Calibrate capability on real tasks and trace who actually does the work
Role inflation is one of the oldest and most expensive tricks in software outsourcing. If juniors are sold as mids and mids as seniors, the client pays twice. First in rate. Then in leadership bandwidth, rework, and delay.
Do not calibrate seniority on a CV pack. Run a real working session instead. Give the proposed team one bounded task before sprint 1.
Good calibration exercises:
- Review a user story with real non-functional constraints
- Propose test cases for a payment failure mode
- Walk through a slice of architecture and explain the trade-offs
- Run a live incident-triage exercise
A good team gets sharper under pressure. A weak team gets generic. If the vendor resists a paid discovery task or calibration workshop, that tells you how they expect the relationship to work.
Subcontracting is the other hidden variable. You should know who writes the code, who runs the environments, and who touches production data. DORA requires due diligence on whether the provider uses subcontractors for critical functions. The EBA and PRA go further and expect contractual rights to be informed of planned sub-outsourcing, to object where risks increase, and to preserve audit rights through the chain.
Ask for a supply-chain view before kickoff. Direct team, subcontractors, hosting dependencies, support roles, and jurisdictions involved. If the vendor will not disclose this before signing, treat it as a red flag, not a negotiation detail.
Why control, security, and exit readiness matter more than sprint velocity?
In fintech outsourcing, the real risk is not slow delivery. It is losing control over code, environments, knowledge, and regulatory accountability.
If the code, pipeline, observability, and runbooks live entirely in the vendor’s environment, you do not have delivery leverage. You have a dependency. That can be acceptable for a narrow commodity service. It is dangerous for a regulated product or a core fintech capability.
Assess the vendor’s security and compliance model before work begins
A surprising number of vendor conversations treat security as something that becomes concrete after discovery. In fintech, that is too late.
DORA requires an ex-ante risk assessment covering operational, legal, ICT, reputational, and data protection risks. The PRA expects firms to assess identity and access management, encryption, logging, incident response, and data segregation. NIST’s Secure Software Development Framework provides a practical vocabulary for evaluating how a vendor builds security into the development lifecycle.
Before sprint 1, ask the vendor to explain:
- Identity and privileged access control
- Secrets handling in development and CI/CD
- Dependency and vulnerability management
- Logging and evidence retention
- Data location and residency
- Incident detection and response
- Backup and recovery
- How secure development fits into daily delivery, not just policy documents
You are looking for operational clarity, not perfect documents. If the vendor can only show generic policy names, or nobody can explain how secrets move through the pipeline, or incident response sounds like a support mailbox, the security model is not ready for regulated delivery.
Certifications like ISO 27001 are useful signals. They are not a substitute for control.