Accounts and Access¶
Objective¶
This page offers a shared way to care for the accounts and access paths that sustain Cafh's digital work. It covers systems, vendor portals, official email accounts, social channels, and the member database.
Why this matters¶
Many digital problems begin quietly, in a reused password, an old admin account, or a recovery path that nobody reviewed. In a volunteer organization, small gaps in account care can grow into larger risks. Thoughtful access rules protect continuity, trust, and the ability to recover. They also protect the website, member area, cloud services, email, and social channels that support daily work.
Risks this page helps reduce¶
- Account takeover
- Loss of admin control
- Active access for former volunteers or former vendors
- Broken recovery after a login problem
- Misuse of official channels
- Service outage tied to one person
Core rules¶
These rules set the minimum line that no volunteer, vendor, or admin should cross. They keep legal ownership, daily control, and recovery power with Cafh. That foundation matters most during role change, vendor exit, or account recovery.
- Cafh must own critical accounts.
- Personal accounts must not own critical services.
- Every critical service must use multi-factor authentication.
- Shared credentials must live in the Cafh password manager.
Critical services¶
A critical service is not defined by price or technical complexity alone. It is critical if it carries trust, identity, continuity, or recovery for the rest of the environment. In Cafh, even a small service may be critical if it controls the next link in the chain.
A service is critical when loss, outage, or misuse can:
- Take down the public site or member area
- Lock Cafh out of a main account
- Expose member data or internal records
- Break account recovery for other systems
- Interrupt renewals, billing, or security alerts
- Damage the public image of Cafh
Critical services include:
- DigitalOcean
- Domain registrar accounts
- DNS and SSL services
- Website admin accounts
- Member database systems
- Official email accounts and shared mailboxes
- Social media admin accounts
- Password manager admin accounts
- Backup, monitoring, and alerting services
Why Cafh must control the main accounts¶
The main accounts must stay in Cafh's hands. They must be opened in Cafh's name and tied to Cafh-controlled email addresses. Cafh must keep at least two trusted admins and one current recovery path. Vendors may receive delegated access for defined work. They must not be the legal, billing, or technical owner of the core accounts.
This rule matters most for:
- Domain registrar accounts
- DNS hosting accounts
- Official email administration
- Certificate management
- Cloud root or billing accounts
- Password manager admin accounts
If a third party owns those accounts, Cafh can lose the right to change DNS, renew the domain, recover email, renew certificates, read billing notices, or remove a former vendor. That risk affects continuity, security, and the public image of the organization.
Domain, email, and certificate dependency map¶
This diagram shows why one account can affect many other services.
flowchart TD
A["Registrar account"] --> B["DNS control"]
B --> C["Public website"]
B --> D["Official email delivery"]
B --> E["Domain verification records"]
D --> F["Password resets and security alerts"]
F --> G["Cloud, social, and vendor accounts"]
B --> H["Certificate issue and renewal"]
Why domain and DNS control are high risk¶
The registrar account controls renewal, transfer, and nameserver settings. DNS control decides where the website, email, and many verification records point. One bad change can take the site offline, stop email, or send users to a hostile service.
If an attacker or a former vendor controls the registrar or DNS account, they may:
- Move nameservers
- Change website destination records
- Change email routing
- Break SPF, DKIM, or DMARC records
- Block domain renewal
- Transfer the domain away from Cafh
That is why the registrar and DNS accounts need strong MFA, current recovery data, transfer lock where available, and regular review by Cafh.
Why email administration is a root function¶
Official email is not only a communication tool. It is part of the control plane for the whole organization. Many services send password resets, security alerts, invoices, user invites, and certificate notices to official email.
If Cafh loses control of the main email administration account or key shared mailboxes, it may lose the ability to recover:
- Cloud and hosting accounts
- Domain and DNS accounts
- Social media accounts
- Vendor portals
- Billing and renewal notices
That is why Cafh must directly control the primary mail tenant, admin mailboxes, and recovery inboxes.
Why certificates need direct oversight¶
Certificates protect encrypted access to the website and member services. Expired certificates trigger browser warnings and can stop trust at once. Broken renewal can cause outages without any system change on the website itself.
Certificate control needs clear ownership for:
- Who issues the certificate
- Where renewal runs
- Which domain names it covers
- Which mailbox gets expiry alerts
- Who can replace or revoke it
If DNS is changed by an attacker, that attacker may even support a false site with a valid certificate. That risk makes domain, DNS, and certificate control part of one chain.
