WislaCode

Fintech Software Outsourcing

How to Spot a Dangerous Contractor Before Sprint 1

Fintech Software Outsourcing. How to Spot a Dangerous Contractor Before Sprint 1 - WislaCode
Article navigation
Publication date: 15.05.2026

The dangerous contractor in fintech is usually visible before the first sprint. Not in Jira. In the sales process. By the time a delivery partner disappoints you in sprint 3, the real damage is already done. Wrong staffing model, drifting architecture, code in the wrong environment, vague security, and a hidden subcontracting chain. This article is a practical operator checklist for CTOs, product leads, and engineering managers who want to catch those problems early.

How to evaluate a fintech delivery partner before the first sprint?

Most teams start vendor selection with rates, CVs, and demo velocity. That is the wrong order.

In fintech, the product is about money movement, identity, customer trust, and regulatory accountability. Regulators treat third-party risk as a lifecycle problem, not a procurement checkbox. DORA, applied in the EU since 17 January 2025, pushes that risk upstream with ex-ante assessments, audit rights, and documented exit plans. The PRA expects equivalent rigour for material outsourcing. The EBA is explicit that management remains responsible and outsourcing must not turn a financial institution into an empty shell.

So the pre-sprint question is not “Can they code?” It is “Will this delivery model let us keep control?”

Meet the real delivery system, not the sales layer

A polished presales team tells you almost nothing about the people who will actually ship the product.

Before you sign, meet the named delivery lead. Not “someone from engineering”. The person who will own trade-offs, escalation, staffing quality, and release judgment. Then ask who owns security, QA, and environment decisions. If the answers are vague, the operating model is vague too.

DORA requires due diligence on provider capability, human resources, and organisational structure. The PRA says due diligence should examine the provider’s business model, expertise, and any subcontracted providers involved. In practice, that means verifying the team you are buying, not the team that pitched.

Red flags at this stage:

  • No named delivery lead before contract

  • “We finalise the team after kickoff”

  • One strong architect in the pitch, an anonymous bench behind the slide

  • No clear owner for incidents, release approvals, or non-functional trade-offs

WislaCode Your Trusted Partner in Software Development

Let's start a conversation and develop a solution for your campany that will allow you to expand and scale your customer experience.

Calibrate capability on real tasks and trace who actually does the work

Role inflation is one of the oldest and most expensive tricks in software outsourcing. If juniors are sold as mids and mids as seniors, the client pays twice. First in rate. Then in leadership bandwidth, rework, and delay.

Do not calibrate seniority on a CV pack. Run a real working session instead. Give the proposed team one bounded task before sprint 1.

Good calibration exercises:

  • Review a user story with real non-functional constraints
  • Propose test cases for a payment failure mode
  • Walk through a slice of architecture and explain the trade-offs
  • Run a live incident-triage exercise

A good team gets sharper under pressure. A weak team gets generic. If the vendor resists a paid discovery task or calibration workshop, that tells you how they expect the relationship to work.

Subcontracting is the other hidden variable. You should know who writes the code, who runs the environments, and who touches production data. DORA requires due diligence on whether the provider uses subcontractors for critical functions. The EBA and PRA go further and expect contractual rights to be informed of planned sub-outsourcing, to object where risks increase, and to preserve audit rights through the chain.

Ask for a supply-chain view before kickoff. Direct team, subcontractors, hosting dependencies, support roles, and jurisdictions involved. If the vendor will not disclose this before signing, treat it as a red flag, not a negotiation detail.

Why control, security, and exit readiness matter more than sprint velocity?

In fintech outsourcing, the real risk is not slow delivery. It is losing control over code, environments, knowledge, and regulatory accountability.

If the code, pipeline, observability, and runbooks live entirely in the vendor’s environment, you do not have delivery leverage. You have a dependency. That can be acceptable for a narrow commodity service. It is dangerous for a regulated product or a core fintech capability.

Assess the vendor’s security and compliance model before work begins

A surprising number of vendor conversations treat security as something that becomes concrete after discovery. In fintech, that is too late.

DORA requires an ex-ante risk assessment covering operational, legal, ICT, reputational, and data protection risks. The PRA expects firms to assess identity and access management, encryption, logging, incident response, and data segregation. NIST’s Secure Software Development Framework provides a practical vocabulary for evaluating how a vendor builds security into the development lifecycle.

Before sprint 1, ask the vendor to explain:

  • Identity and privileged access control
  • Secrets handling in development and CI/CD
  • Dependency and vulnerability management
  • Logging and evidence retention
  • Data location and residency
  • Incident detection and response
  • Backup and recovery
  • How secure development fits into daily delivery, not just policy documents

You are looking for operational clarity, not perfect documents. If the vendor can only show generic policy names, or nobody can explain how secrets move through the pipeline, or incident response sounds like a support mailbox, the security model is not ready for regulated delivery.

