IT staff often use generic login IDs, such as root on Unix, Administrator on Windows and sa on SQL Server to manage systems. These IDs have the highest privileges but are not directly connected with people. As a result, access to sensitive systems and data by IT staff is not traceable to them individually, creating a gap in accountability.
For example, there may be an audit trail showing that someone used the Administrator account to read an HR file, but there may be no indication as to which of several authorized IT users actually accessed the file.
Privileged Access Manager records and discloses information about every administrative login, to every system.