Effectively Enforce a Least Privilege Strategy


Every security officer wants to minimize their attack surface. One of the best ways to do this is by implementing a least privilege strategy.


One report revealed that data breaches from insiders could cost as much as 20% of annual revenue. Also, at least one in three reported data breaches involve an insider. Over 78% of insider data breaches involve unintentional data loss or exposure. Least privilege protocols can help prevent these kinds of blunders.


Clearly, proper management of access privilege is critical for strong security. In this article, we’ll explore how least privilege works to make this happen. We’ll also see how least privilege fits into broader privilege access management and zero trust strategies.


What is Least Privilege?


Bank tellers have access to their workstations, but only during their work shifts. And only a few employees have access to the main vault. If a bank employee leaves the bank, they have to relinquish access. That’s how least privilege works.


According to Cybersecurity and Infrastructure Security Agency (CISA), least privilege means “only the minimum necessary rights should be assigned to a subject that requests access to a resource and should be in effect for the shortest duration necessary.”


The business drivers behind using least privilege are varied. First, there’s the need to thwart threats (intentional or unintentional) that come from employees, third parties and attackers. Compliance is also a common reason to adopt least privilege efforts.

..

Support the originator by clicking the read the rest link below.