Mechanisms exist to log and review the actions of users and/or services with elevated privileges.
Does the organization log and review the actions of users and/or services with elevated privileges?