Access & Accountability

HOW WE HANDLE ACCESS

Threat Unknown requires administrative access to client environments to do the work. That's not a secret. Here's exactly how that access is scoped, documented, and removed.

//

How It Works

EVERYTHING IS CODE

Every change Threat Unknown makes — policies, configurations, DNS records, access controls — is committed to a GitHub repository that the client owns. Nothing happens off the record. When the engagement ends, the client has a complete, version-controlled history of every change made to their environment.

SCOPED TO THE WORK

Access is provisioned for the specific engagement scope and documented from day one. Admin console changes are screenshotted and logged as evidence. Every access point granted is tracked — so deprovisioning at offboarding is a checklist, not a guess.

VERIFIED AT OFFBOARDING

At the end of every engagement, Threat Unknown runs the same account inventory process we deploy for clients — on ourselves. Every access point is explicitly confirmed removed. The client receives a offboarding record they can verify independently using the tools installed during the engagement.

The Audit Trail

Every change Threat Unknown makes is committed to a GitHub repository that the client owns. You don't need a detection system to find what we did — it's in your git history, with timestamps, commit messages, and pull request descriptions. That record exists whether we are engaged or not, and you can review it at any time.

This is one layer among several — alongside the access log, the scoped provisioning, and the offboarding record. No single mechanism is a guarantee. The combination is.

What You Can Verify Yourself

After any Threat Unknown engagement, you can confirm the following independently:

01
Google Workspace / Okta / Entra ID No Threat Unknown accounts appear in your user directory
02
AWS IAM No ThreatUnknown-* users, roles, or access keys exist
03
Cloudflare No Threat Unknown email address appears under Account Members
04
GitHub No Threat Unknown engineer appears as a repo collaborator or outside collaborator
05
Terraform state The declared state matches your live environment with no undocumented resources

The offboarding record provided at engagement close documents each of these items with the date confirmed and how to check.

QUESTIONS ABOUT ACCESS?

If you have specific concerns about how access is managed for your engagement, ask us directly. We'll walk you through it.