top of page

SecAware materials

SecAware logo

~3-page information security policy template on the operating system privileges needed to install, use and manage IT systems.


Controlling access to and use of privileged user identities is fundamental for IT systems security since most other technical system security controls can be overridden or disabled by privileged users.  Access to and use of privileges must be restricted according to the information risks associated with various IT and communications systems, devices, applications etc., plus the competence and trustworthiness of the workers concerned.


Supplied as an MS Word document, readily customised for your organisation's specific situation.

IT systems privileges policy

bottom of page