Multi-chapter guide | Key features of anti-money laundering software

Key features of effective PEP screening tools

Table of Contents

Managing politically exposed person (PEP) risk has shifted from a one-time onboarding check to an ongoing requirement. A customer’s status can change quickly (e.g., election, appointment, or emerging close associations), and manual screening is often slow, inconsistent, and difficult to scale.

PEP screening tools help teams manage this risk by automating checks against frequently updated datasets and routing potential matches into review workflows. These tools can reduce false positives, support risk-based escalation (including enhanced due diligence), and maintain an audit-ready record of decisions.

This article outlines the key features to look for in effective PEP screening tools and explains why each feature matters from a compliance and operational perspective. It focuses on practical capabilities, ongoing monitoring, risk profile updates, PEP classification, relationship context, false-positive reduction, onboarding integration, and auditability, with examples of how teams apply them in real workflows.

Summary of key PEP screening tool features

Desired Feature

Description

Ongoing monitoring and updated risk profiles

Continuous monitoring using frequently updated data from reputable official, commercial and international sources to keep client risk profiles updated

Classification of PEPs

Automated classification of PEP to assist in assessing risk profiles

Relationships and associate mapping

Identifies and links to relatives and close associates with primary PEP, discovering risks in complex networks

False positive reduction

Uses improved matching logic, contextual data, and risk scoring to reduce unnecessary matches

Automated integration during KYC (onboarding)

Integrates screening into onboarding via API/SDK and events (e.g., webhooks) to support real-time decision-making without adding friction

Audit trails

Maintaining regulatory-grade, time-stamped audit information, capturing available data, active settings, actions taken, and analyst rationale, in line with record-keeping requirements

The industry’s leading AI-powered AML screening solution
  • Get a comprehensive view of your users and comply with AML/CTF requirements

  • Screen against thousands of sanctions and watchlists including OFAC, UN, HMT, EU, DFAT

  • Scan a database of 8+ million adverse media profiles with negative media attention

Ongoing monitoring and updated risk profiles

Customers’ risk profiles constantly evolve, requiring continuous monitoring to ensure that financial institutions maintain up-to-date risk profiles for each customer and to identify new exposures—such as changes in PEP status, sanctions, or adverse media—as soon as they occur.

As shown in the figure below, ongoing monitoring relies on broad screening coverage, so teams can detect new risk signals as they emerge.

Example of coverage provided by Veriff, offering global real-time PEP, sanctions, and adverse media coverage with continuous updates across jurisdictions. (source)

Example of coverage provided by Veriff, offering global real-time PEP, sanctions, and adverse media coverage with continuous updates across jurisdictions. (source)

Modern PEP screening tools conduct daily automated scans against global watchlists, sanctions databases, and other risk factors rather than relying on static data during onboarding checks. When a change is detected, an instant alert is generated, and the customer’s account is frozen until the compliance team reviews the alert. If a true match is detected, the action is carried out per the financial institution’s policy. 

Some financial institutions may have a very low risk appetite, so they might offboard the customer if detected as a PEP. Other institutions might keep the relationship with the customer but update the customer’s risk profile; for example, a customer might be low or medium risk before but then become high risk, so the customer is kept under enhanced ongoing monitoring for future transactions. 

Immediate enhanced due diligence is carried out (such as verifying the client’s source of funds, wealth, and income) and second-level approval is obtained from senior management based on the financial institution’s policy. This aligns with a risk-based approach without waiting for periodic reviews to be manually performed or for batch reports to be uploaded, and it reduces manual errors while still requiring human oversight and control

For example, if a client starts a new position in a public office, the screening tool flags this change and freezes the account, preventing the client from making further transactions without manual approval from the compliance team. This real-time action ensures that financial institutions act instantly on emerging risks rather than waiting until the client has made many transactions without triggering an alert. 

Ongoing monitoring should account for individuals who are no longer in a prominent public function by applying a policy-defined post-tenure period, often 12 to 18 months or longer (depending on the role), during which the institution continues risk assessment and applies enhanced due diligence where necessary.

In essence, ongoing monitoring shifts compliance from manual, delayed, periodic reviews to automated, instant, and integrated reviews, allowing the compliance team to focus on judgment and mitigating risk rather than endless data chasing.​

Classification of PEPs

Since risk levels across all PEPs are not the same, if a low-level official is treated the same way as a senior foreign minister, that defeats the purpose of a risk-based approach. A comprehensive screening tool should not only identify PEPs but also classify, contextualize, and structure the risk profile to enable risk-based decision-making.

The output of each screening should not just return a result like “PEP match found” but also provide an actionable classification so the compliance team can determine the appropriate level of due diligence. That said, automated classification supports risk assessment but does not replace institutional judgment. Final risk decisions must always follow internal policy and be properly documented.

