In the latest update to the CIS Critical Security Controls (v. 6), \Controlled Use of Administrative Privileges" moved up from No. 12 to No. 5. This change reflects a concern that administrative privileges are granted too widely and that those who legitimately have administrative privileges might sometimes engage in risky behavior while logged in as an administrator, such as surfing the Web or reading email.
CSC 5 recommends that "security personnel should periodically gather a list of running processes to determine whether any browsers or email readers are running with high privileges."
But implementing elevated privilege management has its challenges because the controls adversely affect user experience. Or at least used to.
In this webcast, learn about the changes in controls that can help streamline privilege management and make it less visible - and annoying - to users.
View the associated whitepaper here.