We have a physical machine serving databases and websites. We want to contract a consultant for this planned migration from the older physical Windows machine to an up to date brand new Virtual Machine.
Obviously the contractor will need an account with privileges to make this happen. In this case, I trust them but, at the same time, what if I don't trust them or don't know enough about them to entirely trust them? I was looking for the best practices when this happen (you don't know if you trust the contractor). What if they put a backdoor ? Or by mistake or just without knowing, do something that could later compromise the new machine?
My question: What are the best practices to prepare a security plan when hiring an external contractor to do stuff at our site requiring an account with privileges?
I found this answer : Best practice for providing server admin contractor with root access (on CentOS)? but it was targeting a Linux Flavor, and is possibly dated. I like the suggestion of setting a Statement of Work, which I will consider, but was looking for technical solutions too.