
How to Get a PSP Licence Without Wasting Months
- Nurlan Mamedov
- Feb 11
- 6 min read
The fastest way to lose a payments business is to treat licensing as a paperwork exercise. A PSP licence is a regulatory operating model that has to survive scrutiny from day one - governance, AML, safeguarding, outsourcing, IT resilience, complaint handling, and real people accountable for outcomes. If you build it backwards (brand first, controls later), you will burn time, run out of runway, and struggle to bank.
This is a practical route-to-market playbook for founders and operators asking how to get PSP licence approval without avoidable rework.
First, be precise: what “PSP licence” do you actually need?
“PSP” is used loosely in the market. Regulators do not licence business models; they authorise specific regulated activities. Your first job is to map what you want to do to a permission set and then prove you can do it safely.
In Europe, the typical paths sit under PSD2 (and local implementations) and may include payment initiation, account information services, money remittance, acquiring, issuing payment instruments, and operating payment accounts. Some models fit within an EMI (electronic money institution) licence rather than a pure payments authorisation, particularly where you issue e-money and need to hold client balances.
The trade-off is straightforward. Narrow permissions can be faster and cheaper but may limit product and revenue. Broader permissions improve commercial flexibility but increase governance burden, capital expectations, and regulator questions about operational maturity.
Choose the jurisdiction like an operator, not a tourist
If your plan is to serve EU clients, jurisdiction selection is not about the cheapest incorporation or the friendliest marketing pitch. It is about where you can credibly demonstrate substance, recruit the right controlled function holders, and maintain ongoing compliance without building a fragile, outsourced shell.
A regulator will look for the same fundamentals everywhere: fitness and propriety of owners and management, clear control over outsourcing, credible safeguarding, and demonstrable risk management. Where jurisdictions differ is in process speed, documentary expectations, supervisory approach, and the practicality of staffing and banking.
Ask three commercial questions early.
First, where will your real decision-making sit? If all key decisions are offshore while the licence is onshore, expect uncomfortable “mind and management” questions.
Second, what is your banking plan? Safeguarding accounts, operational accounts, and scheme access planning (where relevant) are not add-ons. Many teams discover too late that the licensing timeline is not the critical path - banking is.
Third, how quickly do you need to go live? If time-to-market is the priority, you may consider acquiring a ready-made regulated vehicle rather than building from scratch, provided due diligence confirms clean history, appropriate permissions, and a regulator-comfortable change-of-control pathway.
How to get PSP licence: the build sequence that works
A strong application is a coherent story: what you do, how money moves, who is accountable, what controls exist, and how you will detect and stop abuse. The mistake is producing documents that look complete but do not match operational reality.
1) Define the regulated flow and write it down properly
Start with your end-to-end customer journeys and funds flows. Be literal: who pays whom, when funds are received, where they sit, how they are reconciled, when they are safeguarded, and when they leave your control.
This becomes the spine of your programme. It informs safeguarding, AML risk assessment, fraud controls, chargeback handling (if acquiring), complaints, and reporting. If your diagrams are vague, your questions from the regulator will be specific.
2) Put governance in place that a supervisor can trust
Regulators back people, not pitch decks. You need a governance structure with clear responsibilities, credible experience, and enough independence to challenge revenue pressure.
Expect scrutiny of directors and senior management, including checks on competence and integrity, time commitment, conflicts of interest, and whether key persons are “rent-a-title” appointments. If your MLRO is part-time, remote, and has no operational access to data, it will show.
Where this becomes a trade-off: lean teams want speed and low burn, but supervisors want control owners who can actually operate. The compromise is usually a small, senior internal core with tightly governed specialist outsourcing - not a hollow entity.
3) Build AML and financial crime controls that match your risk
AML is not a generic policy pack. Your AML framework must reflect your products, geographies, customer types, delivery channels, and transaction patterns.
