cism video for you are the Information Security Manager of HDA Inc. You discover that a production file, accessible by a member of the software development
You are the Information Security Manager of HDA Inc. You discover that a production file, accessible by a member of the software development team, has full administrative privileges. This account was initially established to enable the developer to download non-sensitive production data for software testing. What recommendation should the information security manager make in this situation?