We are currently trying to enhance the security posture of our company, and this means changing how some IT personnel work.
Put precisely, our IT helpdesk currently have 2 separate accounts: 1 for normal day-to-day usage (mails, internet, etc...), and 1 for administrative tasks. The latter is a privileged account having several rights on the AD and some servers.
The way they work is not very secure when it comes to supporting the users: they use their privileged account to login to the user's workstation and perform tasks where admin rights are needed.
But my question is more accurately related to network drives being mapped in their privileged account's profile. They insisted on using the same logon script as with their standard account.
Do you have any recommendations, references to guidelines, and/or best practices in such a case? I'd like to present them some resources to convince them it's not secure to have network drives mapped in this profile.
I tried to explain to them that if they log in a 'contaminated' workstation, their privileges might spread the infection to the network... But they did not understand and argued they need to access some files on the network while assisting the users. They don't want to waste time typing UNC path, etc...