Mechanisms exist to audit the execution of privileged functions.
Does the organization audit the execution of privileged functions?