Key Management for Administrators
This guide is for organization owners and team admins who manage encryption keys and handle recovery requests for their users.
Overview
As an administrator, you have elevated privileges that come with responsibilities:
| Role | Can Recover | Scope | Audit Requirements |
|---|---|---|---|
| Team Admin | Team members | Own team only | All actions logged |
| Organization Owner | Any user in org | Entire organization | All actions logged + dual auth for platform recovery |
| Platform Admin | Any user (with verification) | All users | Dual auth + time delay + SIEM logging |
Key Management Hierarchy
Platform Master Key (split-knowledge)
โโโ Vault Component (stored in HashiCorp Vault)
โโโ Custodian Component (offline storage)
โ
โโโ Organization A Master Key
โ โโโ Team 1 Key โ Team 1 Surveys
โ โโโ Team 2 Key โ Team 2 Surveys
โ
โโโ Organization B Master Key
โโโ Team 3 Key โ Team 3 Surveys
Key Principle: Higher-level keys can decrypt lower-level keys, but not vice versa.
Team Admin Responsibilities
Managing Team Access
Adding Team Members
When you add a member to your team:
- Navigate to Settings โ Team Management
- Click Invite Member
- Enter their email address
- Choose their role (Member, Editor, Admin)
- They receive an invitation email
- Upon accepting, they automatically get access to team surveys
What happens behind the scenes: - Their account is linked to the team - Team encryption key is made available via their SSO session - No passwords or recovery phrases needed (SSO handles authentication)
Removing Team Members
When someone leaves:
- Navigate to Settings โ Team Management
- Find the member in the list
- Click Remove from Team
- Confirm the removal
Important: Removing a member: - โ Revokes their access to team surveys immediately - โ Logs the removal action for audit - โ Does NOT delete any surveys they created - โ Does NOT affect their personal (non-team) surveys
Changing Member Roles
| Role | Permissions |
|---|---|
| Member | View and edit assigned surveys |
| Editor | Create surveys, edit all team surveys |
| Admin | All above + manage team members + recover team surveys |
To change a role: 1. Navigate to Settings โ Team Management 2. Click the role dropdown next to the member 3. Select the new role 4. Confirm the change
Recovering Team Member Surveys
If a team member loses access to their account (SSO issues, left organization temporarily, etc.):
Standard Team Recovery (Instant)
- Navigate to Surveys โ Team Surveys
- Find the affected survey
- Click Admin Actions โ Recover Access
- Select the reason:
- Member temporarily unavailable
- SSO account locked
- Emergency data access
- Other (specify)
- Click Recover
- Access is granted immediately
This creates an audit log entry:
{
"timestamp": "2025-11-30T10:00:00Z",
"action": "team_admin_recovery",
"admin": "[email protected]",
"target_user": "[email protected]",
"survey": "diabetes-audit-2025",
"reason": "SSO account temporarily locked"
}
When to Escalate to Organization Admin
Escalate if: - You cannot access the survey (permissions issue) - The survey involves multiple teams - The member disputes the recovery - You're unsure about the appropriate action
Organization Owner Responsibilities
Managing Teams
Creating Teams
- Navigate to Settings โ Organization โ Teams
- Click Create Team
- Enter team name and description
- Assign a Team Admin
- Click Create
Dissolving Teams
When a team is no longer needed:
- Navigate to Settings โ Organization โ Teams
- Select the team
- Click Dissolve Team
- Choose what happens to surveys:
- Move to another team
- Move to organization level
- Archive (read-only)
- Confirm dissolution
Warning: This action cannot be undone. All team members lose access immediately.
Organization-Level Recovery
As organization owner, you can recover any survey in your organization:
- Navigate to Admin โ Recovery Dashboard
- Click New Recovery Request
- Search for the user or survey
- Select the recovery reason
- Click Initiate Recovery
For team surveys, recovery is instant. For individual user surveys within your organization, you may need to follow the platform recovery process.
