Skip to main content

Stablecoin Audit Trail Standards: SOC 2 / SOX Compliance for Onchain Settlement

What SOC 2 Type II, SOX, and ISO 27001 require for stablecoin operations, what onchain gives you for free, and how Circle, Bridge.xyz, BVNK, Bitwave, Cryptio, and Coinbase Prime compare on audit-readiness.

Written by Eco
Stablecoin Audit Trail Standards

Finance teams moving payment volume to stablecoins inherit a paradox. Every transaction is already public, immutable, and timestamped onchain. Yet that raw block-explorer history fails almost every control test auditors apply under SOC 2 Type II, SOX Section 404, or ISO 27001. The audit trail an external auditor wants is not a list of hashes. It is a reconstructable narrative tying a business event to an approver, a policy, a counterparty identity, and an unalterable record that survives employee turnover and infrastructure migrations.

This guide breaks down what regulators and auditors actually require for stablecoin operations, what onchain settlement gives you for free, what you have to build or buy on top, and how six of the major providers (Circle, Bridge.xyz, BVNK, Bitwave, Cryptio, Coinbase Prime) compare on audit-readiness today.

What audit trail requirements apply to stablecoin operations?

Three frameworks dominate stablecoin audit conversations in 2026. SOC 2 Type II evaluates whether your security, availability, and processing-integrity controls operated effectively over a 6 to 12 month window. SOX Section 404 applies to public companies and requires management to attest that internal controls over financial reporting, including those covering digital asset balances, are designed and operating effectively. ISO 27001 certifies your information security management system against Annex A controls, several of which (A.8.15 logging, A.5.33 records protection) map directly to crypto operations.

For stablecoin flows specifically, auditors want to see: who initiated each transfer, which policy approved it, what counterparty due diligence was on file at the time, complete chain-of-custody for keys, deletion-resistant retention of logs for 7 years (SOX) or 6 years (FBAR), and a reconciliation pathway from onchain balances to the GAAP or IFRS general ledger.

What does onchain settlement provide natively?

Onchain settlement gives you a meaningful head start on the technical evidence side. Every USDC, USDT, PYUSD, or USDe transfer is recorded on a public ledger with cryptographic finality, a precise block timestamp, the from-address, the to-address, the amount, the gas paid, and (after finalization) immutability that beats almost any database-backed audit log. Block explorers like Etherscan, Basescan, and Arbiscan act as a globally available source of truth that no employee can edit or delete.

That covers roughly the "system processing integrity" half of SOC 2 Common Criteria CC7 and the "completeness and accuracy" half of SOX. What it does not cover is everything tying that hash back to a business reality.

What audit trail do you need beyond the blockchain?

The gap between a block explorer and an audit-ready ledger is wider than most teams expect. You need a hot wallet address resolved to a named counterparty (KYC and KYB on file at the time of payment, plus Travel Rule data for transactions over $3,000 in the U.S. or €1,000 under MiCA). You need internal approval records showing who clicked "send", under which policy, with what justification, plus the four-eyes or multisig record of co-signers. You need offchain context such as the invoice number, the PO, the contract reference, the cost center, and the tax classification. You need deletion-proof archival logging, typically WORM (write once, read many) storage with hash-chained timestamps, retained 7 years for SOX and 6 years for FBAR. Finally you need automated reconciliation from onchain balances to the GL with documented reversal procedures for misposted entries.

Without this layer, an auditor sees a transaction and cannot tell whether it was a legitimate vendor payment, a payroll run, a treasury rebalance, or fraud. Block explorers do not speak SOX.

How do major stablecoin providers handle audit and compliance?

Provider-supplied audit tooling has matured quickly. Circle ships Mint and Circle Payments Network with a SOC 1 Type II and SOC 2 Type II report under its Circle Mint and USDC reserve attestations published monthly by Deloitte. Bridge.xyz (acquired by Stripe in October 2024) inherited Stripe's SOC 1 / SOC 2 / PCI DSS posture and exposes a transactions API with full webhook history. BVNK, a London-based stablecoin orchestration platform, holds SOC 2 Type II and ISO 27001 and exports SWIFT-style MT-103 equivalents for each settlement. Bitwave and Cryptio are dedicated crypto subledgers focused on GAAP and IFRS reconciliation, FBAR reporting, and SOX-grade exports. Coinbase Prime offers SOC 1 Type II, SOC 2 Type II, and a Prime Custody attestation with deletion-proof logging built in.

Provider audit-readiness comparison

Provider

SOC 2 Type II

SOX-ready exports

FBAR reporting

GAAP / IFRS treatment

WORM archival

Circle (Mint, CPN)

Yes (Deloitte, refreshed annually)

CSV and API; partial (no GL mapping)

Manual export, no auto-aggregation

ASC 350-60 cash-equivalent guidance for USDC

Internal; not customer-accessible

Bridge.xyz (Stripe)

Yes (inherits Stripe scope)

API + Stripe Sigma data warehouse

Not native, requires Bitwave or Cryptio

Stripe revenue-recognition layer

Stripe-managed

BVNK

Yes + ISO 27001

MT-103 equivalent, ISO 20022 export

Yes, FinCEN format

IFRS 9 fair-value reporting

Yes, 7-year retention

Bitwave

Yes

Full SOX subledger, JE export to NetSuite, QuickBooks, SAP, Oracle

Yes, automated

ASC 350-60 (US GAAP) and IFRS 9 dual reporting

Yes, S3 Object Lock

Cryptio

Yes (ISAE 3000)

