IT security workflow for Tallyfy

Manage credentials securely without the sticky notes

Passwords in spreadsheets, shared logins, and missing MFA create security gaps that attackers exploit. This workflow establishes proper credential creation, storage, access control, and rotation practices across your organization.

7 steps

Run this workflow in Tallyfy

1
Import this template into Tallyfy and assign IT security staff to credential management and access review steps
2
Document each system's login details within Tallyfy's secure step summaries, with guidance on password manager storage and MFA setup
3
Track credential creation, secure storage, MFA enablement, access control updates, and rotation schedules through Tallyfy's step completion
Import this template into Tallyfy

Process steps

1

System 1 Login & Password

5 days from previous step
task
Website: [insert the website, appstore download location, etc.] Login Information: Username: Password:
2

System 2 Login & Password

5 days from previous step
task
Website: [insert the website, appstore download location, etc.] Login Information: Username: Password:
3

Create new credentials

1 day from previous step
task
Generate login credentials following security standards. Use strong unique passwords - at least 12 characters with mixed types. Never reuse passwords across systems. Use a password generator rather than making them up yourself. Humans are terrible at randomness.
4

Store securely

1 day from previous step
task
Put credentials in a password manager - not spreadsheets, sticky notes, or documents. Use your company approved password vault with proper access controls. Share via the vault, never email or message passwords. Secure storage is the foundation of credential security.
5

Enable multi-factor authentication

1 day from previous step
task
Turn on MFA everywhere it is available. This is your second line of defense when passwords get compromised. Use authenticator apps over SMS when possible. Set up backup codes and store them securely. MFA stops most account takeovers.
6

Control access appropriately

1 day from previous step
task
Grant credentials only to people who need them for their role. Document who has access to what. Review access lists regularly and remove people who no longer need access. Former employees should be cut off immediately. Least privilege prevents unnecessary exposure.
7

Rotate on schedule

1 day from previous step
task
Change passwords periodically and immediately after any suspected breach. Enforce rotation policies through your systems where possible. Update stored credentials in your vault right away. Old passwords that get leaked can be used later if not changed.

Ready to use this template?

Sign up free and start running this process in minutes.