This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Principle of least privilege" – news · newspapers · books · scholar · JSTOR(April 2019) (Learn how and when to remove this message)
In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege (PoMP) or the principle of least authority (PoLA), requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.[1]
^Saltzer, Jerome H.; Schroeder, Michael D. (1975). "The protection of information in computer systems". Proceedings of the IEEE. 63 (9). Institute of Electrical and Electronics Engineers (IEEE): 1278–1308. doi:10.1109/proc.1975.9939. ISSN 0018-9219. OCLC 5871551104. S2CID 269166.
and 23 Related for: Principle of least privilege information
"information hiding". It may be viewed as a corollary to the principleofleastprivilege, which dictates that a module possess only the information and...
user with the role of superuser (or its synonyms) can carry out all actions of the superuser account. The principleofleastprivilege recommends that most...
application of the principleofleastprivilege to protocol design. The Rule ofLeast Power is an example in context of the centuries older principle known...
computer security, privilege separation is one software-based technique for implementing the principleofleastprivilege. With privilege separation, a program...
of session cookies Keystroke logging Cybersecurity Defensive programming Hacking of consumer electronics Illegal number Principleofleastprivilege Privilege...
ring 2 instead of at ring 3 Segment descriptor Supervisor Call instruction System Management Mode (SMM) Principleofleastprivilege E.g., In IBM OS/360...
that unintentionally exploits more privilege than is merited. It is an example of the use ofprincipleofleastprivilege in defensive programming. It should...
generally only have access to a strictly limited set of subjects consistent with the principleofleastprivilege. Access control list Attribute-based access control...
facilitates the principleofleastprivilege by performing software installations by proxy for unprivileged users. A package describes the installation of one or...
(see the principleofleastprivilege). For example, a web server that runs as the administrative user ("root" or "admin") can have the privilege to remove...
or a policy administration point e.g. XACML. On the basis of the "principleofleastprivilege": consumers should only be authorized to access whatever...
Compartmentalization (information security) Freedom of information laws by country Mushroom management Principleofleastprivilege Security through obscurity Feynman...
operating system that fits on a floppy disk List of embedded operating systems OpenWrt Principleofleastprivilege (computer security) Jabeen, Qamar; Khan, Fazlullah;...
access control Principleofleastprivilege Content Disarm & Reconstruction Bromium U3 Ceedo.com - Official site PalmGear.com - Official site of PalmOS DigilabsPro...
use the Wi-Fi device following the principleofleastprivilege. In this example, the AC does not refer to the PKC of the developer as the holder but to...
principleofleastprivilege and known as privilege separation. This behaviour has significant security benefits, notably improved fail-safeness of software...
protected procedure mechanism allows the enforcement of the principleofleastprivilege and the avoidance of side effects in resources management (see Denning...
sshd user by default to drop privileges and perform privilege separation in accordance with the principleofleastprivilege, applied throughout the operating...
principle ofleastprivilege suggests that a least user access (LUA) approach should be taken, in that users should not use accounts with more privileges than...
this level of control is not fine-grained enough to satisfy the principleofleastprivilege, and arguably is responsible for the prevalence of malware in...
software the least amount of access necessary to fulfill their functions (principleofleastprivilege) limits the likelihood and damage of breaches. Several...