SOX-ready trial balance, JE export to Xero, NetSuite, QuickBooks

Yes, FBAR and Form 8938

IFRS 9, ASC 350-60

Yes, hash-chained

Coinbase Prime

Yes (SOC 1 + SOC 2)

Prime API, Coinbase Prime Onchain reporting

Limited (custody only)

ASC 350-60

Yes, Coinbase-managed

Two structural observations matter. Issuer-level providers (Circle, Bridge, Coinbase Prime) give you strong control attestations for their service but stop at the edge of their platform. Dedicated crypto subledgers (Bitwave, Cryptio) sit on top of multiple providers and chains and produce the auditor-facing artifacts (trial balance, JE batches, reversal logs, WORM archive) that survive an external SOX walkthrough. Most production finance teams run both layers.

How should accountants reconcile onchain transactions to the GL?

The dominant pattern in 2026 is daily automated ingest of every wallet's onchain activity into a crypto subledger, classification by counterparty and transaction type, fair-value or historical-cost measurement per the team's accounting policy, and a posted journal entry to the corporate GL (NetSuite, SAP S/4HANA, Oracle Fusion, QuickBooks). Under ASC 350-60, which took effect for fiscal years beginning after December 15, 2024, stablecoins and other crypto assets held for investment are measured at fair value through net income each reporting period. USDC and USDT, because they are pegged dollar-equivalents, typically post at par with no remeasurement gain or loss, but the policy still has to be documented.

Reconciliation gaps are the most common audit finding. Auditors flag unposted transactions, manual journal entries without dual approval, and wallets that lack a documented business purpose. A monthly attestation comparing onchain wallet balances (pulled directly from RPC nodes, not from an internal database) to the subledger and the GL closes this loop.

What happens during an audit walkthrough of a stablecoin payment?

A typical SOC 2 or SOX walkthrough in 2026 follows this sequence. The auditor selects a sample of payments from the GL. Your team produces the originating business document (invoice, contract, vendor onboarding record with KYC date). You show the policy that authorized the payment threshold, the approver record from the policy engine, the cosigner record from the multisig or MPC platform, the broadcast transaction hash, the block explorer confirmation, the FX or fair-value snapshot at the time of settlement, the subledger journal entry, and the corresponding GL posting. Total artifacts requested per sampled transaction: typically 7 to 9.

Teams that pre-stage these artifacts behind a single transaction ID pass walkthrough in minutes. Teams that hunt across Etherscan tabs, Slack threads, and exported CSVs fail. The architecture question is whether to build that aggregation in-house or to pay Bitwave, Cryptio, or BVNK to do it.

How long should stablecoin audit logs be retained?

Retention requirements stack. SOX requires 7 years for records relevant to financial reporting under 17 CFR 210.2-06. The Bank Secrecy Act and FBAR rules (31 CFR 1010.430) require 5 years from the date of the report, which in practice means at least 6 years of supporting records. State money transmitter licenses in New York (NYDFS Part 200) and California (DFPI) require 5 years. MiCA Article 75 requires CASPs to retain transaction records for 5 years, extendable to 7. The defensible floor is 7 years for U.S. operations and 7 years for EU CASP-licensed operations.

The retention surface is broader than people expect. Beyond transaction hashes and journal entries you need to preserve KYC documents at the time of payment (not just the latest version), policy versions in effect on each transaction date, signing-quorum records, and any sanctions screening results returned for counterparties. Mutable databases fail SOX walkthroughs. WORM-mode S3 Object Lock, Azure Immutable Blob, or a hash-chained append-only log service is now the dominant pattern.

What are the most common stablecoin audit findings?

Across 2024 and 2025 SOC 2 and SOX engagements for crypto-active companies, four findings recur. First, wallet ownership documentation gaps: addresses that appear in the GL but have no signed acknowledgement of ownership and control. Second, unposted transactions: incoming USDC transfers from unknown counterparties that sat unreconciled for more than 30 days. Third, policy-engine drift: the policy in production no longer matches the policy referenced in management's narrative. Fourth, key-ceremony evidence gaps: hardware wallet initialization or MPC key generation performed without a recorded ceremony with named witnesses.

Each of these is preventable with workflow discipline rather than additional vendor spend. Document every wallet at creation. Auto-flag any inbound transfer that cannot be matched to an open invoice or contract within 24 hours. Version your policy engine like code and tag the version in each transaction. Record key ceremonies on video with sign-off from finance, security, and an external observer.

Methodology and sources

SOC 2 control mappings cross-referenced against AICPA Trust Services Criteria (2017, revised 2022). SOX Section 404 guidance from PCAOB AS 2201. Stablecoin accounting treatment under FASB ASU 2023-08 (ASC 350-60), effective fiscal years beginning after December 15, 2024. Provider claims verified against Circle's Transparency page, Stripe's Trust Center, BVNK's Trust Hub, Bitwave's compliance documentation, Cryptio's ISAE 3000 report summary, and Coinbase Prime's attestation library as published in Q1 2026. Travel Rule thresholds per FinCEN (U.S., $3,000) and MiCA Article 14 (EU, €1,000). FBAR retention under 31 CFR 1010.430.

Related reading

Did this answer your question?