The Self-Custody Checklist: Putting It All Together

We have spent nine articles building the intellectual and practical case for self-custody. The case for holding your own keys. The mechanics of hardware wallets and seed phrases. The custody spectrum from hot to deep cold. Multi-sig as distributed sovereignty. Operational security, backup strategies

The Blueprint, Not the Philosophy

We have spent nine articles building the intellectual and practical case for self-custody. The case for holding your own keys. The mechanics of hardware wallets and seed phrases. The custody spectrum from hot to deep cold. Multi-sig as distributed sovereignty. Operational security, backup strategies, inheritance planning, and privacy hygiene. Each article addressed a dimension of the practice. This article assembles them into a single, actionable plan.

Nassim Taleb, in Antifragile, describes the barbell strategy: concentrate your exposure at the extremes and avoid the middle. Applied to self-custody, this means accepting full responsibility for your keys on one end and maintaining simple, durable systems on the other — while avoiding the fragile middle ground of half-measures, partially understood tools, and security theater that looks robust but collapses under stress. The checklist that follows is organized by tier, because the appropriate response to self-custody depends on what you are protecting. A $2,000 position does not need the same architecture as a $200,000 position. Proportionality is not laziness. It is discipline.

What follows is not a menu. It is a graduated implementation plan. Start at the tier that matches your current holdings, implement it fully, and move to the next tier if and when your situation warrants it. A Tier 1 setup that is actually implemented is worth infinitely more than a Tier 3 setup that is partially understood and incompletely executed.

Tier 1: The Starter — Holdings Under $5,000

This is where most people should begin, and where many people should stay for a long time. The goal is to move your crypto off exchanges and into your own custody with a setup that is simple enough to maintain without anxiety. Complexity at this tier creates more risk than it eliminates.

You need a hardware wallet. Purchase it directly from the manufacturer — Trezor, Ledger, Coldcard, or BitBox02 . Do not buy from Amazon, eBay, or any third-party reseller. Tampered devices are a real attack vector, and saving twenty dollars is not worth the risk. When the device arrives, verify the packaging integrity according to the manufacturer’s instructions, set it up from scratch, and generate your seed phrase on the device itself. Never type your seed phrase into a computer, phone, or any internet-connected device at any point for any reason.

Back up your seed phrase on metal. A Cryptosteel Capsule, Billfodl, or Blockplate will survive fire and water . Paper is acceptable as a temporary measure, but paper burns, fades, and dissolves. Metal endures. Store the metal backup in a secure location — a home safe, a locked drawer, somewhere you control that is not obvious to a casual intruder. At this tier, one backup copy in one secure location is sufficient. The risk of a single-copy loss is real but proportional to the holdings involved.

Set up hardware-based two-factor authentication on every account related to your crypto. A YubiKey or similar FIDO2 device replaces SMS-based 2FA, which is vulnerable to SIM swap attacks. Remove your phone number from exchange accounts if the platform allows it. This single step eliminates the most common attack vector for crypto theft at any tier.

Write a simple inheritance letter. It does not need to be elaborate. It needs to exist. A sealed envelope in a safe location that tells a trusted person: what you own, where the hardware wallet is, where the seed phrase backup is, and step-by-step instructions for recovery. Review it once a year.

The common mistake at this tier is losing the seed phrase. People generate it, write it on the card that came with the hardware wallet, put the card somewhere “safe,” and cannot find it eighteen months later. Treat the seed phrase with the respect it deserves from day one.

Tier 2: The Moderate Position — Holdings Between $5,000 and $50,000

At this level, the security architecture becomes more deliberate. The hardware wallet and seed phrase from Tier 1 remain the foundation. What changes is redundancy, separation, and the introduction of a passphrase.

Store your metal seed backup in two geographically separate locations. Your home and a safe deposit box. Your home and a trusted family member’s home. The specific locations matter less than the principle: if one location is destroyed or compromised, the other survives. This addresses the single-copy problem that is acceptable at Tier 1 but unacceptable when the stakes increase.

