- Do not promote update sets, install plugins, install applications, update applications, or change system properties during business hours as it automatically evokes a cache flush.
- Do not edit functionality for an application owned by another group without express permission from them.
- Do not export restricted information to external systems or instances.
- Do not impersonate other admin accounts to create updates.
- Do not grant admin access to other users
- Do not share admin credentials
- Do not use admin accounts to look at restricted records. All record views are recorded in the database.
- Report vulnerabilities found