Tracked accounts¶
The record matters as much as the password. Many organizations lose control through missing names, unclear owners, or stale recovery data. A current register lets the committee see who can act, who can recover, and who must be removed.
The committee must keep a current record for:
- Official email accounts
- Shared mailboxes
- Social media admin accounts
- Social media publishing accounts
- Recovery email accounts
- Recovery phone numbers linked to critical services
Each record must show:
- Account name
- Purpose
- Owner
- Current admins
- Platform
- Linked recovery path
- Multi-factor status
- Last review date
Sample critical service register¶
Use one row for each high-impact service or admin account.
| Asset | Type | Why it is critical | Cafh owner | Admin accounts | Recovery path | Vendor access | Last review |
|---|---|---|---|---|---|---|---|
| Domain registrar account | Domain | Controls renewal, transfer, and nameserver settings | Technology committee | 2 named admins | domains@cafh.example |
No direct owner access | 2026-04-01 |
| DNS hosting account | DNS | Controls website, email, and verification records | Technology committee | 2 named admins | domains@cafh.example |
Limited support access | 2026-04-01 |
| Official email admin | Receives resets, alerts, invoices, and recovery messages | Committee chair | 2 named admins | admin@cafh.example |
No direct owner access | 2026-04-02 | |
| DigitalOcean billing root | Cloud | Controls hosting, billing, snapshots, and network settings | Technology committee | 2 named admins | infra@cafh.example |
Delegated project access only | 2026-04-03 |
| Password manager admin | Identity | Holds shared secrets and recovery codes | Technology committee | 2 named admins | security@cafh.example |
No direct owner access | 2026-04-03 |
| Member database admin | Data | Gives access to member records and exports | Membership owner | 2 named admins | members@cafh.example |
Support access by request | 2026-04-04 |
Sample domain and email control register¶
Use this table to track the full chain from domain control to email delivery.
| Domain or asset | Registrar | DNS host | Official admin mailbox | Auto-renew | Transfer lock | SPF, DKIM, DMARC owner | Renewal date |
|---|---|---|---|---|---|---|---|
cafh.org |
Registrar example | DNS host example | domains@cafh.example |
Yes | Yes | mailadmin@cafh.example |
2027-03-15 |
members.cafh.org |
Follows cafh.org |
DNS host example | domains@cafh.example |
Yes | n/a | mailadmin@cafh.example |
Follows parent |
| Official mail tenant | n/a | n/a | admin@cafh.example |
Annual review | n/a | mailadmin@cafh.example |
2026-12-01 |
Sample certificate register¶
Use this table to track website certificates and renewal paths.
| Service | Domain | Certificate source | Renewal method | Expiry alert mailbox | Owner | Backup contact | Last test |
|---|---|---|---|---|---|---|---|
| Public website | cafh.org |
Let's Encrypt or managed provider | Automatic | infra@cafh.example |
Technology committee | Website vendor contact | 2026-04-01 |
| Member area | members.cafh.org |
Managed provider | Automatic | infra@cafh.example |
Technology committee | Internal technical contact | 2026-04-01 |
| Mail security records | cafh.org |
Mail provider | Manual review of DNS records | mailadmin@cafh.example |
Email owner | Technology committee | 2026-04-02 |
Password manager¶
The password manager is the operational memory of shared access. Without it, work drifts into private notebooks, chats, and personal browsers. That creates silent risk and makes offboarding harder.
- Use one organization-owned password manager.
- Store shared credentials, recovery codes, and service notes there.
- Keep at least two committee members with admin rights.
- Review vault access every 3 months.
Rotation rules¶
Rotation is not a ritual. It cuts old access paths and limits the life of exposed credentials. Cafh should keep a calm schedule, then move faster after change or suspicion.
- Rotate critical passwords every 12 months.
- Rotate passwords at once after a role change.
- Rotate passwords at once after vendor change.
- Rotate passwords at once after any suspected exposure.
- Rotate keys and tokens on the same rule.
DigitalOcean access¶
DigitalOcean access deserves special care. A few accounts can change servers, networking, snapshots, billing, and recovery. That power should stay with a very small named group inside Cafh.
- Keep the number of direct DigitalOcean admins small.
- Name each admin in the committee records.
- Review DigitalOcean access every 3 months.
- Use separate named accounts for each person.
Offboarding¶
Offboarding must be fast and recorded. Delay leaves old paths open and creates confusion about who still represents Cafh. This checklist should start on the same day a role ends.
- Remove service access
- Remove official email access
- Rotate shared credentials
- Remove password manager access
- Remove social media admin access
- Record the date and owner of the change