Add a passphrase — sometimes called the 25th word. This is an additional word or phrase that you choose, which creates an entirely separate wallet derived from the same seed phrase. The seed phrase alone opens your decoy wallet, which may hold a small amount. The seed phrase plus the passphrase opens your real wallet. This provides plausible deniability in a coercion scenario and adds a second factor to your seed phrase backup — even if someone finds your metal plate, they cannot access your primary holdings without the passphrase. Store the passphrase separately from the seed phrase, in a different location.

Use a dedicated device for high-value transactions. This does not need to be expensive. A basic laptop that is used only for interacting with your hardware wallet and nothing else — no email, no web browsing, no software downloads beyond the wallet application itself — dramatically reduces the attack surface. Wipe it and reinstall the operating system periodically if you want additional assurance. The cost is trivial compared to the holdings it protects.

Formalize your inheritance plan. The simple letter from Tier 1 becomes a more detailed document, and you should have a conversation with your designated heir about its existence and location. If you use a passphrase, your inheritance plan must account for it — the seed phrase without the passphrase gives access to the decoy wallet, not the real one. This is the kind of detail that is easy to overlook and catastrophic to miss.

The common mistake at this tier is over-complicating the setup. Adding multiple hardware wallets, splitting funds across too many addresses, creating elaborate multi-location backup schemes that you cannot actually remember or maintain. Complexity is the enemy of execution. A setup you understand completely and maintain consistently is more secure than a setup that is theoretically superior but practically neglected.

Tier 3: Substantial Holdings — $50,000 and Above

At this tier, the single-key model reaches its limits. One seed phrase controlling significant wealth is a single point of failure regardless of how well it is backed up and protected. Multi-sig becomes not just advisable but necessary.

Implement a 2-of-3 multi-signature setup. Three keys, any two of which are required to sign a transaction. Distribute the keys across different devices, different locations, and potentially different holders. One key on a hardware wallet you use regularly. One key on a hardware wallet stored in a geographically separate secure location. One key held by a collaborative custody service like Casa or Unchained Capital .

The collaborative custody model is the practical sweet spot for this tier. The service holds one key and provides a recovery coordinator who can assist your heirs. You hold two keys — operational control during your lifetime, a structured recovery path after your death. No single party can move funds unilaterally. A lost key can be replaced using the remaining two. The architecture survives the loss of any single key, any single location, or any single person.

Integrate your crypto holdings into a legal estate plan. Mention the existence of cryptocurrency assets in your will without including keys or security details. Designate a crypto-literate executor. Consider a trust structure for significant holdings — trusts avoid probate, which keeps the details of your holdings out of public record, and they provide a legal framework for the key-transfer process.

Conduct regular security audits. Annually, at minimum, verify that your backups are accessible and intact. Confirm that your hardware wallets function and that you can sign transactions with each key in your multi-sig setup. Test the recovery process — not just mentally, but physically. A backup you have never tested is a backup that might not work. Update your inheritance documentation to reflect any changes in your custody setup, your holdings, or the people involved.

The common mistake at this tier is not setting up multi-sig at all. The perceived complexity deters people, and they rationalize that their single-key setup with a passphrase and multiple backups is “good enough.” For holdings of this magnitude, it is not. The gap between a well-executed single-key setup and a well-executed multi-sig setup is the gap between a plan that has a single point of failure and a plan that does not.

Tier 4: Institutional and High-Value Holdings

This tier applies to holdings well into six figures and above, business treasuries, or shared custody arrangements. The principles are the same as Tier 3; the implementation is more rigorous.

Move to a 3-of-5 multi-signature setup. Five keys, three required to sign. This provides deeper redundancy — two keys can be lost or compromised without affecting your ability to transact. Distribute keys across multiple hardware wallet types (mixing manufacturers reduces the risk of a single firmware vulnerability), multiple geographic locations, and multiple custodians.

