The Handbook
Standard 6: Risk Management
the standard firms must implement comprehensive risk management this includes an enterprise wide risk management framework covering all material risks—market, credit, operational, liquidity, and technology—with appropriate measurement and monitoring methodologies firms must conduct regular stress testing and scenario analysis programs calibrated to portfolio characteristics, define risk limits with clear escalation and remediation procedures for breaches, and maintain a board approved risk appetite statement with regular review and updates introduction managing risks in digital assets requires frameworks that address both traditional financial risks and emerging threats unique to this market these specific threats include smart contract vulnerabilities, protocol failures, attacks on consensus mechanisms, custody breaches, and regulatory uncertainties that may challenge the very existence of certain digital assets traditional tools, such as value at risk (var), are often inadequate due to the extreme volatility and potential for "fat tail" market movements during periods of market stress, asset correlations frequently break down and standard liquidity assumptions often fail as liquidity can vanish across multiple trading venues simultaneously standard 6 emphasizes the implementation of comprehensive enterprise risk management (erm) this involves identifying significant risks across market, credit, operational, liquidity, and technology domains to ensure integrity, risk management functions must operate independently from investment teams, serving to challenge investment decisions rather than merely validate them quantitative risk metrics must be supplemented by qualitative assessments to capture risks that are difficult to measure numerically furthermore, fiduciaries must conduct regular stress testing using crypto specific scenarios and maintain risk limits that effectively constrain behavior when limits are breached, automatic escalation processes must be in place to address issues promptly effective risk management serves as an independent "challenge function" rather than a checkbox exercise for portfolio teams stress testing must reflect the unique market structure and potential failure modes of digital assets, supported by clear procedures for escalation when risk limits are exceeded documentation of risk related decisions should demonstrate a consistent approach to applying established frameworks fiduciaries must accept that constraining profitable opportunities is sometimes necessary when risk adjusted returns are inadequate treating risk management as a compliance formality rather than a core value protection function can lead to failures in meeting institutional standards, regardless of a firm's past performance 6 1 enterprise risk management framework enterprise risk management (erm) provides a top down, firm wide approach to identifying, assessing, and managing risk erm establishes the governance structures, policies, and processes necessary to ensure consistent risk treatment across all firm activities an effective erm program is distinguished by its independence from business pressures, a comprehensive risk taxonomy covering all material threats, and the use of quantitative metrics supplemented by qualitative judgment furthermore, it must include clear escalation procedures that activate whenever risks exceed established tolerances 6 1 1 risk governance effective risk governance is built on the "three lines of defense" model, which separates risk taking from monitoring and independent assurance first line of defense the investment team and business units bear the primary responsibility for risk taking and day to day management portfolio managers make decisions within set limits, operations teams execute transactions according to approved procedures, and business development stays within strategic boundaries while the first line "owns" the risk, it requires independent oversight to prevent conflicts between performance incentives and sound risk management second line of defense the risk management function provides independent oversight and acts as a challenge to the first line key responsibilities include developing risk frameworks and policies, calculating risk metrics, and monitoring limits the second line is responsible for challenging investment decisions when the risk reward profile appears inadequate, escalating breaches, and reporting the firm's risk status to senior management and the board independence is critical; the risk function must never report to the individuals whose activities it is required to monitor third line of defense internal audit provides independent assurance that the risk framework is functioning effectively audit reviews verify whether policies reflect actual practice, if limits are monitored and breaches addressed, and if reporting provides an accurate picture of firm risk it also assesses the effectiveness of control testing findings from the third line are reported directly to the board's audit committee, independent of management the chief risk officer (cro) firms should maintain a dedicated chief risk officer (cro) who is independent of the investment team and reports directly to the ceo or the board the cro's authority includes approving risk policies and limits challenging investment decisions that exceed risk tolerances halting activities that create unacceptable levels of risk escalating material risk issues directly to the board to preserve this independence, the termination of a cro should require board notification or approval management’s unilateral ability to remove a cro eliminates the necessary independence required when risk management priorities challenge business growth ambitions 6 1 2 risk appetite statement a risk appetite statement is a board approved document that defines the specific types and amounts of risk a firm is willing to accept in pursuit of its objectives to be effective, this statement must translate high level qualitative goals into quantitative limits that allow for objective measurement and continuous monitoring generic phrases such as "appropriate risk management" or "prudent risk taking" fail to provide the operational guidance required for fiduciary grade management the statement must explicitly address the following