Without proper policies or procedures to control usage of the high privilege ID and without evidence of high privilege IDs’ activities review, management cannot ensure that the high privilege IDs’ activities are properly carried out to detect unauthorized use.
The absence of audit trail to keep activities of high privilege IDs and equivalent user IDs may prevent the Company from timely and effectively detect of unauthorized access and use of critical system resources from these highest privilege IDs and