Engage professional collaborative custody with full-service support. At this level, the annual cost of a Casa or Unchained plan is trivial relative to the holdings it protects. The service provides key management, inheritance coordination, and recovery support that would be difficult to replicate independently.

Implement a formal legal trust structure with an attorney specializing in digital asset estate planning. The trust holds the instruction documents, the trust agreement specifies the conditions for key transfer, and the trustee has legal authority to coordinate the recovery process. This is not optional at this tier; it is the legal infrastructure that makes the technical infrastructure enforceable.

Conduct security audits at least twice annually. Engage independent review of your setup if warranted. Rotate keys if you have any reason to believe a key may have been compromised — a process that multi-sig makes possible without losing access to your funds.

Universal Practices Regardless of Tier

Certain practices apply at every level and should be treated as non-negotiable hygiene, not optional enhancements.

Never store seed phrases digitally. Not in a password manager. Not in an encrypted file. Not in a photograph. Not in a note on your phone. The moment a seed phrase exists in digital form on an internet-connected device, it is exposed to a category of attacks that no amount of encryption can fully mitigate. Seed phrases live on metal or archival paper, in physical locations, and nowhere else.

Use hardware-based two-factor authentication on every account that touches your crypto: exchanges, email accounts associated with exchanges, collaborative custody services. A YubiKey is a small investment that closes the most common attack vector.

Verify receive addresses on your hardware wallet screen before sending significant transactions. Malware that replaces clipboard addresses with an attacker’s address is a documented attack. Your hardware wallet’s screen is the only display you can trust; your computer’s screen is not.

Test recovery annually. Verify that you can access your backups, that your hardware wallets function, that your PINs and passwords are correct, and that your inheritance documentation is current. This is the annual review that keeps the entire system honest.

The DeFi Extension

If you participate in decentralized finance, extend the tier system with wallet separation. Maintain separate wallets for different functions: a spending wallet with limited funds for daily transactions, a DeFi wallet for protocol interactions with only the funds actively deployed, and cold storage that never interacts with smart contracts. This limits blast radius. A compromised DeFi approval cannot drain your cold storage if the two wallets have never interacted.

Smart contract approvals are a persistent risk in DeFi. Every time you approve a token for use by a protocol, you grant that protocol’s smart contract access to your tokens — often unlimited access. Regularly review and revoke unnecessary approvals using tools like Revoke.cash . An approval you forgot about is an attack surface that persists until you explicitly remove it.

The Annual Review

Self-custody is not a one-time project. It is a practice — ongoing, deliberate, and periodically reassessed. Once a year, sit down and walk through the following:

Check your backups. Are they physically present and intact in their designated locations. Confirm that your metal seed plates are readable and that your hardware wallets power on and function. Verify that your PINs and passwords are correct and that you remember your passphrase if you use one.

Update your inheritance plan. Have your holdings changed significantly. Have the people involved changed — new spouse, new executor, estranged family member. Has your custody setup changed in ways that the instruction letter does not reflect. Update the documentation and re-seal it.

Review your security practices. Have you reused addresses. Have you accumulated unnecessary token approvals. Have you been using SMS-based 2FA anywhere. Have you stored anything digitally that should only exist physically. Correct what needs correcting.

Assess whether your tier has changed. Holdings grow — sometimes dramatically in crypto. A position that was appropriate for Tier 1 a year ago may warrant Tier 2 now. Moving up a tier is not an emergency, but it should be a deliberate decision made during a calm review, not a reaction to a security scare.

This series has covered the architecture of self-custody from first principles to daily practice. The checklist above is the blueprint for a cabin that is actually built — not just planned, not just admired from a distance, but constructed with care, maintained with discipline, and designed to last longer than you do.


This article is part of the Self-Custody & Cold Storage series at SovereignCML.

Related reading: The Case for Self-Custody, Hardware Wallets: The Foundation of Cold Storage, Inheritance Planning for Crypto Assets

Read more