Security isn't just about protection—it's about organization. Key Man Out's team-based structure lets you compartmentalize secrets by department, project, family, or any organizational unit that makes sense for your needs.
Each team has its own encrypted vault with:
Key Principle: Secrets are organized by who needs to share them, not by who owns them individually.
Simple Setup Process:
Time to Setup: Under 5 minutes from account creation to first encrypted asset.
Critical Security Component:
Best Practice: Use a strong passphrase (4-6 random words, e.g., "correct horse battery staple mountain cascade") that team members can remember or store securely.
Example Team Structure:
Acme Corp Engineering Team
├── Encryption Key: "whiskey-tango-foxtrot-seven-delta-charlie"
├── Members: CTO, Lead Architect, Senior Devs (5 total)
├── Assets: 23 encrypted secrets
└── Vault Status: Sealed (secure) | Unsealed (accessible)
All team members have equal access to team vault:
Note: Access to individual assets is still controlled by guardian system—team membership provides vault access, guardianship provides asset access.
Email-Based Invitation:
Security Note: Key phrase is NOT sent via email. This is intentional—inviter must share it through separate secure channel (phone call, in-person, encrypted message). This prevents email compromise from exposing vault encryption.
Instant Removal:
After Removal:
If removed member is a security concern:
Time to Complete: Key rotation takes seconds, happens seamlessly in background.
Separation of Concerns:
Benefits:
Use Case Flexibility:
Example User:
Jane Smith (CTO)
├── Personal Team (Jane only)
│ └── Personal medical records, private accounts
├── Engineering Team (CTO, Lead Architect, 3 Sr Devs)
│ └── AWS credentials, GitHub tokens, deployment keys
├── Executive Team (CEO, CTO, CFO)
│ └── Board documents, financial projections
└── Acme Family Team (Jane, Spouse, Adult Children)
└── Estate plan, insurance policies, account info
Benefit: Jane has surgical control—right secrets to right people without exposing everything.
Flexible Categorization:
Each asset can be tagged with:
Search and Filter:
At-a-Glance View:
Team Activity Feed:
Team Setup:
Asset Structure:
Production AWS Root
├── Custodian: CTO
├── Gatekeepers: Lead Architect, Outside Security Consultant
├── Successors: Senior DevOps 1, Senior DevOps 2
└── Approval: Time-delay (48 hours) + 2 gatekeepers
Development AWS Account
├── Custodian: Lead Architect
├── Gatekeepers: CTO
├── Successors: All Senior DevOps
└── Approval: Standard (any gatekeeper)
GitHub Organization Owner Token
├── Custodian: CTO
├── Gatekeepers: Lead Architect
├── Successors: Senior DevOps 1
└── Approval: Standard + DNS verification
Collaboration Benefit: Production access has maximum oversight, development access is fast, everyone knows where to find what they need.
Team Setup:
Asset Structure:
Last Will and Testament
├── Custodian: Parent 1
├── Gatekeepers: Family Attorney, Parent 2
├── Successors: Adult Child 1, Adult Child 2
└── Approval: Time-delay (7 days) + all gatekeepers
Bank Account Credentials
├── Custodian: Parent 1
├── Gatekeepers: Parent 2, Family Attorney
├── Successors: Adult Child 1 (designated financial manager)
└── Approval: Time-delay (72 hours) + 1 gatekeeper
Insurance Policies
├── Custodian: Parent 2
├── Gatekeepers: Family Attorney
├── Successors: All adult children
└── Approval: Standard (attorney approval)
Collaboration Benefit: Family can organize estate while living, children have clear access path after incapacitation, attorney provides professional oversight.
Team-Level Events:
Asset-Level Events (relevant guardians only):
Email Notifications (immediate):
In-App Notifications:
Opt-Out Flexibility:
DO:
DON'T:
Before Inviting:
After Inviting:
Monthly Review:
Quarterly Deep Dive:
Bottom Line: Teams give you surgical organization—right secrets with right people, compartmentalized by context, with complete flexibility to add, remove, and reorganize as your needs evolve.
Intelligent Access Control
Match security to sensitivity with standard approval, time-delayed access, or DNS verification. Learn how Key Man Out provides flexible, intelligent access control workflows.
Complete Audit Trail
Know who accessed what and when with comprehensive logging, email notifications, and suspicious activity detection. Full transparency for every sensitive action.