five areas market risk tolerance establishment of specific numerical limits to enable objective compliance verification this includes defining maximum portfolio volatility, drawdown limits, value at risk (var) thresholds, and concentration limits categorized by position and sector credit risk tolerance definition of counterparty exposure limits based on creditworthiness this includes setting boundaries for aggregate exchange exposure, unsecured lending limits, and specifying acceptable collateral types along with their required haircuts liquidity risk tolerance requirements for maintaining minimum liquidity reserves and limiting the concentration of illiquid positions the statement must also define required redemption capacity under various stress scenarios and acceptable time horizons for position liquidation operational risk tolerance specifications regarding the acceptable frequency and severity of operational losses it must establish standards for the control environment, define recovery time objectives (rtos) for business continuity, and set a tolerance level for cybersecurity incidents technology risk tolerance criteria for interacting with smart contracts and specific security requirements for protocols this also includes establishing minimum system uptime standards and defining the firm’s disaster recovery capabilities takeaway message a risk appetite statement provides value only when translated into specific, measurable limits qualitative statements like “low appetite for counterparty risk” enable any exposure to be rationalized as acceptable effective risk governance requires numerical limits that create clear boundaries and trigger defined escalation procedures when approached or breached best practice is establishing a limit framework that cascades from board approved risk appetite to specific position, counterparty, and concentration limits with defined monitoring frequency and breach response procedures the framework should be calibrated so limits occasionally bind during normal operations—if no limit is ever approached, they may be set too loosely to provide meaningful constraint 6 2 digital asset risk taxonomy a risk taxonomy provides a structured framework for identifying and categorizing all material risks a comprehensive digital asset taxonomy must address traditional financial risks alongside crypto specific threats the completeness of this taxonomy determines whether risk management captures all material exposures or focuses too narrowly on easily quantified market risks while neglecting operational and technology threats that could cause significantly larger losses table 1 risk taxonomy true 182,479 left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type takeaway message risk frameworks often fail when traditional taxonomies are applied without crypto specific extensions market and credit risk models designed for traditional assets may miss smart contract vulnerabilities, protocol governance risks, oracle manipulation, bridge exploits, and mev extraction a comprehensive risk taxonomy must address both traditional financial risks and threats unique to digital assets best practice is developing a taxonomy that explicitly includes digital asset specific risk categories smart contract/protocol risk, custody/key management risk, blockchain/network risk, and counterparty risks specific to crypto infrastructure (exchanges, stablecoins, defi protocols) each category should have defined identification, measurement, and monitoring approaches appropriate to its characteristics 6 3 risk measurement and quantification risk measurement translates qualitative assessments into quantitative metrics, enabling objective monitoring and the enforcement of limits this quantification allows fiduciaries to compare potential impacts across diverse risks, track trends over time, and make informed trade offs between risk and return however, over reliance on these metrics can create false precision; many critical risks resist quantification and require qualitative judgment to supplement numerical analysis 6 3 1 market risk metrics no single metric can capture all dimensions of market risk; comprehensive measurement requires multiple complementary approaches to quantify potential losses from adverse price movements value at risk (var) var is a statistical measure of potential loss over a defined period at a specific confidence level (e g , a daily 95% var of $1m indicates 95% confidence that daily losses will not exceed $1m) while var provides a single summary number, it has limitations it assumes normal distributions (understating tail risk), uses historical data that may not predict the future, and provides no information on loss severity beyond the threshold digital asset var requires short lookback periods to capture current volatility, the inclusion of stress periods, and supplementation with scenario analysis stress testing this involves simulations to assess portfolio impact under extreme but plausible scenarios crypto specific stress scenarios should include major exchange failures, regulatory crackdowns, stablecoin collapses cascading through defi, consensus attacks, or correlated liquidation cascades stress testing identifies vulnerabilities missed by statistical measures, such as exchange concentration or correlation breakdowns under pressure scenario analysis a forward looking exercise assessing the impact of specific hypothetical events scenarios should consider historical precedents, systemic market vulnerabilities, regulatory shifts, and technology failure modes these must be updated quarterly to reflect evolving threats concentration metrics fiduciaries must track position, sector, liquidity, counterparty, and protocol concentration tools like the herfindahl index should be used to quantify diversification specific concentration limits are necessary to prevent a portfolio from being dominated by a single exposure 6 3 2 other risk metrics beyond market risk, firms must implement key risk indicators (kris) to provide early warning signals across all material risk categories credit risk kris monitoring exchange exposure versus limits, counterparty credit ratings, margin utilization, collateral coverage ratios, and days to liquidate counterparty exposures liquidity risk kris tracking days to liquidate the portfolio, redemption