Stablecoin Treasury Operations: Custody, Keys, and Multisig
Stablecoin treasury requires decisions traditional treasury doesn't: custody model, key architecture, hot/cold tiering, insurance, and segregation of duties.
Stablecoin treasury requires custody, key management, and security decisions that traditional treasury doesn't. Self-custody vs custodial, multi-sig vs MPC, hot/cold tiering, and operator segregation of duties.
Traditional treasury management involves banks, counterparty credit risk, and interest rate decisions. Stablecoin treasury involves all of those plus a category of risk that does not exist in fiat: key risk. If you lose access to the private key controlling your stablecoin wallet — whether through loss, theft, or operational failure — the assets are permanently and irrecoverably gone. No bank to call. No account recovery. No regulator who can help.
This asymmetry makes stablecoin treasury a distinct operational discipline, not just a variant of existing treasury practice. The custody model, key architecture, tiering structure, and insurance framework must be designed before any stablecoin is held — not after the first loss event.
The Custody Decision
The first decision is whether to self-custody or use a qualified custodian. There is no universally correct answer; the right choice depends on your scale, internal security capability, and operational requirements.
Qualified custody (Coinbase Prime, Anchorage Digital, BitGo, Copper) means a regulated entity holds the keys on your behalf. The custodian is responsible for key security, operational uptime, and regulatory compliance. Your exposure is custodian insolvency or operational failure — the same counterparty risk you take with a bank.
Qualified custody is appropriate for:
- Operating businesses without dedicated security engineering
- Regulatory environments where custody-grade standards are required
- Multi-chain exposure where maintaining separate key infrastructure per chain is impractical
- Balances below $2–5M where the fixed cost of self-custody infrastructure does not pencil out
Self-custody means your organisation controls the private keys. The security, operational continuity, and key management burden falls entirely on your team.
Self-custody is appropriate for:
- Organisations above $10M in stablecoin treasury with dedicated security staff
- Use cases where qualified custodians do not support the specific chain or token
- Philosophical or operational preference for not having a single-point custodian risk
- DeFi-native operations requiring direct on-chain interaction
Hybrid custody — a common middle path — uses a qualified custodian for operational/hot balances and self-custody for long-term strategic reserves. This limits custodian exposure to the operational float while maintaining control over the strategic position.
Key Architecture: Multi-Sig vs MPC
If you self-custody any portion of your stablecoin holdings, you need a key architecture that prevents single-point failure — both against external attackers and against internal errors.
Multi-signature (multi-sig) is an on-chain mechanism where a transaction requires M-of-N signatures from specified wallet addresses. A 3-of-5 multi-sig requires any three of five designated signers to approve a transaction. If two signers are unavailable (illness, departure, travel), the remaining three can still operate. If two keys are compromised, the attacker still cannot transact.
Multi-sig characteristics:
- Natively on-chain and transparent — the M-of-N requirement is visible on the blockchain
- Chain-specific — an Ethereum multi-sig (e.g., Gnosis Safe) does not work on Solana or Tron
- Well-understood security model with a long track record
- Coordination overhead for multi-party approval flows
MPC (multi-party computation) splits a single private key into shares using cryptographic techniques. No single share is a valid key. Transaction signing happens on the shares without ever assembling the full key. Common implementations: Fireblocks, Copper, ZenGo.
MPC characteristics:
- Chain-agnostic — the same MPC architecture works across Ethereum, Solana, Tron, and others
- The full private key is never assembled, reducing attack surface
- More complex mathematics; quality depends heavily on vendor implementation
- Easier UX for transaction approval flows — no on-chain coordination required
For most multi-chain operator deployments, MPC from a vendor like Fireblocks provides the better operational tradeoff. For single-chain or Ethereum-heavy deployments, Gnosis Safe (multi-sig) has the longest track record and broadest ecosystem support.
Hot / Warm / Cold Tiering
Regardless of custody model, stablecoin treasury should be tiered by access speed and exposure limit:
Hot wallet — 1–3 days of expected outflow
- Software wallet or custodial exchange balance
- Immediate access for payment operations
- Smallest balance; if compromised, limited exposure
- Refilled from warm storage as needed
Warm storage — 7–30 days of expected outflow
- Multi-sig or MPC wallet with 2-of-3 key architecture
- Accessible within hours via quorum approval
- Controlled internal transfer into hot wallet
Cold storage — strategic reserve
- Hardware wallets (Ledger, Trezor) or HSMs (Thales, nShield) with 3-of-5 key architecture
- Physical access required for at least one key factor
- Transfer to warm requires multi-person sign-off and documented approval
- Refills warm on a scheduled or threshold-triggered basis
The daily treasury operation: execute payments from hot wallet, refill hot from warm as needed, refill warm from cold on a scheduled basis. The maximum loss scenario is the hot wallet balance plus any unsettled settlement float — which is why hot wallet limits matter.
The “Signer Hit by a Bus” Problem
The most underestimated operational risk in multi-sig treasury is key availability — specifically, what happens when a keyholder is unavailable during an urgent treasury operation.
Scenarios that create availability risk:
- A keyholder departs the company and the key is on their personal device
- A keyholder is travelling without access to their hardware key
- A keyholder becomes incapacitated unexpectedly
- A keyholder’s device fails at the same time as another is on leave
Standard answers to each:
Key backup: Every private key must have a physically secured backup — either a hardware seed phrase stored in a bank-grade safe or a Shamir’s Secret Sharing split where the seed is divided into shares, no individual share is sufficient to reconstruct the key, and shares are stored in separate physical locations. The backup procedure must be documented and tested.
Quorum sizing: A 3-of-5 threshold means the treasury can operate with any three keyholders and can survive the simultaneous loss of any two. A 2-of-3 threshold is common for warm storage but provides less redundancy. Size thresholds to your actual team availability, not the theoretical maximum.
Key custodian protocol: When a keyholder departs, the key associated with their wallet address must be rotated out of the multi-sig and a new key added before the transition is complete. This is commonly skipped and creates a situation where a departed employee’s key is still a required signer.
Recovery procedure documentation: The procedure for recovering treasury access if multiple keyholders are simultaneously unavailable must be documented, signed by legal counsel, stored securely, and tested annually.
Insurance
Three categories of coverage apply to stablecoin custody:
Crime / specie insurance: Covers loss from external theft — hacking, physical theft, social engineering. Lloyd’s of London syndicates (Arch, Atrium, Coalition) are the primary market. Premiums typically run 0.5–1.5% of insured value annually, with high deductibles ($250K+) and sublimits that vary by loss category. Coverage is subject to security controls attestation — the insurer will require evidence of your key architecture, access controls, and operational security.
Custodian-held insurance: Most qualified custodians carry crime insurance on custodied assets as part of their service. Coinbase Custody advertises $320M+ in coverage. BitGo carries $250M. These figures are aggregate across all clients — not per-client. Understand the per-client sublimit in the custodian’s policy, which is not always publicly disclosed.
What insurance does not cover: Smart contract bugs or protocol exploits in DeFi protocols you interact with. Key loss by your organisation (insurers exclude owner negligence). Regulatory seizure. Losses from authorised transactions where you were deceived into authorising a transfer. Read the exclusions before assuming coverage.
Segregation of Duties
Treasury operations require the same segregation of duties as fiat treasury — ideally more, given the irreversibility of on-chain transactions.
Minimum segregation framework:
- Transaction initiation (creating and submitting a transaction for approval) must be separate from transaction approval (signing the transaction as a keyholder)
- No single person should have the ability to initiate AND approve a treasury transfer unilaterally
- High-value transfers (above a defined threshold, e.g., $100K) require two approvers rather than one
- Outgoing transfer instructions must reference an approved counterparty list — ad hoc transfers to new wallet addresses require additional approval
- All treasury transfers are logged with: initiator, approvers, transaction hash, timestamp, and business purpose
The common failure mode: a small team where the CFO or CEO holds a key and approves their own-initiated transfers. This eliminates segregation entirely and is the most frequent vector for internal fraud and social-engineering attacks.
At the technical level, Fireblocks, Gnosis Safe, and most enterprise MPC platforms support policy engines that encode these segregation rules on-chain or at the platform level — requiring multi-party approval before a transaction is submitted to the blockchain. Configure these before you start holding material balances.
Issuer selection should anchor on reserve quality — see Stablecoin Reserve Report Due Diligence for the operator’s reading framework before committing to a specific stablecoin in your treasury programme. The stablecoin on/off-ramp operations guide covers the economics of moving funds in and out of the stablecoin layer. The settlement loop anatomy covers how treasury custody fits into the end-to-end payment flow. Treasury design is the control layer that sits under both — get it right before the volumes that make it matter arrive.
Subscribers get the PSP Selection RFP Kit — 60+ structured questions, evaluation scorecard, and negotiation playbook — delivered to your inbox instantly.