All system users must:••••protect account authenticators at the same classification as the system it securesnot share authenticators for accounts without approvalbe responsible for all actions under their accountsuse their access to only perform authorised tasks and functions.
2008
All privileged users must: a. comply with the relevant policies, plans and procedures for the system they are using b. protect the authenticators for privileged accounts at the highest level of information it secures c. not share authenticators for privileged accounts without approval d. be responsible for all actions under their privileged accounts e. use privileged access only to perform authorised tasks and functions f. report all potentially ICT security related issues to the ITSA.