This depends on the size of the company; a CTO may have a broad range of responsibilities, which may require elevated...
A better way to assess appropriate privileges is to think in terms of job responsibilities. Do the day-to-day responsibilities of the CTO or SVP of technology require domain administrator privileges? If so, it is appropriate; if not, the security manager should limit his or her account privileges to the minimum required to do the job, just as everyone else in the company should.
The CTO should understand the concept of access appropriate to role and limiting account privileges. There should be a process in place to evaluate every privileged account on a periodic basis. In doing this, you take away the subjectivity of the conversation and introduce an objective process based on sound business requirements.
- Is it possible to create multiple root user IDs to prevent root password sharing? Find out more.
- Learn how to write a batch file that allows users local admin access for a short time.
Dig Deeper on Privileged access management
Related Q&A from David Griffeth
When laptops or smartphones are stolen, retrieving them can mean the difference between a data breach a close call. Learn if it's possible to combine... Continue Reading
Does password sharing in a company's international branch violate Sarbanes Oxley compliance? Learn enterprise password management solutions for ... Continue Reading
What's the best way to prevent phishing and man-in-the-middle attacks? IAM expert David Griffeth explains the benefits of mutual authentication over ... Continue Reading