations, or third-party verification reports. Assign each artifact a unique identifier (e.g., “UBO_Evidence_001”) and log it in the audit trail.
UBO mapping is not static. Document the date of verification and the cadence for refresh (e.g., annual re-verification, or upon material corporate events such as mergers, equity issuances, or change-of-control transactions). Log every UBO update with timestamp, user ID, and reason for change (e.g., “UBO updated per new Companies House filing dated 2025-01-15”).
Auditors will test reproducibility by selecting sample cases and verifying the ownership chain against the sources you cited. If the trail is broken—missing extract dates, unexplained conflicts, or gaps in intermediate ownership layers—the entire UBO mapping is deemed unreliable.
Inability to demonstrate beneficial ownership leads to incomplete KYC, regulatory censure, mandatory remediation programs, and potential delisting for publicly traded entities. In M&A or investor due diligence, opaque UBO structures can kill deals or trigger material adverse change clauses. For vendor and partner due diligence, failure to identify true control exposes your organization to sanctions violations, fraud, or corruption facilitated by hidden beneficial owners.
Diligard traces beneficial ownership across 190+ corporate registries, cross-references against sanctions and PEP databases, and assigns explicit confidence levels tied to source strength. Every ownership link is timestamped, sourced to primary records, and logged in an immutable audit trail. Obfuscation patterns—offshore layering, nominee directors, trust structures—are automatically flagged for enhanced review, with remediation workflows triggered in real time. The result: UBO mapping that is regulator-defensible from the moment it is generated, with full traceability for auditors and compliance teams.
For complex ownership structures in M&A due diligence, family office risk management, or supply chain ESG risk assessments, Diligard’s protocol ensures no blind spots in beneficial ownership transparency.