The following image illustrates the two primary methods of classifying politically exposed persons for risk assessment: geographical and relationship-based categories, both of which are necessary for a comprehensive, risk-based approach and will be explained next.

The two primary methods for classifying PEPs

The two primary methods for classifying PEPs

Geographical classification

In this classification method, tools should classify the PEPs into:

  • Domestic PEPs
  • Foreign PEPs 
  • International organization PEPs 

This classification should be clearly displayed within the alert interface and directly linked to the individual’s public function. Modern solutions embed structured PEP classification into screening output, enabling institutions to make informed, risk-based decisions within a single workflow rather than relying on fragmented alerts across multiple systems.

All PEPs require enhanced due diligence (EDD) under FATF standards, applied proportionally based on individual risk levels and institutional risk appetite. By classifying geographical exposure, the tool enables institutions to apply appropriate controls based on the individual’s risk profile and the institution’s risk appetite. For example:

  • Foreign PEP: An individual who holds or has held a prominent public function in a foreign country. EDD should be conducted.
  • Domestic PEP: An individual who holds or has held a prominent public function within the country where the institution is located. Simplified EDD (e.g., transaction monitoring focus) is generally applied.
  • International organization PEP: An individual who holds or has held a prominent position in an international organization (e.g., UN, World Bank). Jurisdiction-specific EDD review is typically required.

Relationship-based classification

Screening tools should also identify individuals based on their relationships, as people in the PEP’s network may hold some authority or act on behalf of the PEP, such as serving as nominee shareholders in a company for a PEP. These tools should classify PEPs based on their relationships as follows:

  • Primary PEPs
  • Family members 
  • Close associates 

This classification is important. Relatives and close associates (RCAs) are subject to similar enhanced due diligence obligations under most AML frameworks.  A close associate may not hold a position in public office, but can still pose similar corruption, bribery, or money laundering risks indirectly.

Identity verification and screening tools should present data in an automated, clear format, with clear classifications that allow the compliance team to take action in line with institutional policies and escalation protocols. Instead of just sending an alert like “PEP match found,” the system should classify the type of PEP (domestic, foreign, or international), the level of PEP (role in public function), and the relationship type, along with the source of the data and an accessible link to the source. This structured output helps the compliance team understand the context of the generated alert and, if further authentication is required, verify the information source and take action immediately. 

Automated classification using screening tools minimizes subjectivity in initial match review, ensuring consistent application of the institution’s risk-based approach. However, final material judgment remains with the compliance team during risk assessment and decision-making.

​Correct PEP classification transforms a scattered compliance exercise into a structured risk assessment, maintaining operational efficiency while meeting regulatory expectations.

Veriff’s Identity Fraud Report: Latest fraud trends & AI attack techniques

Relationship and associate mapping

Relationship and associate mapping is a critical capability that moves beyond simply classifying a primary PEP and their relatives or close associates (RCAs). A comprehensive screening tool should actively identify and map the entire network of linked parties, allowing institutions to transform compliance from individual screening to network screening. This capability is essential for assessing indirect risk exposure, detecting underlying influence, and uncovering potential proxy ownership schemes that are not immediately visible.

The mapping capability automatically detects and displays connections between a primary PEP and associated individuals. It focuses on the actual risk that often lies within the surrounding network, which may act on behalf of the PEP. The tool provides a visual and data-driven insight into the nature of these relationships, helping the compliance team understand the broader, complex exposure of the primary PEP’s network.

PEP screening tools must also draw on multiple sources, such as official government and regulatory PEP lists, sanction databases, reputable commercial data sources, and adverse media datasets. A combination of multiple sources enhances the relationship context if available. Instead of simply marking the “associated” tag on the individual, these tools are expected to provide insight into the nature of the relationship with the primary PEP. The system must also visually map the connection path between the individual and the primary PEP.

Another practical benefit of relationship mapping is the identification of nominee shareholders, who may appear as formal owners of the company while acting on behalf of PEPs. On paper, everything might look clean, but the actual control of the company might be elsewhere.

The mapping tool helps the compliance team detect indirect ownership or influence, and allows them to immediately reassess the company’s beneficiaries and escalate enhanced due diligence.

False positive reduction

A core desired feature of modern PEP screening tools for compliance teams is the ability to significantly reduce false positives without missing true matches. To reduce false positives, these screening tools should implement a layered, fuzzy-logic approach rather than relying solely on name. These tools are expected to compare the obtained data during onboarding—including full name, date of birth, and geographic indicators—against reputable sources. Comparing this data with available information from sources can enable these tools to perform contextual analysis, accurately identifying and classifying false positives or true matches.