Recovery Dashboard
The recovery dashboard shows:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Organization Recovery Dashboard [Export CSV] โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Summary โ
โ โโโ Pending Requests: 2 โ
โ โโโ Completed This Month: 5 โ
โ โโโ Recovery Rate: 0.3% (normal range: <1%) โ
โ โโโ Last SIEM Sync: 2 minutes ago โ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Pending Requests โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ ๐ก Dr. Sarah Jones | diabetes-audit-2025 โ
โ Status: Awaiting Secondary Authorization โ
โ Primary Approval: [email protected] (2025-11-30 09:00) โ
โ Time Remaining: 23h 15m until time delay completes โ
โ [View Details] [Approve as Secondary] [Reject] โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ ๐ Dr. Michael Brown | patient-feedback โ
โ Status: Identity Verification In Progress โ
โ Documents Submitted: Photo ID โ, Video Call: Scheduled โ
โ [View Verification] [Schedule Call] โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ Recent Completions โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ โ
Dr. Emma Wilson | research-study-2025 โ
โ Completed: 2025-11-28 14:30 โ
โ Recovery Type: Team Admin (instant) โ
โ [View Audit Trail] โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Dashboard Features
| Feature | Description |
|---|---|
| Pending Requests | All recovery requests awaiting action |
| Identity Verification | Review submitted documents, schedule video calls |
| Dual Authorization | See primary approval status, provide secondary approval |
| Time Delay Countdown | Track mandatory waiting period |
| Audit Trail Viewer | Complete history of all recovery actions |
| Recovery Rate Monitor | Alerts if recovery rate exceeds normal thresholds |
| SIEM Status | Connection status to Elasticsearch/external SIEM |
Reviewing Audit Logs
Navigate to Admin โ Audit Logs to view all key management events:
Filter Options: - Date range - Action type (recovery, access grant, access revoke) - User - Admin who performed action - Survey
Export Options: - CSV (for spreadsheet analysis) - JSON (for SIEM import) - PDF (for compliance reports)
Platform Recovery Process
When a user loses both their password AND recovery phrase, platform recovery is required.
Who Can Initiate Platform Recovery?
- The user themselves (via support request)
- Organization admin (on behalf of unavailable user)
- Platform admin (for orphaned accounts)
Platform Recovery Workflow
Step 1: Request Submission
If user initiates: 1. User contacts [email protected] 2. Support creates recovery ticket 3. User receives confirmation email with ticket ID
If organization admin initiates: 1. Navigate to Admin โ Recovery Dashboard 2. Click Request Platform Recovery 3. Enter user email and survey details 4. Provide justification (user unavailable, emergency, etc.) 5. Submit request
Step 2: Identity Verification
The user (or their authorized representative) must verify identity:
Required Documents: - โ Government-issued photo ID (passport, driving license) - โ Proof of association (NHS email, employment letter)
Verification Methods:
| Method | Description | Time |
|---|---|---|
| Photo ID Upload | Upload clear photo of ID document | Instant |
| Video Verification | Live video call with CheckTick admin | 15-30 mins |
| Security Questions | Answer questions from account setup | Instant |
| Employment Verification | HR confirmation (for NHS/organization users) | 1-2 days |
Identity Verification Checklist (for admins reviewing):
โก Photo ID matches account name
โก Photo ID is not expired
โก Photo ID shows clear, unaltered image
โก Email domain matches organization (if applicable)
โก Video call completed (face matches ID)
โก Security questions answered correctly (2 of 3 minimum)
โก No suspicious activity on account
โก User confirms they initiated the request
Step 3: Dual Authorization
Platform recovery requires two independent admin approvals:
Primary Authorization: 1. First admin reviews verification documents 2. Confirms identity verification checklist is complete 3. Documents reason for approval 4. Clicks Approve as Primary
Secondary Authorization: 1. Different admin (cannot be same person) reviews 2. Independently confirms verification 3. Documents their approval reason 4. Clicks Approve as Secondary
Rejection: - Either admin can reject with documented reason - User is notified of rejection - They can appeal or resubmit with additional documentation
Step 4: Time Delay Period
After dual authorization, a mandatory waiting period begins:
| Tier | Time Delay |
|---|---|
| Individual | 48 hours |
| Pro | 24 hours |
| Organization | 24 hours |
| Enterprise | Custom (typically 24 hours) |
During time delay: - User receives email notification with countdown - User can cancel the recovery if they didn't request it - Admins cannot bypass the delay - Timer shown in recovery dashboard
If user objects during time delay: 1. Click "I didn't request this" in notification email 2. Recovery is immediately cancelled 3. Account is flagged for security review 4. User is prompted to change password
Step 5: Key Recovery Execution
After time delay completes:
- Platform admin retrieves custodian component
- Stored in secure offline location
- Requires physical access (not in database/environment)
-
Two-person retrieval recommended
-
Platform master key reconstructed
- Vault component + Custodian component = Platform key
-
Happens in memory only, never persisted
-
User's KEK retrieved from Vault
- Platform key decrypts the escrowed key
-
Key is made available to user's session
-
User regains access
- Survey unlocks with recovered key
- User prompted to set new password + recovery phrase
-
New key escrow created automatically
-
Notification sent
- User receives confirmation email
- Organization admin notified (if applicable)
- Audit entry created
Custodian Component Management
The custodian component is the offline portion of the platform master key.
Storage Requirements
- โ Secure physical location (safe, lockbox)
- โ Fireproof and waterproof storage
- โ Limited access (2-3 designated individuals maximum)
- โ Access log maintained
- โ Backup copy in separate secure location
Retrieval Procedure
- Verify authorization: Confirm dual-authorized recovery request
- Two-person rule: Two designated individuals retrieve together
- Log access: Record date, time, individuals, recovery ticket ID
- Use immediately: Don't store in digital systems
- Return to storage: Immediately after use
Rotation Schedule
Rotate the custodian component: - After any suspected compromise - Annually (as part of security review) - When designated custodians change
Rotation Process: 1. Generate new platform master key 2. Re-encrypt all escrowed keys with new platform key 3. Securely destroy old custodian component 4. Store new custodian component in secure location 5. Update Vault with new vault component
SIEM Integration
Security Information and Event Management (SIEM) integration provides centralized logging and alerting.
