The use of utility programs that can be capable of overriding system and application controls should be restricted and tightly controlled.
The use of privileged utility programs in information security refers to the use of specialized software programs that are used to perform specific system and network management tasks that require elevated privileges, such as administrative or root access.
Examples of privileged utility programs include:
AvISO will be updating and reviewing all the information regularly, so keep us bookmarked and keep checking!
Got a question or need help? Don't hesitate to reach out to our team.
If you would like to know more about ISO Standards, Certification and the value of a good management system you can add to your business we would love to hear from you: Kent: 01892 800476 | London: 02037 458 476 | info@avisoconsultancy.co.uk