capacity under stress, diversity of funding sources, and stablecoin concentration operational risk kris measuring the frequency of failed trades, reconciliation breaks, unauthorized transaction attempts, key person dependencies, and audit findings technology risk kris monitoring system uptime, cybersecurity incidents, vulnerability scan results, patch management status, and protocol audit age takeaway message common mistakes in risk management include overreliance on a single metric like var while var offers useful summary data, it has notable limitations in digital asset markets it assumes returns follow a normal distribution, which understates tail risk it also relies on historical data that may not predict future risks and provides no insight into potential losses beyond the var threshold investment managers should request a comprehensive set of risk metrics, including calculation methods, stress testing scenarios and results, correlation assumptions, and analysis of risk under stress conditions relying solely on var without incorporating stress tests, scenario analysis, and concentration metrics can lead to inadequate risk assessment during due diligence, a key question is to review the worst daily loss in the past year and determine if risk metrics predicted that loss if not, it indicates a need to improve risk measurement practices proper risk assessment involves a thorough understanding of potential losses and the limitations of the metrics used, ensuring a more robust approach to digital asset risk management 6 4 risk monitoring and reporting risk monitoring tracks exposures over time to identify trends, breaches, and emerging threats effective monitoring relies on real time data feeds for immediate breach detection, automated alerting to prevent oversight, and visualization dashboards for pattern recognition risk reporting communicates this status to decision makers to enable informed responses; its value depends on clarity and actionability comprehensive reports that bury key messages in excessive detail are ineffective, regardless of their technical sophistication 6 4 1 risk dashboard the risk dashboard provides a daily or weekly overview of critical exposures and is distributed to the cio, ceo, and risk committee to support fiduciary responsibilities, the dashboard must remain concise, focused, and easy to interpret the primary goal is to facilitate proactive risk management through timely, relevant information market risk summary portfolio value at risk (var), stress test results, and position concentration it also tracks largest exposures and volatility trends compared to historical ranges and established limits credit risk summary counterparty exposure by entity and concentration metrics this includes monitoring credit quality distribution, margin utilization, and "near limit" situations liquidity assessment an overview of the portfolio liquidity profile and days required to liquidate positions it also monitors redemption capacity, cash reserves, and funding source stability limit breaches a record of all current limit violations, including the magnitude and duration of the breach it must document the remediation timeline and the specific party responsible for resolution key risk indicators (kris) trends across operational, technology, and regulatory risk categories thresholds requiring immediate management attention must be clearly highlighted 6 4 2 risk committee the risk committee provides board level oversight of the firm’s enterprise risk management program meeting at least quarterly, the committee reviews risk appetite compliance, limit breach remediation, stress testing results, and emerging threats the committee must include independent directors with risk management expertise and a chief risk officer (cro) who presents assessments independently of management the committee must hold the authority to escalate material concerns directly to the full board 6 5 risk mitigation and controls risk mitigation reduces exposure through internal controls, risk transfer to third parties, or the elimination of high risk activities control effectiveness determines whether risks stay within tolerances or result in actual losses while insurance or contracts can shift financial burdens, they do not eliminate the firm's ultimate responsibility for risk management 6 5 1 internal controls internal controls are the policies and systems designed to mitigate risk within daily operations segregation of duties separating trade execution, settlement, and custody functions this prevents a single individual from initiating and completing transactions without independent verification access controls restricting access to systems and data based on "need to know" principles controls include multi factor authentication (mfa), regular access reviews, and privileged access monitoring reconciliation daily reconciliation of cash and positions across all sources any discrepancies must be investigated immediately by a function separate from operations authorization hierarchies defined approval requirements based on the materiality of a transaction all authorizations must include documented business rationales, and overrides are prohibited without formal escalation monitoring and alerts systems that provide real time notification when key metrics hit threshold levels formal escalation procedures must be in place for critical alerts 6 5 2 risk transfer risk transfer involves shifting the financial burden of potential losses to third parties this does not, however, replace the firm's duty to manage those risks proactively insurance standard policies for crime (fraud/theft), cyber security, d\&o (governance failures), and e\&o (professional liability) fiduciaries should seek digital asset specific policies for custody losses, smart contract failures, or exchange insolvencies contractual protections negotiating indemnifications from service providers, liability limitations, and insurance requirements for counterparties this may also include parent company guarantees hedging utilizing derivatives to reduce market risk exposure common strategies include basis risk hedging, tail risk protection through options, and correlation hedges allocator due diligence considerations institutional allocators evaluate risk management through framework comprehensiveness, measurement