Will the consultant need remote access to the institution's network or systems?
Explanation
Example Responses
Example Response 1
Yes, our consultants will require remote access to your institution's network to perform the database optimization services outlined in our statement of work Specifically, they will need access to your production and development database servers to analyze performance metrics, implement query optimizations, and verify improvements We propose using your institution's existing VPN solution with multi-factor authentication Our consultants will only require read and execute permissions on the database servers (not administrative access), and access will be limited to the 8-week project duration All remote sessions will be logged, and we can work with your security team to establish any additional controls you require.
Example Response 2
No, our consulting team will not require remote access to your institution's network or systems Our architectural review services will be conducted based on documentation you provide and through scheduled on-site visits where our consultants will work alongside your team Any recommendations or deliverables will be provided as documentation, and implementation will be handled by your internal teams If system access becomes necessary during the engagement, we will submit a formal request detailing the specific systems, access level, and duration needed for your security team's review and approval.
Example Response 3
Partial Our security assessment consulting services will require limited remote access to specific systems We will need read-only access to your network monitoring tools and log management systems to conduct the security assessment effectively However, we will not require access to production environments or sensitive data systems All remote access will be conducted through your institution's secure jump box with time-limited credentials that expire after each session Our consultants will connect only from our SOC 2 compliant corporate network using company-managed devices that meet your security requirements We understand this access represents a security consideration and are willing to work within any additional controls your institution requires.
Context
- Tab
- Case-Specific
- Category
- Consulting Services

