Pre-audit access

StackRefit Access Checklist

A safe, structured checklist for agencies preparing access for an inherited PHP/Linux system audit. The aim is enough context without unnecessary production risk, excessive permissions, or insecure credential sharing.

Before sending access

Please do not paste code, credentials, API keys, customer data, database dumps, private logs, or screenshots containing sensitive data into the contact form or ordinary email.

Minimum audit access

The useful starting point.

AreaMinimum useful accessNotes
Business contextShort explanation of what the system doesHelps separate critical business logic from low-value technical noise.
Application/CMSAdmin access or guided walkthroughRead-only or restricted admin preferred where available.
CodebaseRepository read access, zip snapshot, or hosted file-tree reviewRepository access is best because history and dependencies are visible.
Hosting/serverHosting dashboard, server notes, or read-only SSHRoot/sudo is not needed for the first pass unless explicitly scoped.
DatabaseEngine/version details and schema visibilityFull database dumps are usually unnecessary for an audit.
BackupsBackup location, retention, schedule, ownership, and last restore testWe need to know whether restore is realistic, not just whether backups exist.
DeploymentNotes on how changes currently go liveManual FTP, SSH deploys, CI/CD, plugin updates, and rollback steps all matter.
ContactsTechnical owner, agency lead, client approverCritical for assumptions, approvals, and incident escalation.
Project context

Gather ownership and business context first.

Useful questions: What happens if this system is down for one day? Who currently fixes production issues? What change is the client asking for now? What are you afraid might break?

Application and code

CMS, framework, and repository access.

For WordPress, WooCommerce, Laravel, custom PHP, Symfony, CodeIgniter, or similar systems, temporary named users and repository read access are preferred.

Application/CMS items

  • Admin URL
  • CMS/admin role and permission level
  • Plugin, theme, extension, or framework version list
  • composer.json and composer.lock if present
  • package.json and lockfile if relevant
  • Cron jobs, queues, caching, search, and integrations

Repository options

  1. Repository read access through GitHub, GitLab, Bitbucket, or similar
  2. Temporary read-only deploy key
  3. Zipped code snapshot through an approved secure channel
  4. Screen-share walkthrough if repository access is not available
Hosting and database

Server, SSH, database, and backups.

Hosting/server

Provider, server type, OS version, web server, PHP runtime, database version, control panel, SSL, DNS, CDN/WAF, backup provider, and monitoring provider.

SSH guidance

Read-only or restricted user preferred for audits. Sudo/root only when explicitly scoped and approved. Key-based SSH preferred over password login.

Database access

Schema visibility and engine/version details are usually enough. Full production database dumps are usually unnecessary for an audit.

Backups

Gather location, owner, frequency, retention, encryption, off-server status, last successful backup, last restore test, restore procedure, and expected restore time.

Deployment and integrations

Know how changes go live.

The audit flags deployment risks and recommends safer next steps where appropriate.

Deployment notes

  • Whether staging exists and matches production
  • How staging is refreshed
  • Whether client data is present on staging
  • Manual or automated deployment process
  • Who has deployment permissions
  • Rollback procedure
  • Whether releases are documented
  • Whether updates are tested before production

External services

  • Payment gateways
  • Email delivery
  • CRM and booking systems
  • Analytics and search
  • SSO or identity providers
  • Shipping, accounting, automation, webhooks, imports, exports, and AI tools
Engagement access levels

Access depends on the engagement.

EngagementPreferred access levelProduction changes?
AuditRead-only wherever possibleNo, unless separately scoped
HandoverRead-only plus stakeholder walkthroughsUsually no
SprintLimited write access for agreed fixesYes, with written approval
UpgradeStaging and deployment accessYes, with backup and rollback plan
CareOngoing least-privilege accessOnly within agreed monthly scope
RescueCase-specific emergency accessOnly with explicit approval and rollback thinking where possible

What not to share in the first message

Do not send passwords, SSH private keys, API keys, .env files, payment gateway credentials, database dumps, production logs, customer exports, screenshots containing personal data, code snippets containing secrets, or confidential documents before NDA if one is required.

Ready to prepare an audit?

Start with the business context and the current worry. StackRefit will confirm the minimum access needed after scoping.