rigor, and control effectiveness inability to demonstrate systematic risk identification, produce real time monitoring dashboards, or explain limit breach procedures reveals inadequate enterprise risk management risk framework and governance walk through your risk management framework how do you systematically identify emerging risks in digital assets? who is your cro and what is their background? can i see your risk appetite statement? provide risk committee charter and redacted minutes from recent meeting showing discussion depth and decisions how frequently do you update comprehensive risk assessments? risk measurement and monitoring what specific risk metrics do you track across market, credit, operational, liquidity, and technology risk categories? how do you adapt traditional metrics like var for cryptocurrency characteristics? walk through your scenario analysis and stress testing approach show recent stress testing results show your actual risk monitoring dashboard currently in production use what do you monitor in real time versus daily? what are your current actual risk levels across key metrics? risk controls and mitigation what are your primary risk control mechanisms? how do you implement position and portfolio limits operationally? describe a recent significant risk event and your response what is your single largest risk exposure currently and why is it acceptable? how do you manage concentration risks systematically? what insurance do you maintain and what does it cover? provide copy of insurance policies documentary evidence requirements complete erm framework document and risk appetite statement risk committee charter and meeting minutes for past 6 12 months current daily, weekly, and monthly risk reports sample risk monitoring dashboard showing real time metrics recent stress testing results with scenario descriptions incident logs documenting events and responses limit breach documentation with approvals and remediation control testing documentation and results common pitfalls and remediation risk function lacks independence risk management reports to the cio or investment team, compromising ability to challenge positions or escalate concerns risk becomes advisory rather than authoritative remediation establish cro reporting to ceo or board with direct board access risk function should have authority to enforce limits without investment team approval independence is demonstrated through documented instances of challenge—if risk never disagrees with the portfolio, it's not functioning independently limit breaches tolerated without consequence limits exist on paper but breaches are routinely accepted, extended, or explained away limits that don't bind provide no risk control remediation implement automated breach detection with immediate escalation require written approval with rationale and remediation timeline for any extension track all breaches and resolutions—patterns of repeated breach and extend indicate limits set incorrectly or culture that doesn't respect boundaries stress testing uses generic scenarios stress tests apply traditional market drawdowns (20 30%) when crypto routinely experiences 50%+ declines, or miss crypto specific events entirely results provide false comfort remediation develop scenario library reflecting digital asset realities major exchange failure, stablecoin depegging, regulatory enforcement action, protocol exploit, and correlated liquidation cascades scenarios should be severe enough to reveal vulnerabilities risk measurement relies solely on var value at risk as the primary metric understates tail risk in fat tailed crypto return distributions var tells you little about what happens in the scenarios that matter most remediation supplement var with scenario analysis, maximum drawdown analysis, liquidity stress testing, and concentration metrics report multiple measures—no single metric captures digital asset risk adequately risk reporting obscures rather than clarifies 50 page daily reports bury critical information in detail decision makers can't quickly identify what requires attention remediation implement tiered reporting one page executive dashboard highlighting limit utilization, concentration, stress results, and items requiring action—with detailed supporting analysis available separately if a board member can't assess risk posture in five minutes, reporting needs simplification risk committee provides no meaningful oversight committee reviews reports and approves recommendations without substantive discussion minutes show unanimous approval with no recorded debate remediation include independent members with risk expertise cro should present directly, not through cio minutes must document questions raised, concerns discussed, and rationale for decisions a committee that never challenges management isn't governing risk controls documented but untested limits, escalation procedures, and risk responses exist in policy but haven't been validated operationally assumptions about how controls work may not hold under stress remediation test key controls periodically—verify limit monitoring catches breaches, escalation procedures reach the right people, and response protocols work as designed present testing results to risk or audit committee counterparty exposure fragmented and unmonitored exposure to exchanges, lenders, and protocols tracked separately or not at all aggregate counterparty concentration unknown until failure reveals it remediation centralize counterparty exposure reporting across all venues and instruments implement concentration limits by counterparty conduct periodic credit quality assessment—particularly for exposures that have grown material through market movements losses occur without post mortem analysis loss events and near misses aren't systematically analyzed for lessons same failures repeat because root causes aren't identified or addressed remediation require formal post incident review for material losses and significant near misses document what happened, why controls didn't prevent it, and specific remediation actions track remediation to completion—the value is in changes made, not reports written key controls and documentation true 145,202 42741935483872,170 51625178655897,143 05632885860237 left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type