vi. Custody, Control & Key Management

Custody, control, and key management define how digital assets and permissions are held, accessed, and protected. These mechanisms determine who can authorize transactions, enforce rights, and safeguard assets against loss or misuse.

Access Authority

The ability to approve or initiate actions involving digital assets or records.

Custodian

An entity responsible for safeguarding digital assets or cryptographic keys on behalf of others.

Custody Model

The structural approach used to hold and manage digital assets, such as self-custody or third-party custody.

Key Management

The processes used to generate, store, rotate, and secure cryptographic keys.

Multi-Signature (Multi-Sig)

A control mechanism requiring multiple approvals to authorize a transaction.

Private Key

A cryptographic secret used to sign transactions and prove control over digital assets.

Recovery Mechanism

Procedures for restoring access in the event of lost or compromised credentials.

Role-Based Access

Permission structures that grant actions based on assigned roles rather than individuals.

Security Breach

An incident involving unauthorized access or compromise of keys or systems.

Transaction Authorization

The approval process required to execute a digital transaction.

Last updated