This objective requires your organization to define and document what constitutes a privileged function within your systems. These are actions that require elevated access rights and could impact the security, stability, or configuration of the system.