A security principle that grants the minimum level of access necessary for Non-Human Identities (NHIs) to perform their functions.
Description
Least-Permissive Access Control is a security strategy designed to minimize the exposure of sensitive resources by ensuring that Non-Human Identities (NHIs), such as automated processes, applications, or systems, are granted only the minimum permissions required to execute their designated tasks. This principle is critical in reducing the attack surface and mitigating risks associated with over-privileged access. By implementing least-permissive access, organizations can better protect their data and systems from potential threats stemming from compromised NHIs. For instance, if an automated application only needs to read data from a database, it should not be granted write permissions. This approach not only enhances security but also fosters accountability, as it becomes easier to track the actions of NHIs. As NHIs continue to proliferate in modern IT environments, adhering to the least-permissive access control paradigm is essential for maintaining robust security postures and ensuring compliance with regulatory standards.
Examples
- An automated backup system that has read-only access to file storage resources.
- A cloud application that only has permission to access specific APIs needed for its functionality.
Additional Information
- Implementing least-permissive access can help in achieving compliance with frameworks like GDPR and HIPAA.
- Regular audits and reviews of NHI permissions are necessary to maintain least-permissive access control.
References
- Security Operations for Non-Human Identities - The Hacker News
- What are non-human identities and why do they matter? - CSO Online
- Non-human Identities (NHIs) are Only a Part of the Identity Visibility ...
- The Complete Guide to the Growing Impact of Non-Human Identities ...
- What Are Non Human Identities, Their Challenges and Solutions?
- The State of Non-Human Identity (NHI) Security - Resilient Cyber
- 3 key strategies for mitigating non-human identity risks - CSO Online
- SaaS Protection In the Era of Non Human Identities - Entro Security
- What is non-human identity management - Veza
- What is a Non-Human Identity? | Silverfort Glossary