We need to be able to have a reliable audit trail for system changes in the system. Or have a sys admin role and then the admin roles which will limit access to system configuration changes.