1. Whoever requires this kind of access should specify the exact reason why this is needed. He should
also specify the dates for which he needs it.
2. This kind of access should be approved through the approval process in place.
3. Open the Super user id for those many days and send the email with the user id and another email
with the initial password.
4. Make sure Security Audit log is enabled for these user ids.
5. Once the user is done, lock the super user id again and take approval for the functionality that user
has completed using this user id. Security Audit log can help you with this.
6. Make sure you are preserving the documents related to activation of the Super user id and the
subsequent documents of Audit log and its approval.