Skip to main content

Least Privilege

Also known as: Principle of Least Privilege, PoLP

Principle that every identity should hold only the permissions required for its legitimate function, with privileges granted, time-bound, and revoked rather than accumulated.

Written by Askara Solutions editorial team · Updated

Least privilege is the principle that limits the damage when something goes wrong. If an attacker compromises a regular user account, the question is how far that single foothold lets them move. If a contractor's credentials are misused, the question is what those credentials could touch in the first place. In both cases, the answer is shaped by the access decisions made months earlier, when the role was granted and never revisited.

The principle is straightforward to state and difficult to operate. Permissions accumulate. People change roles and keep their old access alongside the new. Service accounts grow privileges for short-term projects that never get cleaned up. Administrator rights are issued for one task and held indefinitely. Each accretion is individually rational and collectively dangerous, because the resulting access landscape no longer reflects what anyone actually needs.

Mature implementations treat least privilege as a continuous discipline rather than a configuration setting. Privileged access is time-bound and reviewed, often through a privileged access management platform. Joiner, mover, and leaver events trigger access changes rather than additions. Standing administrative privilege is the exception rather than the default. The Askara Solutions agent watches the gap between what each identity has and what its role description says it needs, and surfaces drift to the access reviewers before it turns into an audit finding.

Related terms

  • Access Control

    Policies and mechanisms that restrict who can do what within information systems, by reference to identity, role, or attribute, recorded in a form that can be reviewed.

  • Identity and Access Management

    The discipline of authenticating who someone is, deciding what they are allowed to do, and recording the decisions so they can be reviewed, revoked, or attested to over time.

  • Annex A

    The catalogue of 93 information security controls in ISO/IEC 27001:2022, organised into four themes (organisational, people, physical, technological), referenced from the Statement of Applicability.

  • Information Security Management System

    The documented set of policies, procedures, and accountability that an organisation uses to manage information-security risk over time.

Authoritative sources

Where to read more.