POLP
POLP
Privilege
POLP can also restrict access rights for applications, systems and processes to only those
who are authorized. This principle is also known as the access control principle or the
principle of minimal privilege.
Depending on the system, some privileges might be based on attributes contingent on the
user's role within the organization. For example, some corporate access systems grant the
appropriate level of access based on factors such as location, seniority or time of day. An
organization can specify which users can access what in the system and the system can be
configured so the access controls recognize only the administrators' roles and parameters.
How does POLP work?
The principle of least privilege grants users permission to read, write or execute only the
files or resources necessary to do their jobs. Time-limited privileges can also be enabled to
ensure users have access to critical data for just the amount of time needed to perform a
specific task. Without this principle, an organization could create overprivileged users, which
could increase their chance of data breaches and malicious actions.
Organizations should adopt POLP as a default security measure to ensure that no one
employee has access to critical information they don't need. Likewise, the number of
privileged accounts should be kept at a minimum. For example, system administrators are
typically privileged accounts, as they help other employees with their software and
hardware. Some system administrators might be given unlimited privileges, making them a
bigger target for attackers. As such, minimal privileges should also be placed on system
administrators, limiting the total number of users they have access to.
When configuring new systems or applications, all unnecessary services, applications and
data should be disabled. This includes any applications that might be enabled by default.
Organizations should also log authentication and authorizations to critical systems. This
way, they can keep track of failed login attempts and access control changes -- which can
be a sign of threat actors. Likewise, organizations should review accounts and privileges at
regular intervals to ensure there are no overprivileged users.