How to protect yourself against privileged user abuse