We follow least-privilege. We will tell you exactly what access we need. You can create temporary accounts, restrict by IP, or route through your IT. We document every change.