Narrative Consulting

Engagement Security Controls

Version 1.0  ·  March 2026  ·  Non-negotiable — applies to every engagement

The following controls apply to every Narrative Consulting engagement regardless of scope, duration, or client size. These are not aspirational standards — they are operational requirements. Engagements cannot proceed if these controls cannot be implemented.

01

Authentication Required

Multi-factor authentication is required on every client-provisioned account used during the engagement. Password-only access is never acceptable, with no exceptions.

Authentication requirements:

02

Secure Channels Required

All work is conducted over encrypted, authenticated communication channels. No unencrypted protocols are used for any engagement-related activity.

03

Scoped Access Required

All access is scoped to the minimum required for the engagement. Access is never granted in bulk, and privileged access is time-limited to specific tasks.

04

Activity Logging Required

Every system accessed, action taken, and change made during the engagement is logged and reported. Clients receive a complete activity log as part of their engagement deliverables.

05

Change Management Required

No production changes are made without documented client approval. All changes are tested in non-production environments first, and emergency changes follow pre-agreed break-glass procedures.

06

Separation of Environments Required

Development, staging, and production environments are treated as separate security domains. Access to one does not imply or require access to another.

07

Incident Response Required

Security incidents discovered during an engagement are reported immediately. Consultant action stops on affected systems pending client direction. A written assessment and containment recommendations are provided within 24 hours.