In nearly every major VASP incident ITSEC has been retained to investigate, the cryptography held. The signers held. The hardware modules held.
What gave way was the layer between them — the Transaction Authorization Policy that decides who can move what, to where, under which conditions, with which approvers.
A policy that ships secure on day one drifts over time. Engineering adds a rule for a one-off treasury sweep and never removes it. Finance requests read access and ends up with a key that enumerates every vault in the workspace. A deny rule is added below a broader allow and never fires. A quorum of three is satisfied by three people on the same Telegram group.
These are not theoretical. Our forensic practice has walked the timeline of insider-assisted custody attacks where the attacker did not break the custody platform — they walked through the door the policy left open. The telemetry was loud enough to detect them on day one, if anyone had been reading it.
The Digital Wallet Audit exists to close that door before someone else finds it.