A security-focused checklist that guides administrators through hardening their account and workspace. It covers authentication, access controls, audit logging, and compliance settings to ensure the workspace meets enterprise security standards.
Show this checklist to admin users after the initial setup is complete, or surface it when a security-related event occurs (new user joins, API key created, permission changed). It is also valuable during compliance audits or security reviews.
Guide the admin to activate 2FA on their own account first, then explain how to require 2FA for all team members through the security settings. Support both TOTP apps and hardware keys.
Present a table of all users and their current roles. Highlight any users with admin permissions and prompt the admin to verify that elevated access is appropriate.
Walk through settings for session timeout duration, password complexity requirements, and maximum login attempts before lockout.
Show how to turn on and access the audit log, which records who did what and when. Explain how to filter, search, and export audit data for compliance purposes.
List all active API keys and connected integrations. Prompt the admin to revoke any that are unused or unrecognized, and to rotate keys that are older than 90 days.
Sign up for Produktly and use this template to get started in minutes.
Start free trial