🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now →
Menu

Categories

Security Beginner

What is Principle of Least Privilege?

A security principle where users and programs receive only the minimum access rights needed to perform their specific tasks.

Least privilege minimizes the damage potential of compromised accounts, bugs, and insider threats. Implementation includes: database users with table-specific permissions (not superuser), application service accounts with restricted file system access, IAM roles with specific actions on specific resources, sudo rules for specific commands (not ALL), container processes running as non-root, and API keys with scoped permissions. In PostgreSQL, GRANT SELECT ON specific_table TO app_user is preferred over granting all privileges. This principle applies at every level: operating system, database, application, API, and cloud infrastructure. Regular access reviews ensure privileges stay minimal.

Related Terms

Hashing
A one-way function that converts input data into a fixed-size string of characters, used for data integrity and password storage.
SAST (Static Application Security Testing)
Automated analysis of source code to find security vulnerabilities without executing the application.
Secret Management
The practice of securely storing, accessing, and rotating sensitive credentials like API keys, passwords, and certificates.
OAuth 2.0
An authorization framework that allows third-party applications to access user resources without sharing passwords.
Zero Trust
A security model that requires strict identity verification for every user and device, regardless of their network location.
Supply Chain Attack
A cyberattack that targets less-secure elements in the software supply chain to compromise downstream users and organizations.
View All Security Terms →