Multisig Operations — Security Checklist
Multisig setup, signer management, transaction verification, key security, and emergency procedures.
1. Governance & Inventory
-
Policies Governing Multisig OperationsDo you maintain documented policies and procedures governing your multisig operations?
-
Named Responsible Multisig OwnerIs there a clearly named person or team accountable for multisig operations (policy upkeep, reviews, hygiene)?
-
Multisig Documentation Maintenance ProcessDo you operate a documented maintenance process to keep multisig documentation current after any operational or signer change?
-
Current Multisig Registry DetailsDo you keep an up-to-date registry of all multisigs (address, network, purpose, threshold, modules/guards, admin roles, etc)?
-
Authorized Signer Mapping RegistryDo you maintain an up-to-date list of authorized signers and map them to the correct multisigs?
Notes:
2. Risk Assessment & Management
-
Formal Multisig Classification SystemDo you define and maintain a formal classification system for multisig wallets that covers both impact factors and operational needs?
-
Classification Criteria and ControlsDo you maintain documented criteria that map each classification level to required controls (thresholds, quorum composition, review cadence, etc)?
-
Review and Update ClassificationsDo you periodically review and update classifications and associated controls when conditions change?
-
Timelocks, Modules, and Guards PoliciesDo you maintain documented policies on the use of timelocks, modules and guards, including justification and security review requirements for any exceptions?
-
Exception Approval Process for MultisigDo you maintain a documented exception approval process for deviations from standard multisig policies, including justification requirements, and authorization levels?
Notes:
3. Signer Security & Access Control
-
Cryptographic Signer Identity AttestationDo you maintain a documented process for cryptographic attestation of address ownership and signer affiliation for multisig signers?
-
Signer Key Management StandardDo you maintain a documented standard for signer key management?
-
Signer Seed Backups and ProtectionDo you maintain documented policies and procedures for securely backing up and protecting signer seed phrases and recovery materials?
-
Multisig Signer Lifecycle ManagementDo you operate a documented lifecycle for adding, replacing, and removing signers, including offboarding and periodic access reviews?
-
Signer Training and Readiness ProgramDo you have a documented training and readiness program for signers before they are authorized to participate?
Notes:
4. Operational Procedures
-
Documented Transaction Lifecycle ProceduresDo you maintain documented processes for transaction initiation, approval, simulation, execution, and confirmation, including who is authorized to initiate?
-
Signing and Verification ProceduresDo you maintain documented signing and verification procedures that must be followed before any signatures are applied?
-
Audit Trails and RetentionDo you maintain audit trails and retention for transaction reviews, approvals, execution, and post-execution confirmation?
-
Policy for High-Risk TransactionsDo you maintain a policy defining enhanced controls for high-risk transactions (emergency actions, large transfers, protocol configuration changes)?
-
Multisig Standards and EvaluationDo you maintain documented standards for multisig technology and tools, and a formal evaluation process for adopting new ones?
-
Backup Infrastructure for MultisigDo you maintain documented backup infrastructure for multisig operations (alternate signing interfaces, RPC/explorers, failover procedures), and test their use?
Notes:
5. Communication & Coordination
-
Multisig Primary and Backup CommunicationsDo you maintain dedicated primary and backup communication channels for multisig operations with documented membership controls and onboarding/offboarding procedures?
-
Signer Identity Verification ProceduresDo you have procedures to verify the identity of signers during sensitive communications, with periodic checks to ensure authenticity?
-
Documented Escalation and On-Call PoliciesDo you maintain documented escalation policies that define response-time expectations, on-call coverage, and procedures for urgent coordination?
-
Channel Compromise Response and VerificationDo you maintain procedures for responding to suspected communication channel compromise, including switching to backup channels and out-of-band verification, and ensure signers know how to invoke them?
-
Emergency Contacts for MultisigDo you maintain and distribute an up-to-date emergency contact list for multisig operations?
Notes:
6. Emergency Operations
-
Emergency Playbooks for CompromiseDo you maintain written emergency playbooks covering key compromise, lost access, and urgent protocol actions?
-
24/7 Paging for Emergency MultisigsFor critical/emergency-class multisigs, do you provide 24/7 paging to reach the required threshold and document escalation paths?
-
Multisig Monitoring and AlertsDo you maintain monitoring infrastructure and procedures to detect unauthorized, anomalous, or suspicious activity across all multisigs, with documented alerting and escalation paths?
-
Rehearsals for Emergency PlaybooksDo you conduct periodic rehearsals and drills of emergency playbooks to test response procedures, communication channels, and signer coordination under simulated emergency conditions?
Notes: