A guide to remove admin priviledges
Misused and unmanaged admin privileges pose a significant risk to your company.
In fact, according to Forrester Research, at least 80 per cent of security breaches involve compromised privileged credentials.
This is why ‘Restrict Administrative Privileges’ is an ACSC Essential Eight and one of the most important controls an organisation can implement to protect itself from detrimental and costly cyber-attacks.
Despite being viewed as one of the most important controls an organisation can implement to achieve cyber resilience, many organisations struggle to remove local admin privileges effectively.
This checklist is a must for anyone wanting to efficiently remove and manage admin privileges in a way that doesn’t get in the way of employee productivity, impact employee satisfaction, or burden your IT team.
This guide details:
The risks associated with admin rights and over-privileged users
The steps to removing admin rights and reducing those risks.
A process for implementing least privilege without jeopardising productivity.