Privileged Use Policy
The ASU Information Security Policy establishes guidelines and standards for the preservation of the confidentiality, integrity and availability of University information resources. For additional information: ASU Information Security Policy.
All operating systems and databases have privileged accounts, frequently called “administrator,” “service,” or “root” accounts. These accounts may be used to run specific services or processes on a given system. These types of accounts normally have elevated privileges whereby it can modify the system’s operation, authentication methods, access controls, logs, and the privileges of other accounts.
Users on ASU owned systems should be logged into their regular accounts and not their privileged accounts on a day to day basis.
If you are a user who is needing an exception from the policy for a specific system, contact your IT Manager.
Account Usage for Privileged Use include:
- Installing, upgrading, or troubleshooting system or application software.
- Relocating the individual’s files from critically overloaded locations.
- Performing repairs required to return a system to normal operating parameters.
- Running security checking programs and maintaining system backups.
- Monitoring and tuning the system to ensure capability, continuity, reliability, and security.
Account Usage NOT for Privilege Use Include:
- Surfing the web
- Accessing email
- Opening attachments
- Conducting any other activities beyond their specific intended purpose.