Hard2bit
← Back to glossary Identity and access management

Least privilege

What is least privilege

Least privilege is a security principle that limits user and system access to only the data, resources, and permissions necessary to perform their job function—nothing more. Users are granted the minimum set of permissions required, and permissions are continuously reviewed and revoked when no longer needed. This principle applies to human users, service accounts, applications, and cloud resources. Least privilege reduces the damage from compromised accounts because the compromised account has limited permissions.

Why it matters

Most breaches involve lateral movement after an initial compromise. An attacker compromises a user's workstation or steals credentials, then moves laterally using those credentials to access sensitive systems. With least privilege, the compromised account has only the permissions needed for that user's role—access to restricted systems is denied by policy, not by technical barriers alone. For CISOs, least privilege limits blast radius and slows attackers. It also reduces insider threat risk—employees with excessive permissions can exfiltrate data; employees with minimal permissions cannot. Least privilege is a foundational principle in zero-trust architectures and is required by major compliance frameworks (NIST, ISO 27001, SOC 2, PCI DSS). However, implementing least privilege requires discipline: over-provisioning permissions is easier than constantly auditing and removing unnecessary access. Tools like privileged access management (PAM) and identity governance make least privilege scalable.

Key points

User-level least privilege ensures regular users run in standard mode (not administrator) for daily work; elevated rights are granted only when explicitly needed.

Service-account least privilege restricts application service accounts to only the resources they need (database tables, API endpoints, file shares); shared service accounts should be eliminated.

Just-in-time (JIT) access grants administrative permissions only when requested and for a limited window; actions are audited and privileges are automatically revoked.

Segregation of duties ensures that no single person can approve and execute critical transactions (wire transfers, policy changes, data exports); multiple approvers are required.

Least privilege applies to machine identities too: service accounts, CI/CD tokens, API keys and cloud IAM roles are typically far more permissive than strictly required.

Regular access reviews and permission audits identify and revoke unnecessary access; without them, permission creep accumulates and blast radius grows silently.

Least privilege reducing insider threat impact

A financial services firm implements least privilege across all systems. A departmental accountant needs to record transactions and view reports for their team: their account has read-only access to the departmental ledger and read/write access only to transaction entry tables. They cannot view other departments' data, cannot modify reports, cannot export data to USB and cannot reach payroll systems.

One day, the accountant's workstation is compromised by malware. The attacker attempts to export customer financial data—denied by policy. They try fraudulent wire transfers—denied because the account lacks those permissions. They pivot toward payroll—denied again. The blast radius collapses to a narrow slice of the environment. Compare this with an organisation where the same accountant had administrator rights: identical initial compromise, catastrophically different outcome. Least privilege turned a potential critical breach into a contained incident.

Common mistakes

  • Granting broad group permissions instead of individual ones: adding users to groups like 'Finance Team' gives everyone identical permissions; temporary elevation should be individual, time-bound and audited.
  • Never revoking permissions: access creep happens when users accumulate permissions over time; without regular audits, a long-tenured employee can carry rights from five previous roles.
  • Implementing least privilege without monitoring: if you grant minimal permissions but don't watch privilege usage, you won't know whether permissions are actually sufficient or whether lateral movement is occurring.
  • Ignoring cloud privilege. IAM roles with wildcard policies, long-lived service keys and unrotated break-glass accounts are the modern equivalent of leaving master keys in the lock.
  • Treating least privilege as a one-off project. Without ownership, scheduled reviews and decommissioning of accounts/roles, the matrix drifts and the principle quietly stops holding.

Related services

This concept may be related to services such as:

Frequently asked questions

How do we implement least privilege without slowing down operations?

Least privilege and operational efficiency can coexist if implemented thoughtfully. Use just-in-time access (JIT) to grant temporary elevated permissions when needed—IT approves the request, grants access for 2 hours, and automatically revokes after the time window expires. This is faster than manual access provisioning and deprovisioning. Implement self-service password reset and access request portals so users can request access without IT involvement. Use identity governance platforms to automate access reviews and deprovisioning. The goal is to make least privilege effortless for users and admins while maintaining security.

What is the difference between least privilege and role-based access control (RBAC)?

RBAC is a mechanism for implementing least privilege. RBAC assigns permissions to roles, then assigns users to roles. For example, the 'Accountant' role has specific permissions (read departmental ledger, write transactions). Users assigned to the accountant role receive those permissions. This is more manageable than individually assigning permissions to each user. However, RBAC can become overly broad if roles are too large (a single 'Finance' role with all permissions) or if RBAC permissions are not regularly reviewed. Least privilege is the principle; RBAC is one implementation mechanism. Attribute-based access control (ABAC) is a more granular alternative to RBAC that bases permissions on user attributes, resource attributes, and context (time, location, device compliance).

How do we handle contractors and temporary employees with least privilege?

Contractors and temporary employees present access control challenges because their engagement is time-limited. Best practices: 1) Create specific roles for contractor functions (e.g., 'External Auditor') with minimal permissions. 2) Use time-bounded access that automatically expires on the contract end date. 3) Monitor contractor activity closely—malicious contractors have legitimate access and knowledge. 4) Implement geo-fencing or location-based access controls that restrict contractor access to specific office locations. 5) Disable access immediately upon contract termination, don't wait for IT cleanup. 6) Conduct exit interviews and collect company assets (access cards, laptops, keys).

Does least privilege prevent privilege escalation attacks?

Least privilege reduces the impact of privilege escalation because an attacker who escalates privileges will have escalated only to the level of the compromised account's permissions. If the original account has minimal permissions, escalation reaches a lower privilege level. However, least privilege doesn't prevent escalation itself—it just limits where the attacker can escalate to. True privilege escalation prevention requires patching vulnerabilities and endpoint hardening. Privilege escalation risks are amplified when some accounts are highly privileged; attackers target those accounts knowing that escalation will grant maximum access. Therefore, minimizing the number of highly privileged accounts (using just-in-time access instead of standing admin accounts) is critical.