Assume the scenario below:
You administer a sensitive IT resource – a database in production network containing important data. An emergency troubleshooting situation arises. A developer has to be provided time-limited, temporary access to the DBMS, say for a day.
How do you handle such a scenario?
In many organizations, the required administrative passwords are conveyed through telephone or transmitted via email. And, the administrative passwords are rarely reset. As a result, the developer will continue to have access to the production database even after completing the troubleshooting task.
These kind of practices bring with them operational and security issues and threats. The organization will become a paradise for malicious insiders and external hackers. They can easily wreak havoc on the confidentiality, integrity and availability of the organization