Feature of a system in which operations are granted the fewest permissions possible in order to perform their tasks.
Principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. This also applies system privileges that might not be needed to perform their assigned job.note Application of this principle limits the damage that can result from errors, accidental and unauthorized use of an AIS.
a security administration principle wherein each user is provided only the minimum set of rights needed to accomplish their authorized tasks. Issuing the most restrictive set of privileges may minimize damages from unauthorized use and error.
Designing operational aspects of a system to operate with a minimum amount of system privilege. This reduces the authorization level at which various actions are performed and decreases the chance that a process or user with high privileges may be caused to perform unauthorized activity resulting in a security breach.
The principle of granting users the least level of permissions needed to perform their function.
The concept where a user is granted the least number of privileges necessary to perform a job or task.
The principle that requires each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.