The best security system in the world is useless if it creates a new single point of failure. Key Man Out's Guardian System provides granular control over asset access while ensuring business continuity—without compromising security.
Complete Control, Ultimate Responsibility
The custodian is the asset owner—the person who uploaded the secret and maintains full control over it.
Capabilities:
Use Cases:
Key Principle: The custodian can always override any access decision. Final authority rests with ownership.
Oversight Without Access
Gatekeepers provide an additional security layer through approval authority—without gaining access to the secrets themselves.
Capabilities:
Use Cases:
Key Principle: Gatekeepers provide checks and balances without creating insider threats. They can prevent unauthorized access but can't become unauthorized accessors themselves.
Access When Custodian Cannot Respond
Successors are your business continuity plan—the people who can access assets when the custodian is unavailable.
Capabilities:
Use Cases:
Key Principle: Successors ensure continuity without creating permanent exposure. Access is temporary, logged, and requires approval.
The three-tier guardian system: Custodian, Gatekeeper, and Successor
┌─────────────────────────────────────────┐
│ CUSTODIAN (Owner) │
│ • Full control over asset │
│ • Can access anytime (when unsealed) │
│ • Assigns all guardians │
│ • Final approval authority │
└─────────────────┬───────────────────────┘
│
┌────────┴────────┐
│ │
┌────────▼──────┐ ┌──────▼────────┐
│ GATEKEEPER │ │ SUCCESSOR │
│ (Overseer) │ │ (Continuity) │
├───────────────┤ ├───────────────┤
│ ✓ Approve │ │ ✓ Request │
│ ✓ Deny │ │ ✓ Access │
│ ✓ Monitor │ │ (approved) │
│ ✗ Access │ │ ✗ Approve own │
│ ✗ Modify │ │ ✗ Modify │
└───────────────┘ └───────────────┘
Asset: Production AWS Root Credentials
Guardians:
Workflow: If CTO is unreachable, DevOps Engineer requests access. CEO must approve (gets alert). Access granted for 24 hours, fully logged, CTO notified.
Benefit: Production stays running even if CTO is unavailable, but CEO maintains business oversight and can deny suspicious requests.
Asset: Bank Account Credentials and Will
Guardians:
Workflow: After parent's incapacitation, children request access. Attorney reviews request and approves after verifying circumstances. Children receive time-limited access to coordinate estate matters.
Benefit: Assets remain protected during parent's lifetime but accessible to heirs when needed, with professional oversight to prevent premature or inappropriate access.
Asset: High-Value Client Contract and Credentials
Guardians:
Workflow: Account Manager on medical leave. Backup requests access to continue client service. Sales Director approves after confirming business need. Compliance Officer receives notification. Access granted for duration of leave.
Benefit: Client service continues uninterrupted while maintaining proper oversight and documentation for audit purposes.
Asset: Domain Registrar Master Account
Guardians:
Workflow: VP unreachable during DNS emergency. Senior Engineer requests access. All three gatekeepers must approve (prevents single-point compromise). After all approve, access granted.
Benefit: Extremely sensitive assets require consensus, preventing rogue access while ensuring emergency availability.
Guardians can be added or removed at any time by the custodian:
Each asset has independent guardian assignments:
This granularity ensures appropriate access without all-or-nothing permissions.
When a custodian removes a guardian:
Security Benefit: Quick response to employment termination or trust breakdown.
Problem: Everyone has the password = no accountability, no oversight, no security.
Key Man Out: Successors request access individually, actions logged, custodian always informed.
Problem: Physical safes, sealed envelopes, unclear who can access when.
Key Man Out: Digital, logged, time-limited, remotely accessible, approval-based.
Problem: Giving someone admin access = giving them everything.
Key Man Out: Successors access only what they need, only after approval, only for limited time.
Problem: "Just trust them not to access it unless needed."
Key Man Out: Gatekeepers provide verification without requiring blind trust.
Assign different gatekeepers for different asset types:
Ensure business continuity across time zones:
Structure successors by seniority:
Bottom Line: The Guardian System gives you surgical control over who can access your secrets, under what conditions, with complete oversight and accountability—without creating new single points of failure.
Zero-Knowledge Encryption
Your secrets stay secret—even from us. Learn how Key Man Out's client-side encryption and zero-knowledge architecture provides military-grade security with complete privacy.
Intelligent Access Control
Match security to sensitivity with standard approval, time-delayed access, or DNS verification. Learn how Key Man Out provides flexible, intelligent access control workflows.