The number of false positives can be minimized but not absolutely eliminated. Some AML screening solutions bundle PEP screening with sanctions, watchlist checks, and adverse media screening. When these risk indicators are combined with stronger identifiers (e.g., date of birth, nationality) and configurable match thresholds, teams can reduce same-name noise and be able to route fewer low-quality alerts to manual review.

Screening tools are supposed to allow settings to adjust the threshold of a match to reduce false positives. However, if these thresholds are set too strictly, actual PEPs or sanctioned individuals may slip through. It is better to spend extra time than to be sorry about not doing so, as regulators care far more about missed true matches than they do about an analyst reviewing extra alerts. 

Threshold changes should be governed by documented approvals, periodic testing, and clear records of configuration changes to ensure that they remain aligned with the institution’s risk appetite and regulatory expectations. Accordingly, screening is expected to be a balance between sensitivity and precision. Automation can filter alerts and provide the source alongside them to save time, but it cannot be relied on entirely without human judgment.

Automated integration during KYC (onboarding)

Customer screening and onboarding should occur simultaneously and be embedded directly into the onboarding flow without creating operational bottlenecks. Ideally, screening should take place during the onboarding process and be integrated with know-your-customer (KYC) and know-your-business (KYB) tools to ensure that it occurs in real time within the same system that performs identity verification.

Institutions that use two separate tools for verification and screening may face a data gap. Screening tools rely on data from identity verification tools. Data submitted via the API is sent from the verification tool to the screening tool in plain text. The lack of photos or other identity documents, along with the IP-based geographic location, makes it harder for these tools to accurately check potential matches and compare them with available information. This results in an increase in the number of false positives for the compliance team to check manually. In the event of an alert, the compliance team must check the customer’s information in identity verification tools to authenticate, which can delay decision-making. From an operational standpoint, if the customer’s data is not verified and they are waiting, it can be problematic for the business.

Modern Identity verification tools help solve this problem by combining identity verification and screening within a single ecosystem. These identity verification tools may offer multiple screening options to suit the needs of financial institutions. The process runs seamlessly within the onboarding flow without requiring compliance teams to switch between various platforms. When screening is embedded inside the KYC platform, the verification data and screening result remain centralized. While integration may improve operational efficiency, institutions must maintain clear segregation of duties and ensure compliance oversight rather than relying entirely on automated approval.

An end-to-end onboarding workflow integrating identity verification with real-time AML and PEP screening (source)

An end-to-end onboarding workflow integrating identity verification with real-time AML and PEP screening (source)

Veriff’s workflow demonstrates how verified identity data is automatically transmitted to the matching engine, enabling real-time screening and continuous monitoring within the same onboarding session. Screening relies on verified information obtained during verification rather than manually typing the data in screening tools, which improves accuracy and reduces false positives. It also allows the compliance team to make faster decisions without sacrificing risk controls.

Audit trails

An effective AML program requires complete transparency into every action taken throughout the customer relationship, which is ensured by the audit trail. In practice, this requires a detailed, time-stamped log that captures what was observed by the analyst, what actions were taken, and the rationale for those actions. 

Modern screening tools should also record identifiers like the analyst’s IP address to create a defensible record that shows how, when, why, and by whom decisions are made.

Auditability is easier when the screening solution exposes results and monitoring events via API and webhooks, so screening outcomes and status changes can be captured in internal case management systems as part of an evidence trail.

When the screening tool flags a potential PEP match and an analyst decides whether it is a false positive or a true match, the system should log the event. This log should include identifiers such as the analyst’s IP address, the timestamp, the analyst’s email ID or any other dedicated ID, and the changes made (e.g., potential match to false positive).

The logs are required to be easily accessible through the admin dashboard and are expected to also be exported for audit or regulatory review. Institutions must ensure that audit records remain accessible and retrievable in accordance with applicable recordkeeping and retention requirements.

Veriff’s Fraud Index Report: Insights from 2,000 consumers

Conclusion

PEP screening is not just a one-time onboarding check; it is an ongoing compliance requirement that evolves as the customer’s relationship grows. An Individual with a low-risk profile can suddenly become a high-risk PEP or a close associate of a primary PEP, which requires classification and immediate screening and review before the next transaction. 

Modern screening tools are expected to support these requirements by enabling automated classification, ongoing detection, reduced false positives, and the maintenance of an audit trail.

PEP screening tools are most effective when they combine strong matching and explainability with ongoing monitoring, workflow triage, and audit-ready reporting. When these capabilities are integrated into onboarding and wider compliance processes, teams can reduce false positives, respond faster to risk changes, and document decisions consistently. 

Navigate Chapters:

Subscribe for insights

CTA form illustration