The 30-Day Service Account Register for Justice Nonprofits

A forgotten service account can sit in your systems for years, retaining authentication privileges that let it keep moving data,

A forgotten service account can sit in your systems for years, retaining authentication privileges that let it keep moving data, calling APIs, or giving a vendor quiet access long after the original project ended.

That is a real risk for justice nonprofits, because your systems often hold sensitive client, case, and partner data. A simple service account register, fundamental to identity and access management in your nonprofit’s security strategy, gives you a faster way to see what exists, who owns it, and what should be shut down first.

Key takeaways

  • Build your managed service account register in 30 days, not six months.
  • Give every non-human account one named business owner and one technical contact.
  • Track purpose, system access, credential type, last review date, and shutdown triggers.
  • Review the register on a set rhythm, or it will drift back into guesswork.

Why a service account register matters in justice work

A service account is a non-human account used by an app, script, integration, backup tool, or vendor process. These accounts often have broad permissions and IAM roles. Meanwhile, nobody remembers who approved them.

That gap creates risk fast. An old intake form may still push data into a case system. A former vendor may still have an automation account. A backup job may run with more access than it needs. If you work with confidential legal or client information, that is more than sloppy housekeeping.

You have likely seen the broader pattern already: vendor access sprawl and data risks grow when ownership is weak. The same logic applies to service accounts. If no leader owns the account, no one can approve its access, review its use, or retire it on time.

Google Cloud’s service account security guidance makes the same point in technical terms. Even if you do not use Google Cloud, the rule still holds in Active Directory and Windows Server environments. Service accounts need tight scope, clear owners, and regular review.

If a service account can touch client data, money, or critical systems, you need a named owner.

Days 1-10: Find every non-human account

Start with a plain spreadsheet. You are not building a perfect system yet. You are building visibility.

Look across your case tools, productivity suite, cloud platforms (check via the Google Cloud Console, gcloud CLI, or Cloud Shell), backup systems, finance apps, identity provider, and vendor-managed tools. Then ask program, operations, finance, and IT where automations live, including integrations using REST API or the Admin SDK API. You will usually find more accounts in scripts, connectors, and old vendor setups than in your formal documentation.

Modern illustration of a justice nonprofit executive at a simple office desk, reviewing a digital spreadsheet on a laptop displaying service account details including name, owner, purpose, creation date, and last access.

Keep the first version simple. These fields are enough to get moving:

Register fieldWhy you need it
Account nameYou need a unique record
System or platformYou need to know where it lives
Project IDYou need to pinpoint the specific project
PurposeYou need to know why it exists
Business ownerYou need someone accountable
Technical contactYou need someone who can change it
Access levelYou need to spot overreach
Credential typeYou need to track keys, secrets, or OAuth
Last reviewedYou need a review trail
Retirement triggerYou need a clear shutdown point

If you cannot fill most of those fields, your control is weak.

During these first ten days, resist the urge to debate tools. Your goal is a working inventory. If you need a broader method for mapping workflows and tightening access, use that lens here too. Map what exists first. Clean it up second.

Days 11-20: Assign owners and cut access down

Now you move from inventory to decisions.

Each account should have one business owner. That person approves why the account exists and what it may access. You should also name one technical custodian, usually internal IT or a managed partner, who handles setup and changes. Those roles are different, and that distinction matters.

Next, reduce access. Many service accounts start broad because broad access is easier. Months later, nobody remembers to scale it back. Review each account against current use, not original intent. Shift to RBAC principles or assign accounts to a specific user access group for tighter control. If an automation only reads referral data, it should not have write access to the full case system. If a vendor only needs file transfer, it should not keep admin rights.

Keys deserve extra care. Old keys often outlive staff, projects, and vendor contracts, especially unmanaged private keys or misplaced json key files tied to client ID and client secret credentials. Guidance on managing service account keys is clear on this point. Rotate them, limit them, and remove them when you can replace them with safer methods.

Watch for three red flags during this phase:

  • Accounts with no clear owner
  • Accounts tied to former vendors or former staff
  • Accounts with admin rights and no recent review

These are the accounts that turn a routine audit into a leadership problem.

Days 21-30: Approve the register and make it stick

By now, your register should show the real picture. Some accounts are valid. Some need tighter access. A few should be shut down right away.

Modern illustration of a small justice nonprofit leadership team of two people around a conference table, examining a printed service account register document in a window-lit meeting room with focused expressions, papers, and one laptop.

Use the last ten days to formalize three habits that form the foundation of a broader credential management strategy. First, approve the register with leadership. Second, tie it to vendor onboarding and offboarding. Third, set a review rhythm, usually monthly for high-risk accounts and quarterly for the full list.

You also want triggers. New integration? Add it to the register before launch. Vendor exit? Review and remove accounts before the final invoice. New grant program handling sensitive data? Review account access before service starts. Account granted domain-wide delegation? Update the register immediately. Changes to the OAuth consent screen? Review and approve access right away.

If you want proof that tighter ownership improves calmer execution, these cyber readiness and access control results show what that discipline looks like in practice.

Service account register FAQs

Is this only an IT task?

No. IT can maintain the file, but leadership should require named business owners. While a business owner is named, the organization administrator provides technical oversight. Otherwise, the register becomes a technical list with no accountability.

How often should you review it?

Review high-risk accounts monthly. Review the full register at least quarterly. Also review it when vendors change, staff leave, or a major workflow changes.

What about service accounts in Windows environments?

In Windows environments, include group managed service accounts and those using a service principal name in the register.

What about vendor-created service accounts?

Keep them in the same register. If a vendor created it, you still need to know the purpose, access level, owner, and retirement trigger.

A 30-day service account register will not solve every access problem. It will, however, replace fog with a usable map.

That is often the turning point. Once you can see every non-human account, manage its security context and application default credentials used by developers, and name who owns it, you can make better decisions with less stress.

Search Leadership Insights

Type a keyword or question to scan our library of CEO-level articles and guides so you can movefaster on your next technology or security decision.

Request Personalized Insights

Share with us the decision, risk, or growth challenge you are facing, and we will use it to shape upcoming articles and, where possible, point you to existing resources that speak directly to your situation.