Get Secured

Process Security, Pillar 02

Onboarding & Offboarding
Security Procedures for Web3.

Every person who joins your team gains access. Every person who leaves should lose it, immediately, completely, and verifiably. In practice, most Web3 teams have informal onboarding and no real offboarding at all. That is how former contributors retain access to repositories, wallets, and admin tools long after they have left.

The Service

Secure Identity Lifecycle Management for Web3 Teams & DAOs

Security onboarding and offboarding are the bookends of identity lifecycle management, the process of controlling who has access from the moment they join until the moment they leave. In traditional enterprise security compliance, this is a documented, audited process. In Web3, it is almost universally handled informally: access is granted as-needed via Telegram, revoked (or not) when someone announces they are stepping away, and credentials are rarely rotated even after confirmed departures.

The risk is asymmetric. The cost of a thorough offboarding procedure is a few hours of admin work. The cost of a disgruntled or compromised former contributor retaining access to a deployer key or treasury multi-sig is potentially total. We design onboarding and offboarding security procedures that are specific, sequenced, and verifiable, not a general policy document that sits in Notion and is never followed.

What We Deliver

Work is delivered through our internal consultancy team and a curated network of specialist partner firms, rigorously vetted for technical depth and professional integrity in the Web3 space.

  • Onboarding security checklist: minimum access provisioning, device requirements, and security induction
  • Access provisioning protocol: least-privilege grant with documented scope and approval sign-off
  • Offboarding security checklist: immediate access revocation across every system, tool, and wallet
  • Credential rotation policy: which credentials must be rotated on departure, and within what timeframe
  • Multi-sig signer replacement procedure: safe removal and addition of signers without exposing treasury
  • Contractor and pseudonymous contributor procedures: adapted for DAO structures and pseudonymous teams
  • Joiner / mover / leaver access audit: review of all current access against current team status
  • Security compliance documentation: written procedures meeting audit and regulatory review standards
Request a Procedures Review →

The Access That Outlasted the CEO

“Multichain’s CEO Zhao Jun was detained in May 2023. What followed revealed the most extreme form of the ghost access problem: he alone held the private keys to all Multichain protocol infrastructure. No one else had access. No offboarding procedure existed because the access was never formally distributed. The protocol was paralysed. In July 2023, $130M was drained to addresses linked to his relatives. The access had never been structured to be revocable, auditable, or shared, and when the key holder was removed, the protocol had no path forward.”
Security4Web3 Incident Analysis

Why Web3 Offboarding Is Different

“In traditional companies, offboarding means disabling an Active Directory account. In Web3, it means revoking GitHub access, removing Discord permissions, rotating shared secrets, replacing multi-sig signers, verifying hardware wallet recovery phrases are not retained, and confirming no cloud credentials were cached. Each step requires deliberate action. None of it happens automatically.”
Security4Web3 Process Security Review

Security compliance for identity lifecycle management is increasingly required by regulators and institutional partners. Whether you are pursuing a formal compliance programme or simply trying to close an obvious security gap, documented and enforced onboarding and offboarding procedures are a foundational requirement.

The Process

Onboarding and Offboarding
Done Properly.

A security program for identity lifecycle covers four distinct phases. Each has specific actions that must be completed and verified, not just intended.

Onboarding: Minimum Access

New contributors receive only the access required for their role, no more. Each grant is documented, scoped, and approved. Security induction covers the team's policies on data handling, device requirements, credential management, and escalation procedures before access is granted.

Offboarding: Immediate Revocation

On departure, whether planned or abrupt, access is revoked across every system simultaneously and verified as complete. No single system is left active pending "when we get to it." The offboarding checklist is specific to your toolstack: GitHub, AWS, Vercel, Notion, Discord, Telegram admin roles, and every other surface with access that matters.

Credential Rotation

Any shared credential the departing contributor had access to is rotated. Any API key, deployment secret, or shared password they could have copied is considered compromised and replaced. Multi-sig configurations that included them are updated. This is the step most teams skip and the one that creates the most persistent risk.

Periodic Access Review

Between joiners and leavers, access tends to accumulate. Contributors move between roles; contractors finish a project but retain access; integrations are granted permissions that outlive their purpose. A quarterly access review checks that every active grant still matches the current team structure and revokes anything that does not.

If your team has not audited who currently has access to every system against who is currently on your team, it is almost certain that former contributors retain access somewhere. We perform the joiner / mover / leaver access audit and design the procedures that prevent it from accumulating again.

Start a Conversation →