As the head of IT administration for a company with a large and diverse team, you are responsible for ensuring that each team has appropriate administrative access. The security team has requested access to the Security Investigation Tool. What steps should you take to grant them access while maintaining proper control?