A security principle stating that users and systems should only be granted the minimum permissions necessary to perform their required functions. Limiting privileges reduces the potential impact of compromised accounts or systems.
Related Terms
Identity and Access Management (IAM)
authenticationA framework of policies and technologies for managing digital identities and controlling access to resources. IAM ensure...
Privileged Access Management (PAM)
authenticationA set of strategies and technologies for controlling, monitoring, and securing elevated access rights to critical system...
Zero Trust
authenticationA security model based on the principle of never trust, always verify. Zero trust requires strict identity verification...