Part of the Network administration glossary:

A superuser is a network account with privilege levels far beyond those of most user accounts.

Superuser accounts may belong to network or system administrators, database administrators (DBAs), CIOs or CEOs. In larger enterprises, a superuser account is often accessed by multiple users. 

Superuser accounts are necessary for platform management functions but it's necessary to control and oversee them. Because these accounts have elevated access rights, those with access can bypass the internal controls of the target platform. Once these controls are bypassed, users can breach confidential information, change transactions and destroy audit data. 

To protect corporate networks from misuse or abuse of superuser accounts, privileged identity management (PIM) policies and processes should be established. 

This was last updated in November 2013
Contributor(s): Ivy Wigmore
Posted by: Margaret Rouse

Related Terms

Definitions

Glossaries

  • Network administration

    - Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • How effective are antivirus apps for Android?

    I have used a couple of them earlier..but not really sure if they are actually of use. It would really be good if some one can provide some insights.

  • Privacy of Data - SAP Implementation

    <i>Is he justified in asking for that?</i> If the privilege is granted, yes. Otherwise, no. Regardless, the consultant should have no difficulty in providing acceptable justification....

  • How to Force a Joblog.

    Hi, Maybe the easiest way is to change the default on the SIGNOFF command to LOG(*LIST) instead of LOG(*NOLIST). Regards, Martin Gilbert.

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.