Skip to main content

Principles of Least Privilege

 

What is the principle of least privilege (POLP)?

The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs. Users are granted permission to read, write or execute only the files or resources necessary to do their jobs. This principle is also known as the access control principle or the principle of minimal privilege.

POLP can also restrict access rights for applications, systems and processes to only those who are authorized.

Depending on the system, some privileges may be based on attributes contingent on the user's role within the organization. For example, some corporate access systems grant the appropriate level of access based on factors such as location, seniority or time of day. An organization can specify which users can access what in the system, and the system can be configured so the access controls recognize only the administrators' role and parameters.

What is a superuser?

A superuser account provides information technology (IT) staff members with unlimited privileges so they have full read, write and execute authority and can make changes across a network. This includes installing software, modifying settings and files, and deleting data and users. Superuser accounts are only given to the most trusted individuals, usually systems administrators (sys admins) or the equivalent. The superuser account is also known as an administrator account and is often given the name root.

To prevent superuser sessions from being hijacked, a superuser can type the sudo command into any account, which enables the account to temporarily perform a single command with superuser privileges. Ideally, superuser credentials are not used for logging in; since the superuser account has full control of the system, it must be protected from unauthorized access.

Controlling access

Least-privileged users (LPUs) are those with the most limited access and often the lowest level of authority within the company. In an organization, users often have elevated levels of access to the network and the data on it. When an LPU is set up, that user account has limited privileges and can perform only specific tasks, such as surfing the web or reading email. This makes it harder for a malicious attacker to use an account to cause harm.

Another way to control user access is by implementing a concept called privilege bracketing. This approach involves permitting users access to administrator accounts for the shortest time necessary to complete the specific task. This function can be administered through special automated software to ensure that access is granted only for the specified amount of time.

What is privilege creep?

POLP is not only about taking away privileges from users; it's also about monitoring access for those who do not require it. For example, privilege creep refers to the tendency of software developers to gradually add more access rights beyond what individuals need to do their job. This can cause major cybersecurity risks to the organization. For example, employees who are promoted may still need temporary access rights to certain systems for their old job. But, once they are settled in their new position, more access rights are added, and existing privileges often are not revoked. This unnecessary accumulation of rights could result in data loss or theft.

Benefits of using principle of least privilege

  • Prevents the spread of malware. By imposing POLP restrictions on computer systems, malware attacks cannot use higher-privilege or administrator accounts to install malware or damage the system.
  • Decreases chances of a cyber-attack. Most cyber-attacks occur when an attacker exploits privileged credentials. POLP protects systems by limiting the potential damage that can be caused by an unauthorized user gaining access to a system.
  • Improves user productivity. Only giving users required access to complete their necessary tasks means higher productivity and less troubleshooting.
  • Helps demonstrate compliance. In the event of an audit, an organization can prove its compliance with regulatory requirements by presenting the POLP concepts it has implemented.
  • Helps with data classification. POLP concepts enable companies to keep track of who has access to what data in the event of unauthorized access.

While POLP helps minimize the risk of an unauthorized user accessing sensitive data, the main disadvantage is that the minimum permissions must be consistent with a user's roles and responsibilities, which might be challenging in larger organizations. For example, users might not be able to perform a certain required task if they don't have the appropriate privilege access.

How to implement POLP

Applying POLP concepts can be as simple as eliminating end-user access to devices, such as removing Universal Serial Bus (USB) drives to prevent the exfiltration of classified information, to more involved operations, such as conducting regular privilege audits.

Organizations can successfully implement POLP by doing the following:

  • conducting privilege audits by reviewing all existing processes, programs and accounts to ensure there is no privilege creep;
  • starting all accounts with least privilege and adding privileges according to the access required to perform;
  • implementing separation of privileges by distinguishing between higher-level privilege accounts and lower level-privilege accounts;
  • assigning just-in-time privileges by providing higher-level privilege accounts limited access to complete the necessary task; and
  • tracking and tracing individual actions conducted by one-time-use credentials to avoid potential damage.


Comments

Popular posts from this blog

Black swan

A  black swan event  is an incident that occurs randomly and unexpectedly and has wide-spread ramifications. The event is usually followed with reflection and a flawed rationalization that it was inevitable. The phrase illustrates the frailty of inductive reasoning and the danger of making sweeping generalizations from limited observations. The term came from the idea that if a man saw a thousand swans and they were all white, he might logically conclude that all swans are white. The flaw in his logic is that even when the premises are true, the conclusion can still be false. In other words, just because the man has never seen a black swan, it does not mean they do not exist. As Dutch explorers discovered in 1697, black swans are simply outliers -- rare birds, unknown to Europeans until Willem de Vlamingh and his crew visited Australia. Statistician Nassim Nicholas Taleb uses the phrase black swan as a metaphor for how humans deal with unpredictable events in his 2007...

A Graphics Processing Unit (GPU)

A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images. A GPU may be found integrated with a central processing unit (CPU) on the same circuit, on a graphics card or in the motherboard of a personal computer or server. In the early days of computing, the CPU performed these calculations. As more graphics-intensive applications such as AutoCAD were developed; however, their demands put strain on the CPU and degraded performance. GPUs came about as a way to offload those tasks from CPUs, freeing up their processing power. NVIDIA, AMD, Intel and ARM are some of the major players in the GPU market. GPU vs. CPU A graphics processing unit is able to render images more quickly than a central processing unit because of its parallel processing architecture, which allows it to perform multiple calculations at the same time. A single CPU does not have this capability, although multi...

6G (sixth-generation wireless)

6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency. One of the goals of the 6G Internet will be to support one micro-second latency communications, representing 1,000 times faster -- or 1/1000th the latency -- than one millisecond throughput. The 6G technology market is expected to facilitate large improvements in the areas of imaging, presence technology and location awareness. Working in conjunction with AI, the computational infrastructure of 6G will be able to autonomously determine the best location for computing to occur; this includes decisions about data storage, processing and sharing.  Advantages of 6G over 5G 6G is expected to support 1 terabyte per second (Tbps) speeds. This level of capacity and latency will be unprecedented and wi...