Administrative privileges - Top 10 video series

Do you have an automated patch management framework in place? Learn more about why this is critical to your operations.

Watch more of our Top 10 video series.

Transcript - Enforce the management of administrative privileges

[On screen: Communications Security Establishment logo]

We use technology and networks to do Government of Canada business every day.

But if you’re not properly protecting your networks, they’re vulnerable.

[On screen: Communications Security Establishment - Top 10 IT Security Actions, Enforce the Management of Administrative Privileges]

That’s where the Communications Security Establishment comes in. We’re here to give you the support and advice you need.

Being entrusted with a key grants special access. To your home. Your office. Your networks.

But some places need special keys. Administrative privileges are such keys. They unlock the ability to download, install, and modify systems.

The more keys you give out, the greater the risk those keys could fall into the wrong hands. It could be someone who wants to steal information.

Or take control of your networks. And because they’ve got the keys, they’ll blend in with everyone else.

Don’t trade security for convenience. Limit the number of people with administrative privileges.

Make these keys more secure with authentication features.

[On screen: Advice, Guidance, Services]

Enforcing the management of administrative privileges is just one of CSE’s Top Ten IT Security Actions. Protect your networks. Protect Canada’s information.

[On screen: cse-cst.gc.ca]

Visit CSE online to learn more about the Top 10.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: