Share to: share facebook share twitter share wa share telegram print page

Principle of least privilege

In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege (PoMP) or the principle of least authority (PoLA), requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.[1]

Details

The principle means giving any user accounts or processes only those privileges which are essentially vital to perform its intended functions. For example, a user account for the sole purpose of creating backups does not need to install software: hence, it has rights only to run backup and backup-related applications. Any other privileges, such as installing new software, are blocked. The principle applies also to a personal computer user who usually does work in a normal user account, and opens a privileged, password protected account only when the situation absolutely demands it.

When applied to users, the terms least user access or least-privileged user account (LUA) are also used, referring to the concept that all user accounts should run with as few privileges as possible, and also launch applications with as few privileges as possible.

The principle (of least privilege) is widely recognized as an important design consideration towards enhancing and giving a much needed 'Boost' to the protection of data and functionality from faults (fault tolerance) and malicious behavior.

Benefits of the principle include:

  • Intellectual Security. When code is limited in the scope of changes it can make to a system, it is easier to test its possible actions and interactions with other security targeted applications. In practice for example, applications running with restricted rights will not have access to perform operations that could crash a machine, or adversely affect other applications running on the same system.
  • Better system security. When code is limited in the system-wide actions it may perform, vulnerabilities in one application cannot be used to exploit the rest of the machine. For example, Microsoft states “Running in standard user mode gives customers increased protection against inadvertent system-level damage caused by "shatter attacks" and malware, such as root kits, spyware, and undetectable viruses”.[2]
  • Ease of deployment. In general, the fewer privileges an application requires, the easier it is to deploy within a larger environment. This usually results from the first two benefits, applications that install device drivers or require elevated security privileges typically have additional steps involved in their deployment. For example, on Windows a solution with no device drivers can be run directly with no installation, while device drivers must be installed separately using the Windows installer service in order to grant the driver elevated privileges.[3]

In practice, there exist multiple competing definitions of true (least privilege). As program complexity increases rapidly, so do the number of potential issues, rendering a predictive approach impractical. Examples include the values of variables it may process, addresses it will need, or the precise time such things will be required. Object capability systems allow, for instance, deferring granting a single-use privilege until the time when it will be used. Currently, the closest practical approach is to eliminate privileges that can be manually evaluated as unnecessary. The resulting set of privileges typically exceeds the true minimum required privileges for the process.

Another limitation is the granularity of control that the operating environment has over privileges for an individual process.[4] In practice, it is rarely possible to control a process's access to memory, processing time, I/O device addresses or modes with the precision needed to facilitate only the precise set of privileges a process will require.

The original formulation is from Jerome Saltzer:[5]

Every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job.

Peter J. Denning, His paper "Fault Tolerant Operating Systems", set it in a broader perspective among "The four fundamental principles of fault tolerance".

"Dynamic assignments of privileges" was earlier discussed by Roger Needham in 1972.[6][7]

Historically, the oldest instance of (least privilege) is probably the source code of login.c, which begins execution with super-user permissions and—the instant they are no longer necessary—dismisses them via setuid() with a non-zero argument as demonstrated in the Version 6 Unix source code.

Implementation

The kernel always runs with maximum privileges since it is the operating system core and has hardware access. One of the principal responsibilities of an operating system, particularly a multi-user operating system, is management of the hardware's availability and requests to access it from running processes. When the kernel crashes, the mechanisms by which it maintains state also fail. Therefore, even if there is a way for the CPU to recover without a hard reset, security continues to be enforced, but the operating system cannot properly respond to the failure because it was not possible to detect the failure. This is because kernel execution either halted or the program counter resumed execution from somewhere in an endless, and—usually—non-functional loop.[citation needed] This would be akin to either experiencing amnesia (kernel execution failure) or being trapped in a closed maze that always returns to the starting point (closed loops).

The principle of least privilege demonstrated by privilege rings for the Intel x86

If execution picks up after the crash by loading and running trojan code, the author of the trojan code can usurp control of all processes. The principle of least privilege forces code to run with the lowest privilege/permission level possible. This means that the code that resumes the code execution-whether trojan or simply code execution picking up from an unexpected location—would not have the ability to perform malicious or undesirable processes. One method used to accomplish this can be implemented in the microprocessor hardware. For example, in the Intel x86 architecture the manufacturer designed four (ring 0 through ring 3) running "modes" with graduated degrees of access-much like security clearance systems in defence and intelligence agencies.[citation needed]

As implemented in some operating systems, processes execute with a potential privilege set and an active privilege set.[citation needed] Such privilege sets are inherited from the parent as determined by the semantics of fork(). An executable file that performs a privileged function—thereby technically constituting a component of the TCB, and concomitantly termed a trusted program or trusted process—may also be marked with a set of privileges. This is a logical extension of the notions of set user ID and set group ID.[citation needed] The inheritance of file privileges by a process are determined by the semantics of the exec() family of system calls. The precise manner in which potential process privileges, actual process privileges, and file privileges interact can become complex. In practice, least privilege is practiced by forcing a process to run with only those privileges required by the task. Adherence to this model is quite complex as well as error-prone.

Similar principles

The Trusted Computer System Evaluation Criteria (TCSEC) concept of trusted computing base (TCB) minimization is a far more stringent requirement that is only applicable to the functionally strongest assurance classes(Link to Trusted Computer System Evaluation Criteria section Divisions and classes), namely the classes B3 and A1 (which are functionally identical but differ in terms of evidence and documentation required).

Least privilege is often associated with privilege bracketing: that is, assuming necessary privileges at the last possible moment and dismissing them as soon as no longer strictly necessary, therefore ostensibly reducing fallout from erroneous code that unintentionally exploits more privilege than is merited. Least privilege has also been interpreted in the context of distribution of discretionary access control (DAC) permissions, for example asserting that giving user U read/write access to file F violates least privilege if U can complete their authorized tasks with only read permission.

See also

References

  1. ^ Saltzer, Jerome H.; Schroeder, Michael D. (1975). "The protection of information in computer systems". Proceedings of the IEEE. 63 (9). Institute of Electrical and Electronics Engineers (IEEE): 1278–1308. doi:10.1109/proc.1975.9939. ISSN 0018-9219. OCLC 5871551104. S2CID 269166.
  2. ^ Jonathan, Clark; DABCC Inc. "Virtualization Guru Writes "User-mode is a Good Thing - Deployment to Locked-down Accounts without Security Elevation"". Archived from the original on 10 February 2013. Retrieved 15 Mar 2013.
  3. ^ Aaron Margosis (August 2006). "Problems of Privilege: Find and Fix LUA Bugs". Microsoft.
  4. ^ "Matt Bishop, Computer Security: Art and Science, Boston, MA: Addison-Wesley, 2003. pp. 343-344 cited Barnum & Gegick 2005". Archived from the original on 2007-10-20. Retrieved 2007-11-17.
  5. ^ Saltzer, Jerome H. (1974). "Protection and the control of information sharing in multics". Communications of the ACM. 17 (7): 388–402. CiteSeerX 10.1.1.226.3939. doi:10.1145/361011.361067. ISSN 0001-0782. S2CID 326132.
  6. ^ Needham, R. M. (1972). "Protection systems and protection implementations". Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Part I. pp. 571–578. doi:10.1145/1479992.1480073. S2CID 7371342.
  7. ^ Fred B. Schneider. "Least Privilege and More" (PDF).

Bibliography

Read other articles:

British Wireless for the Blind Fund (BWBF) is a British charity and a private company limited by guarantee. Founded by Sir Ernest Beachcroft Beckwith Towse in 1928, the organisation provides adapted radios and audio players on free loan to registered blind and partially sighted UK residents over the age of eight, where hardship circumstances can be demonstrated by receipt of a means-tested benefit. Organisation British Wireless for the Blind Fund has been providing specially adapted radios to...

يو-371 الجنسية  ألمانيا النازية الشركة الصانعة ها دي ڤيه  المالك  كريغسمارينه المشغل كريغسمارينه[1][2]  المشغلون الحاليون وسيط property غير متوفر. المشغلون السابقون وسيط property غير متوفر. التكلفة وسيط property غير متوفر. منظومة التعاريف الاَلية للسفينة وسيط property غير ...

Artículo principal: Real Club Celta de Vigo Historia En la asamblea constituyente del club llevada a cabo en agosto de 1923 se acordó que el uniforme del club fuera el de la Selección Española: camiseta roja, pantalón negro y medias azules con vuelta blanca. [1]​[2]​[3]​[4]​[5]​[6]​[7]​[8]​[9]​[10]​ La idea de usar el azul celeste en la camiseta del club fue del directivo Juan Baliño Ledo, uno de los fundadores del club, a...

Untuk pulau yang bernama-sama, lihat Pulau Batam. Kota BatamKotaTranskripsi bahasa daerah • Abjad JawiبتمDari atas, kiri ke kanan: Jembatan Barelang, ikon Welcome to Batam, Suasana Kota Batam, Masjid Sultan Mahmud Riayat Syah, Gereja Katolik Nha Tho Duc Me Vo Nhiem LambangJulukan: Bandar Dunia MadaniSingapore van RiouwarchipelPetaKota BatamPetaTampilkan peta SumatraKota BatamKota Batam (Indonesia)Tampilkan peta IndonesiaKoordinat: 1°07′48″N 104°03′11″E࿯...

妖怪ウォッチ > 映画 妖怪ウォッチ♪ ケータとオレっちの出会い編だニャン♪ワ、ワタクシも〜♪♪ 妖怪ウォッチ♪ > 映画 妖怪ウォッチ♪ ケータとオレっちの出会い編だニャン♪ワ、ワタクシも〜♪♪ 映画 妖怪ウォッチ♪ケータとオレっちの出会い編だニャン♪ワ、ワタクシも〜♪♪監督 須藤典彦脚本 加藤陽一原案 日野晃博原作 レベルファイブ出演者 戸

City in Georgia, United StatesCarrollton, GeorgiaCityCity of CarrolltonCarrollton City HallMotto: Altogether OriginalLocation in Carroll County and the state of GeorgiaCoordinates: 33°34′51″N 85°4′36″W / 33.58083°N 85.07667°W / 33.58083; -85.07667CountryUnited StatesStateGeorgiaCountyCarrollIncorporated1829Government • MayorBetty Cason • City ManagerDavid Brooks • City CouncilJim Watters Brett Ledbetter Bob Uglum Jac...

Alternate reality version of Spider-Man Comics character Peter ParkerSpider-ManMangaverse Spider-Man. Art by Tommy OhtsukaPublication informationPublisherMarvel ComicsFirst appearanceMarvel Mangaverse: Spider-Man (2002)Created byKaare AndrewsIn-story informationAlter egoPeter Parker Spider-Man (Peter Parker) from the Marvel Mangaverse is an alternate version of Spider-Man created by Kaare Andrews. He is just one of many examples of different cultural Spider-Men much like Spider-Man (Pavitr Pr...

Budaya Ngarrindjeri berpusat di danau-danau di wilayah hilir Sungai Murray. Ngarrindjeri (terjemahan harfiah orang yang berasal dari tanah ini) adalah konfederasi penduduk asli Australia yang terdiri dari 18 lakinyeri (klan atau suku)[1] dan 77 kelompok keluarga yang menuturkan dialek bahasa Ngarrindjeri. Mereka adalah penduduk asli wilayah hilir Sungai Murray, Semenanjung Fleurieu barat dan Coorong di Australia selatan. Walaupun Ngarrindjeri sering kali disebut sebagai 'konfederasi' ...

Klaten beralih ke halaman ini. Untuk ibukota kabupaten, lihat Klaten (kota). Kabupaten KlatenKabupatenTranskripsi bahasa daerah • Hanacarakaꦏ꧀ꦭꦛꦺꦤ꧀Candi Plaosan Lor LambangMotto: Tumenga tata anggatra rahardja(Jawa) Menatap keharmonisan demi membangun kesejahteraan(1950 Masehi)PetaKabupaten KlatenPetaTampilkan peta JawaKabupaten KlatenKabupaten Klaten (Indonesia)Tampilkan peta IndonesiaKoordinat: 7°41′00″S 110°37′00″E / 7.6833°S 1...

2019 studio album by Old DominionOld DominionStudio album by Old DominionReleasedOctober 25, 2019 (2019-10-25)GenreCountryLength41:58LabelRCA NashvilleProducerShane McAnallyOld DominionOld Dominion chronology Happy Endings(2017) Old Dominion(2019) Time, Tequila & Therapy(2021) Singles from Old Dominion Make It SweetReleased: November 5, 2018 One Man BandReleased: June 17, 2019 Some People DoReleased: March 2, 2020 Never Be SorryReleased: August 31, 2020 Old Dominion...

Species of fish Red shiner Conservation status Least Concern (IUCN 3.1)[1] Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Chordata Class: Actinopterygii Order: Cypriniformes Family: Cyprinidae Subfamily: Leuciscinae Clade: Pogonichthyinae Genus: Cyprinella Species: C. lutrensis Binomial name Cyprinella lutrensisS. F. Baird & Girard, 1853 Synonyms Leuciscus lutrensis Baird & Girard, 1853 Notropis lutrensis (Baird & Girard, 1853) Leuciscus bu...

狭山市南入曽地区 埼玉県道225号入曽停車場線(さいたまけんどう225ごう いりそていしゃばせん)は、埼玉県狭山市の入曽駅から、埼玉県道8号川越入間線までを結ぶ県道である。県道標識は設置されていない。 沿線 全長約250m。埼玉県道8号川越入間線より入曽駅前派出所まで全線1.5車線、日中は歩行者で賑わう。 通過する自治体 狭山市 交差する道路 埼玉県道8号川越...

53 King StreetAlternative namesLloyds TSB BuildingGeneral informationArchitectural styleEdwardian BaroqueAddress53 King StreetTown or cityManchesterCountryUnited KingdomCompleted1915ClientLloyds BankDesign and constructionArchitect(s)Charles Heathcote 53 King Street is an Edwardian Baroque bank on King Street in Manchester, England. Designed by architect Charles Heathcote, it opened in 1913 and was granted Grade II listed building status in 1974.[1] It used to house a branch of Lloyds...

Dravidian ethnolinguistic group in Pakistan Part of a series onTamils History History of Tamil Nadu History of Sri Lanka Sources of ancient Tamil history Sangam period Keezhadi excavation site Tamilakam Agriculture Economy Education Industry Chronology of Tamil history Eelam Tamil Kingdoms Tamilization Culture Language Literature Philosophy Script Numeral system Medicine Music Architecture Cuisine Calendar Cinema People Indian Tamils Sri Lankan Tamils Malaysian Tamils Singapore Tamils Tamil d...

Football clubZúñigaFull nameClub Deportivo ZúñigaFoundedJanuary 1981LeagueCopa Perú Home colours Zúñiga is a Peruvian football club, playing in the city of Lima, Peru. The club is the biggest of Lima city, and one of the biggest in Lima Province. The club were founded 1981 and play in the Copa Perú which is the third division of the Peruvian league. Their current manager is Brian Bertie. History The club have played at the second level of Peruvian football on several occasions, from 1...

Category 5 Atlantic hurricane in 2005 Not to be confused with Hurricane Catarina or Hurricane Karina. For other storms of the same name, see List of storms named Katrina. Hurricane Katrina Hurricane Katrina at peak intensity in the Gulf of Mexico on August 28Meteorological historyFormedAugust 23, 2005ExtratropicalAugust 30, 2005DissipatedAugust 31, 2005Category 5 hurricane1-minute sustained (SSHWS/NWS)Highest winds175 mph (280 km/h)Lowest pressure902 mbar (hPa); 26.64 ...

Metro station in Delhi, India This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Dhansa Bus Stand metro station – news · newspapers · books · scholar · JSTOR (January 2023) (Learn how and when to remove this template message) Dhansa Bus Stand Delhi Metro stationGeneral informationLocationNajafgarh Dhansa, Najaf...

17th episode of the 13th season of Family Guy Fighting IrishFamily Guy episodePromotional imageEpisode no.Season 13Episode 17Directed byBrian IlesWritten byJaydi SamuelsProduction codeCACX15Original air dateMay 3, 2015 (2015-05-03)Guest appearance Liam Neeson as himself Episode chronology ← PreviousRoasted Guy Next →Take My Wife Family Guy (season 13)List of episodes Fighting Irish is the seventeenth episode of the thirteenth season of the animated sitcom Fam...

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Oktober 2016. Diagram cara kerja Pengalih KVM. Pengalih KVM (singkatan dari Keyboard, Video, Mouse switch) adalah sebuah alat elektronik yang mengizinkan satu buah papan ketik, tetikus (atau perangkat penunjuk lainnya), dan video untuk mengontrol sejumlah komputer s...

Sculpture in Berlin, Germany Nike Assists the Wounded WarriorGerman: Nike richtet den Verwundeten aufThe sculpture in 2008ArtistLudwig Wilhelm WichmannYear1853 (1853)TypeSculptureLocationBerlin, Germany Nike Assists the Wounded Warrior (German: Nike richtet den Verwundeten auf) is an outdoor 1853 sculpture by Ludwig Wilhelm Wichmann, installed on Schlossbrücke in Berlin, Germany.[1] See also Germany portalVisual arts portal 1853 in art References ^ Berlin - Statuen auf der Schlo...

Kembali kehalaman sebelumnya