This whitepaper will review the concepts, how to apply them, and issues that arise regarding the principle of least privilege. This practice was implemented to restrict user access to certain aspects while still allowing them to produce maximum work efficiency. This whitepaper also uses real-world examples as well as theoretical examples to provide the reader a better understanding of the principle of least privilege. Though most examples shown can argue that this is not a flawless concept, the rarity of real life incidences prove that it is an effective practice that is necessary for any network. Implementing this practice can be done through the administrative account, but occasionally the admin will make an account too strict or not strict enough. To battle diminish this instance, the admin can use one of many trusted third-party programs to help secure and restrict certain aspects on a user account. Introduction …show more content…
This practice gives the least amount of privileges to a user or program as possible and still have the user or program complete their duties. The reason the principle of least privilege is used so frequently is to prevent the user from taking over too much control of their computer and even the network. The user gaining too much control could possibly open their computer to malicious attacks and the leaking of private information. To enact the principle of least privilege, the administrator must log on to make necessary changes to each user account on the network depending on the jobs each user may be completing. Due to its many beneficial factors, the principle of least privilege is necessary for every user account on a