Supported SIEM Systems
| System | Integration Method |
|---|---|
| Elasticsearch (self-hosted) | Direct API integration |
| Splunk | HTTP Event Collector (HEC) |
| Microsoft Sentinel | Log Analytics workspace |
| AWS CloudWatch | CloudWatch Logs agent |
Events Forwarded to SIEM
All key management events are forwarded:
{
"timestamp": "2025-11-30T14:30:00Z",
"event_type": "key_management",
"action": "platform_recovery_completed",
"severity": "high",
"details": {
"user": "[email protected]",
"survey_id": "uuid-here",
"primary_approver": "[email protected]",
"secondary_approver": "[email protected]",
"time_delay_hours": 48,
"verification_methods": ["photo_id", "video_call", "security_questions"]
}
}
Alert Thresholds
Configure alerts for unusual activity:
| Metric | Warning Threshold | Critical Threshold |
|---|---|---|
| Recovery requests per day | > 5 | > 10 |
| Recovery rate (% of users) | > 1% | > 2% |
| Failed verification attempts | > 3 per user | > 5 per user |
| Time delay bypass attempts | Any | Any |
Setting Up Elasticsearch (Self-Hosted)
For self-hosted SIEM on Northflank:
- Deploy Elasticsearch addon (see Vault Setup Guide)
- Configure Vault audit backend to forward logs
- Set up Kibana for visualization
- Create alert rules for thresholds above
Compliance Reporting
GDPR Requirements
For GDPR compliance, maintain records of:
- โ All data access (who accessed what, when)
- โ Recovery requests and outcomes
- โ Consent for identity verification
- โ Data retention periods
Export GDPR Report: 1. Navigate to Admin โ Compliance โ GDPR Report 2. Select date range 3. Click Generate Report 4. Download PDF or JSON
NHS DSPT Requirements
For NHS Data Security and Protection Toolkit:
- โ Encryption of personal data at rest
- โ Access controls and audit logging
- โ Incident response procedures
- โ Staff training records
Export DSPT Evidence: 1. Navigate to Admin โ Compliance โ DSPT Export 2. Select evidence categories needed 3. Click Generate Evidence Pack 4. Download ZIP with all documentation
HIPAA Requirements (if applicable)
For HIPAA compliance:
- โ Access controls (role-based)
- โ Audit controls (all access logged)
- โ Transmission security (TLS 1.3)
- โ Encryption (AES-256-GCM)
Best Practices
For Team Admins
- Review access quarterly: Remove members who no longer need access
- Document recovery reasons: Always provide clear justification
- Monitor audit logs: Check weekly for unusual activity
- Train team members: Ensure they understand encryption basics
- Escalate when unsure: Better to ask organization admin than make mistakes
For Organization Owners
- Establish clear policies: Document when recovery is appropriate
- Designate backup admins: At least 2 people who can authorize
- Review recovery dashboard daily: Catch issues early
- Test recovery process annually: Ensure it works when needed
- Maintain SIEM integration: Don't let alerts go unmonitored
- Secure custodian component: Follow storage and retrieval procedures
For Platform Admins
- Never bypass time delays: Even in emergencies
- Always require dual authorization: No exceptions
- Verify identity thoroughly: When in doubt, request more evidence
- Log everything: Actions not logged didn't happen (legally)
- Rotate custodian component: Follow rotation schedule
- Monitor recovery rates: Investigate unusual patterns
Troubleshooting
User Can't Access Survey After SSO Login
- Check team membership is active
- Verify SSO provider is configured correctly
- Check team encryption key is available
- Review error logs for specific issue
Recovery Request Stuck in Pending
- Check if dual authorization is complete
- Verify time delay hasn't been bypassed
- Check if user objected to the recovery
- Review audit logs for rejection
Audit Logs Not Appearing in SIEM
- Verify SIEM connection is active (check dashboard)
- Check Elasticsearch/SIEM is running
- Verify audit backend configuration in Vault
- Check network connectivity between services
Custodian Component Not Working
- Verify component hasn't been rotated
- Check component matches current vault component
- Ensure correct format (64-byte hex string)
- Contact CheckTick support if issues persist
Related Documentation
- Encryption for Users - End-user encryption guide
- Business Continuity - Disaster recovery procedures
- Vault Integration - Deploying HashiCorp Vault (includes developer API reference)
Getting Help
For urgent recovery issues: - Email: [email protected] - Include: Organization name, user email, survey ID, ticket number
For security concerns: - Email: [email protected] - Report any suspected unauthorized access immediately
For compliance questions: - Email: [email protected] - Include: Specific regulation and evidence needed