Effective Date: April 23, 2026
This policy defines access control requirements for all VaultKeeper systems, including role-based access control (RBAC), authentication standards, and access provisioning procedures to ensure that only authorized individuals can access consumer data and production systems.
| Role | Access Level | Description |
|---|---|---|
| Owner/Admin | Full | Full access to all infrastructure, dashboards, and production data |
| Developer | Limited | Code repository access, staging environments, no direct production data access |
| Read-Only | View | Dashboard viewing for monitoring purposes only |
| Role | Access Level | Description |
|---|---|---|
| Household Owner | Full | Full read/write to own data node, can invite/remove members |
| Household Member | Shared | Read/write to owner's shared data node, cannot manage membership |
| Individual User | Own Data | Read/write to own data only, isolated from all other users |
Database access is enforced at the infrastructure level through Firebase Security Rules. Users can only read/write data under their own UID or, for household members, under the household owner's UID. Rules are version-controlled in database.rules.json.
When a team member is terminated or transferred:
See our Employee Access Management Policy for detailed procedures.
Periodic access reviews are conducted to ensure compliance. See our Access Review Policy for audit schedules and procedures.
Third-party services (Firebase, Cloudflare, Plaid, Teller) access data only as required to provide their services. Access tokens for bank connections are scoped to the minimum permissions required and can be revoked by the user at any time.
This policy is reviewed at least annually or upon significant changes to the system or team structure.