That means a tailored business-wide risk assessment, customer risk methodology, onboarding and KYC/EDD procedures, sanctions screening approach, transaction monitoring logic, escalation and SAR processes, and a training and testing plan. If you are serving high-risk corridors or offering near-instant settlement, explain how you prevent speed becoming your vulnerability.
Also plan for reality. Monitoring tools need data. Data needs identifiers. Identifiers depend on onboarding. If your onboarding permits low-quality data, your monitoring will either flood you with false positives or miss genuine risk.
4) Safeguarding is not a sentence in a policy
Safeguarding is one of the fastest ways to fail an application because teams treat it as a banking problem. It is your control problem.
You need a safeguarding method aligned to your model (segregation and/or insurance/guarantee where permitted), reconciliation procedures, roles and responsibilities, record-keeping, and a clear approach for errors, shortfalls, and operational incidents. You also need a credible plan for safeguarding accounts and how you will keep them protected from set-off and operational leakage.
Where it depends: if you rely on third parties (processors, settlement partners, scheme sponsors), you must show you can still evidence safeguarding and reconciliation end-to-end. “The partner does it” is not an acceptable control.
5) Outsourcing: show you remain in control
Most PSPs outsource something. The issue is whether you can demonstrate governance over outsourced functions, particularly where they are critical or important.
Your outsourcing framework should cover due diligence, contracting, SLAs, audit rights, access to data, sub-outsourcing controls, exit plans, business continuity, and incident handling. Regulators will test whether you can switch providers, or whether you are effectively locked into a single vendor.
This is where execution quality matters. A set of policies is easy to write. A contract with realistic audit rights and a workable exit is harder.
6) Operational resilience and security: prove you can take a hit
Even before DORA-style expectations become fully embedded across the market, supervisors already expect credible ICT governance, security controls, access management, logging, vulnerability management, incident response, and business continuity.
Keep it grounded. Describe your architecture, key systems, where data is stored, who can access it, and how changes are controlled. Show how you detect incidents, how you recover, and how you communicate with customers and the regulator.
If you are early-stage, do not over-engineer. Build what you can operate, then show a roadmap with milestones that are funded and owned.
Common reasons PSP applications stall or get rejected
Most failures are not because the business is “too innovative”. They fail because the application cannot survive cross-examination.
The classic red flags are inconsistent narratives (your business plan says one thing, your funds flow says another), weak substance (no real local leadership), generic AML and safeguarding documents, unrealistic financials, and outsourcing arrangements that remove control from the authorised entity.
Another frequent issue is ownership complexity. If your cap table includes opaque holding chains, nominee structures, or investors unwilling to provide source-of-funds evidence, expect delay at best.
Build vs buy: the decision founders avoid until it is late
If your commercial timeline is tight, consider whether a ready-made structure could reduce time-to-market. Buying a pre-structured entity can be a strategic shortcut, but only if diligence is thorough and the regulator pathway is managed properly. A “licence for sale” with compliance debt is not a shortcut; it is a delayed crisis.
The right choice depends on your runway, your ability to hire key persons quickly, and whether you can secure banking and safeguarding arrangements in parallel. If you build from scratch, plan for regulator feedback cycles. If you buy, plan for change-of-control scrutiny and integration work.
The cost of getting it wrong is not the application fee
A delayed licence means lost distribution, churned partners, and a credibility gap with banks and merchants. Worse, a weak compliance build can lock you into a defensive posture from day one - constant remediation, strained regulator relations, and limited ability to expand permissions or passport.
The aim is not just authorisation. It is being bankable and scalable under supervision.
If you want a single execution partner to handle jurisdiction selection, licensing strategy, compliance framework build, documentation, and regulator-facing delivery, NUR Legal supports PSP and broader regulated businesses through end-to-end licensing and operational readiness with a clear “no hidden fees” approach.
A final thought to carry into every decision: regulators can forgive early-stage simplicity, but they rarely forgive ambiguity. If you can explain your model and controls in plain language and back it with evidence, you are already ahead of most applicants.



Comments