Authorized personnel only.
First login forces a password change and passkey enrollment.
Suspicious activity is logged and surfaced to the founder.
Build only what survives. Ship only what compounds.