User accounts and privileges
Recommendations to optimize cybersecurity in a protected environment:
Assign users only the essential privileges needed to perform their role.
Revoke user privileges when no longer needed due to role change, transfer or termination. User credentials do not expire.
Follow user account management tasks as described by your organization or contact your network administrator.