# Minimum Viable OPSEC Sanity Checklist - [ ] Have you set up [two factor authentication](https://plainshift.io/blog/minimum-viable-opsec#multi-factor-authentication) for all your accounts? Remember to avoid SMS as an authentication factor. - [ ] Have you set up a 2/3 sig personal [multi-sig account](https://plainshift.io/blog/minimum-viable-opsec#setting-up-a-personal-multi-sig-wallet)? - [ ] Do you rotate keys once every year? - [ ] Do you use different wallet providers for each sig? (To ensure a critical issue in one doesn't affect all keys) - [ ] Do you have a Yubikey? - [ ] Do you have a backup in case it gets stolen or becomes corrupted? - [ ] Have you set it up to run with your accounts as another authentication factor? - [ ] Have you set up [isolated and segmented VMs](https://plainshift.io/blog/minimum-viable-opsec#virtual-machines-isolation-and-segmentation)? - [ ] Communications VM for email, social media and any external comms. - [ ] Development work VM. Should only include IDE, smart contract development toolkit and wallet. - [ ] Do you use [diceware to generate truly strong passwords](https://plainshift.io/blog/minimum-viable-opsec#secure-password-setup-and-management)? - [ ] Do you use a [password manager](https://plainshift.io/blog/minimum-viable-opsec#password-managers)? - [ ] Is its master password 128 bits or higher? - [ ] Do you have a written backup of it in a physical lockbox? - [ ] Do you store your passphrase in here? Yes? Good. - [ ] Do you backup your password manager database at least weekly? - [ ] Do you have more than one backup? You can use [Tarsnap](https://tarsnap.com) or [SyncThing]() to host. - [ ] Do you generate all your new passwords with the in-built password manager? - [ ] Did you migrate all your credentials to the password manager? Did you regenerate stronger passwords for them? - [ ] Is your machine utilising [full disk encryption](https://plainshift.io/blog/minimum-viable-opsec#full-disk-encryption)? - [ ] Have you backed up the recovery key to a safe, encrypted place like [Tarsnap](https://tarsnap.com) - [ ] Do you have ["Find My"](https://plainshift.io/blog/minimum-viable-opsec#a-note-on-find-my-iphone-and-mac) enabled on your apple devices? - [ ] Have you [hardened your social media accounts](https://plainshift.io/blog/minimum-viable-opsec#hardening-social-media-and-contact-paths)? - [ ] Do you know what [phishing attempts look like](https://plainshift.io/blog/minimum-viable-opsec#phishing-social-engineering-compromise-and-what-to-do-about-it)? - [ ] Have you finished Google's phishing exercises? - [ ] Do you have the recommended anti-phishing extensions installed? - [ ] Do you know how to preview embedded links on mobile and PC? - [ ] Do you have an [anti-virus installed](https://plainshift.io/blog/minimum-viable-opsec#malware-detection-monitoring-and-remediation) on your machine alongside your default security? - [ ] Is it premium or the free version? - [ ] Do you have VirusTotal's browser extension enabled? - [ ] If you are running MacOS, do you have the [recommended Objective See tools](https://plainshift.io/blog/minimum-viable-opsec#MacOS) installed? - [ ] Do you know what [sim-swapping](https://plainshift.io/blog/minimum-viable-opsec#preventing-sim-swapping) is? Have you taken the neccessary precautions against it?