

Allowlist and Denylist
Overview
Stay ahead of risk with Signzy
Explore tools that help you onboard, monitor, and verify with confidence
Identity Verification
Use facial match and liveness checks paired with government ID verification to validate users while onboarding.
Transaction Monitoring
Monitor transactions in real-time and analyse past behaviour to identify suspicious activities and ensure regulatory compliance across the user journey.
AML Screening
Screen users against Politically Exposed Persons (PEP), watchlists, sanctions lists, adverse media, and more through one-time screening and advanced monitoring.
Related Terms
FAQ
When is an allowlist appropriate?
For verified partners or systems where repeated false positives occur and broader fixes are pending. Entries should be scoped narrowly and time limited.
How to avoid stale entries?
Require expiries, periodic reviews, and owner accountability. Report usage and outcomes to governance committees.
What belongs on a denylist?
Confirmed fraudsters, compromised devices, and clear policy violations. Avoid adding weak signals that could cause unfair blocks.
Can lists replace rules or models?
No. They are overrides. Maintain primary controls and use lists sparingly with strong monitoring and audit trails.