The following controls apply to every Narrative Consulting engagement regardless of scope, duration, or client size. These are not aspirational standards — they are operational requirements. Engagements cannot proceed if these controls cannot be implemented.
Multi-factor authentication is required on every client-provisioned account used during the engagement. Password-only access is never acceptable, with no exceptions.
Authentication requirements:
All work is conducted over encrypted, authenticated communication channels. No unencrypted protocols are used for any engagement-related activity.
All access is scoped to the minimum required for the engagement. Access is never granted in bulk, and privileged access is time-limited to specific tasks.
Every system accessed, action taken, and change made during the engagement is logged and reported. Clients receive a complete activity log as part of their engagement deliverables.
No production changes are made without documented client approval. All changes are tested in non-production environments first, and emergency changes follow pre-agreed break-glass procedures.
Development, staging, and production environments are treated as separate security domains. Access to one does not imply or require access to another.
Security incidents discovered during an engagement are reported immediately. Consultant action stops on affected systems pending client direction. A written assessment and containment recommendations are provided within 24 hours.