Administrative Privileges

Do you regularly review who has administrative privileges on your networks? Learn more about why you should.

Watch more of our Top 10 video series.

Enforce the Management of Administrative Privileges - HTML5 Transcript/Captions

(This video opens to the Communications Security Establishment logo on a black background. A woman in blue business attire types on her smartphone. The woman is waiting next to the counter for her order in a café. The barista hands her the coffee with a smile.)

We use technology and networks to do Government of Canada business everyday.

(She picks up her coffee and steps out of the building as other customers walk in.)

But if you’re not properly protecting your networks, they’re vulnerable.

(As she begins to walk away, the title appears: “Communications Security Establishment - Top 10 IT Security Actions, Enforce the Management of Administrative Privileges.”)

That’s where the Communications Security Establishment comes in. We’re here to give you the support and advice you need.

( While crossing a busy downtown intersection, a holographic icon in the form of a blue key pops up next to her.)

Being entrusted with a key grants special access. To your home. Your office. Your networks.

( As she walks on the sidewalk, her job title appears next to the holographic key: “Network Administrator.”)

But some places need special keys. Administrative privileges are such keys. They unlock the ability to download, install, and modify systems.

( Seen from high above and still tagged by her key icon, the network administrator crosses a street. Holographic key icons pop up next to other pedestrians walking by. One of the new key icons, this one attached to a man, glitches and turns from blue to red.)

The more keys you give out, the greater the risk those keys could fall into the wrong

( A street level view shows the network administrator heading towards the entrance of a government building. Many other people with blue keys over their heads are heading in the same direction, including the man tagged with the red corrupted key icon.)

hands. It could be someone who wants to steal information.

( The entrance and hallway of the building are shown in fast-forward. A large number of people enter, all tagged with key icons, including the man with the red key. He enters a vast open space office filled with colleagues sitting at their respective workstations. Everyone has a blue key icon over their heads. The woman also sits at a workstation. The blue key icons nearest to the red one begin to glitch and turn red. This effect slowly spreads throughout the office.)

Or take control of your networks. And because they’ve got the keys, they’ll blend in with everyone else.

( More and more holographic blue key icons turn red. Every key is now red, indicating that it has been compromised, apart from the woman possessing the network administrator blue key icon. A sudden visual quake makes all red key icons disappear.)

Don’t trade security for convenience. Limit the number of people with administrative privileges.

( Her holographic icon animates, changing from a blue key icon into a blue lock. The words “Network Administrator” turn to a blinking “Authenticating” sign, and then revert to “Network Administrator”.)

Make these keys more secure with authentication features.

( Working at her desk, she is now the only person amongst her many colleagues tagged with a holographic icon. The CSE building exterior is show in its entirety. Multicolored triangles reminiscent of the CSE building’s triangular windows appear to form a motif. Inside it, the words: “Advice Guidance Services” emerge.)

Enforcing the management of administrative privileges is just one of CSE’s Top Ten

(The words are then replaced with the CSE internet Web site address: “cse-cst.gc.ca”.)

IT Security Actions. Protect your networks. Protect Canada’s information. Visit CSE online to learn more about the Top 10.