Use case

There is no 'download the spreadsheet' path

Keystacker exports are encrypted by design, scoped to authorized roles, and recorded — so secrets never leave the system as plaintext.

There is no unencrypted secret export path.

Encrypted-only export pathway

There is no unencrypted export option. Authorized exports are encrypted and recorded in the audit trail.

Scoped to authorized roles

Only operators with explicit permission can initiate exports. Read-only and standard technician roles cannot.

Recorded for reviewers

Every export is captured with actor, scope, and timestamp — ready for auditors without screenshots or reconstructions.