Skip to content
Back to Home

Trust & Security

Trust Center

How we protect your systems and data during every engagement.

Last updated March 2026

Security Commitments

Built into every engagement

Credential Security

Client credentials are never stored locally. All access uses client-provisioned accounts with time-bound access. Credentials transmitted only via client-approved secure methods.

Scoped Access

Consultant access is limited to systems necessary for the engagement. No standing access. All access is requested, justified, and time-bound.

Activity Logging

Every system accessed, action taken, and change made is logged. Activity logs are included in engagement deliverables for your records.

Data Purge

All client data, working documents, and access artifacts are purged within 14 days of engagement completion. Written confirmation provided.

Device Security

Full-disk encryption, OS-level firewall, automatic screen lock. No client work on shared or public devices. Ever.

Access Revocation

All client-provisioned access is revoked within 24 hours of engagement completion. No lingering accounts, no exceptions.

Controls

Every Engagement, Every Time

Non-negotiable controls that apply to every engagement regardless of size.

01

MFA Required

Multi-factor authentication on all client-provisioned accounts. Password-only access is never acceptable.

02

Encrypted Channels

All work over encrypted connections (TLS 1.2+). Enterprise-grade platforms only: Google Meet, Zoom, and Teams.

03

Change Management

No production changes without documented client approval. Emergency changes follow pre-agreed break-glass procedures.

04

Incident Response

Security incidents discovered during engagement reported within 2 hours with assessment and containment recommendations.