How to store accounts

This SOP outlines the protocols for requesting and managing access to accounts, as well as storing passwords securely.

Why This SOP Is Important

Effective management of access and passwords is crucial for maintaining security and efficiency within the organization. By following these protocols, we ensure that:

  • Security: Sensitive information is protected from unauthorized access.
  • Efficiency: Team members have the necessary access to perform their tasks without delays.
  • Accountability: Clear documentation and storage of access details provide transparency and accountability.

Key Steps

For Business Analysts (BA) and Project Managers (PM):

  1. Request Admin Access: Always ask for Admin access instead of login credentials whenever possible.
    • Example Statement: "Could you please grant us Admin access to ensure we have the necessary permissions to manage the account effectively?"
  2. Exception Handling: If Admin access is not possible, then request the login credentials.

For Developers (DEVS):

  1. Create a New Profile: When granted access to an account, save a new profile.
  2. Save All Passwords: Ensure all passwords are saved and accessible.
  3. Be Attentive: Regularly check that access permissions are still active and that no accounts or access tokens have expired.
  4. Request Admin Access: Always request Admin access for Gmail, Outlook, or other relevant accounts to streamline access and permissions.

For Everyone:

  1. Store Passwords Securely: If you receive a password, it must be stored in the relevant task within the project management system.
    • Example: If a password is provided for a specific tool or platform, ensure it is documented in the task description or comments section.
  2. Use Secure Methods: Use secure methods and tools, like password managers, to store and share passwords.

Things to Keep in Mind

Security: Ensure all access and password information is handled securely to protect sensitive data.
Documentation: Always document access details and passwords in the task to maintain transparency and ease of access for team members.
Follow Up: Regularly check the status of access permissions and update them as needed to prevent any disruptions.
Communication: If there are any issues with access or passwords, communicate promptly with the relevant stakeholders to resolve them.

Was this article helpful?
© 2025 LowCode Internal Docs