This is a dedicated watch page for a single video.
While conducting a review of access authorization controls for a technology company, an IT auditor finds that certain development teams have elevated access rights that exceed the principle of least privilege. How would the auditor approach this situation?