Certifications like ISO 27001 are useful signals. They are not a substitute for control.

Few successful projects of WislaCode
Defining the Core System Architecture
Mobile banking app with an innovative user experience
Seamless Integration $Lana
$Lana: A Credit PWA for the Mexican Market

Design the exit and define delivery metrics before kickoff

Many teams avoid exit planning because it sounds pessimistic. That is backwards. Exit planning is a design input. DORA requires a documented exit plan for each relevant ICT contract, plus periodic review and testing. The PRA expects firms to estimate timing, cost, resourcing, and risk triggers during the pre-outsourcing phase. Before sprint 1, define where code and knowledge live, what documentation is mandatory every sprint, what triggers transition or termination, and what knowledge-transfer rhythm the team will follow. The strongest starting position:
  • Code in the client repo
  • Client-visible CI/CD
  • Client-controlled access model
  • Shared observability
  • Client access to architecture notes, test evidence, and operating documentation
The vendor can still deliver fast. But the client retains visibility. Metrics matter just as much. If the vendor optimises for hours and headcount, do not be surprised when you get more hours and more headcount. The incentives are wrong. Agree on delivery KPIs before sprint 1:
Metric What it reveals
Lead time How quickly value moves from idea to production
Deployment frequency How often the team ships working software
Change failure rate How stable each release is
Time to restore How fast the team recovers from failure
Defect escape rate How much escapes testing into production
Cycle time by story type Where bottlenecks sit in the delivery flow
These metrics force the conversation away from effort theatre and toward operating quality. A simple pre-sprint scorecard pulls everything together. Answer yes or no before the first sprint:
  1. Have we met the named delivery lead?
  2. Have we calibrated seniority on a real working session?
  3. Will the work live in a client-visible environment?
  4. Can the vendor explain secure SDLC and incident handling concretely?
  5. Are data location and access controls documented?
  6. Is the subcontracting chain visible?
  7. Do audit and access rights work in practice, not only on paper?
  8. Is there a drafted exit and knowledge-transfer plan?
  9. Are KPIs defined beyond hours and headcount?
Zero to three yes answers means the wrong vendor or the wrong control model. Four to six means proceed only if the scope is non-critical and supervision is heavy. Seven to nine is a reasonable starting point, provided the contract aligns with the operating model. This is not an anti-outsourcing argument. Good external teams move faster, add scarce expertise, and force useful clarity. But in fintech, the real decision is not whether to use a contractor. It is whether the contractor’s delivery model helps you maintain control over risk, knowledge, and operational resilience. At WislaCode, we work with fintech teams on regulated builds, migrations, and rescue projects where delivery control is not optional. We are happy to compare due diligence checklists. This topic is too expensive to improvise.
FAQ

Run a bounded working session with the proposed team rather than relying on CV packs. Give them a real task like reviewing architecture trade-offs, proposing test cases for a payment failure, or triaging a simulated incident. A strong team gets sharper under that kind of pressure, while a weak team defaults to generic answers.

Ask for a full supply-chain view before kickoff, covering the direct team, subcontractors, hosting dependencies, support roles, and jurisdictions. DORA and the EBA both expect contractual rights to be informed of planned sub-outsourcing and to object where risks increase. If the vendor will not disclose the chain before signing, treat that as a red flag.
It should cover at least nine areas: named delivery lead, seniority calibration on real work, client-visible code and environments, security and compliance operating model, data location and access controls, subcontracting chain visibility, practical audit rights, exit and knowledge-transfer plan, and delivery KPIs beyond hours. Scoring below four out of nine suggests the wrong vendor or the wrong control model.
Focus on lead time, deployment frequency, change failure rate, time to restore, and defect escape rate. These metrics reveal operating quality rather than effort volume. They also force the vendor to optimise for outcomes, which is what regulators expect when they require ongoing monitoring through key performance indicators.
Yes. DORA requires a documented exit plan for each relevant ICT contract, and the PRA expects firms to estimate timing, cost, and resourcing during the pre-outsourcing phase. Designing the exit before kickoff is not pessimistic. It is a delivery discipline that protects knowledge, code ownership, and operational continuity if the relationship needs to change.
Share:
About the Author

Viacheslav Kostin is the CEO of WislaCode. Former C-level banker with 20+ years in fintech, digital strategy and IT. He led transformation at major banks across Europe and Asia, building super apps, launching online lending, and scaling mobile platforms to millions of users.
Executive MBA from IMD Business School (Switzerland). Now helps banks and lenders go fully digital - faster, safer, smarter.

Scroll to Top