Best Practice
Guide to Implementing
the Least Privilege
Principle
Table of Contents
Principle of Least Privilege Benefits 3
Limitations of Least Privilege 3
Understanding Types of Accounts 4
Privilege Management 6
Secure Configurations 7
Auditing Accounts 7
Conclusion 8
2
Principle of Least Privilege Benefits
The principle of least privilege (POLP) requires giving each user, service and application only the permissions
needed to perform their work and no more. It is one of the most important concepts in network and system
security. No matter how technically skilled or trustworthy a user is, they should have access to only the network
resources they need to do the job at hand.
The main benefit of minimizing each user’s level of access is that you can dramatically reduce your security risks
and attack surface. By strictly limiting who can access your critical systems, you reduce the risk of unintentional
or malicious changes and data leaks — whether by the users themselves or by attackers who take over their
credentials. In particular, you’ll minimize the likelihood of rootkits, viruses and malware being installed, since
most user accounts won’t have the administrative privileges required to install them.
Another benefit of enforcing least privilege is achieving regulatory compliance. Many standards require or-
ganizations to give users only the privileges needed to complete their job functions — especially privileged
users. Even if your business is not subject to these regulations, implementation of least privilege is a smart best
practice.
In addition, a least privilege model simplifies change and configuration management. Every time someone with
administrative privileges logs in to a computer, there’s the potential that the system’s configuration could be
changed inappropriately, either deliberately or accidentally. Least privilege helps you maintain the intended
configuration of a system by controlling exactly who can change what. Great examples of administrative restric-
tions that implement least privilege are the ESAE (“Red Forest”) model in Active Directory and the Just In Time
and Just Enough administration concepts in Windows Server.
Limitations of Least Privilege
However, it’s essential to keep in mind that the principle of least privilege is just one layer of a comprehensive
defense-in-depth strategy; you should also deploy other critical technologies, such as firewalls that prevent
connections, intrusion detection devices that search for malicious code, antivirus or personal security products
3
that look for heuristic behavior, and software restriction policies that limit what application installation and
execution. For example, suppose a user has a legitimate need to access certain sensitive data. If keylogging
software is installed on that user’s machine, that data could be transmitted to a third party without the user’s
knowledge. The least privilege principle alone will not block this attack path, since the user needs the access
rights, but a comprehensive defense-in-depth security strategy would almost certainly prevent the data breach.
Understanding Types of Accounts
To implement the principle of least privilege, you need to set up different types of account for different purpos-
es. These include user accounts, privileged accounts and shared accounts:
User accounts — Most people in your network should get a regular user account with the access
required to perform their normal duties.
Privileged accounts — A privileged account with elevated privileges. There are two main types. The
first is accounts that enable specific users, such as accounting executives, to access critical data and
services. The other is administrator accounts, which grant special admin rights on the network. Classic
examples include the root account in Linux and administrator and power user accounts in Windows
operating systems. In a Microsoft environment, the most important administrative account is the
Domain Admin account. While a local admin account grants complete control of a single machine,
a Domain Admin account has total control across your network — which means attackers often
seek to gain Domain Admin privileges. Because of their power, privileged accounts should be used
only when absolutely necessary, and their activity should be carefully monitored. Domain Admin
accounts in particular must be very closely controlled. In general, administrators should have both
a user account and a privileged account, and they should use their least-privileged user accounts
unless they need to perform a specific task that requires their administrative privileges.
Shared accounts (generic accounts) — Using shared account is usually not recommended; the
preferred method is to have each individual use their own account. However, in some limited situa-
tions, it may be acceptable to create accounts that are shared among a group of users. For example,
most organizations of any significant size have outsiders who need to access their network, such as
clients, contractors or business partners who are visiting for a brief period of time. Creating guest
accounts with bare minimum privileges can be an expedient way to enable these users to complete
basic tasks.
4
Service accounts — Humans are not the only entities that might require privileged access to network
resources. You might have software that needs to access your network without human intervention,
such as database services that start when their machine boots up. These services require their own
accounts. One common but dangerous practice is to assign these services to a Domain Admin ac-
count. If attackers compromise an application that is running as a Domain Admin, they immediately
get administrative access to the system. Application security best practices require organizations to
determine what access each application requires to run correctly and create service accounts with
just enough privileges for the applications to accomplish their required tasks; limiting the access
that applications have to your network will go a long way toward protecting it from abuse. Active
Directory provides a service account with a very strong password that is automatically changed.
Managing Passwords
Regardless of the type of account, credentials best practices recommend enforcing certain controls on passwords,
including the following:
Password length — The longer the password, the better. Passphrases are becoming more common.
Password complexity — Requiring a mixture of capital and lowercase letters, numbers and symbols
as part of a password can be just as important as password length in thwarting some attacks.
Password age — Passwords should expire and have to be reset after a specific number of days.
Password history — The system should remember a certain number of previous passwords for
each user to prevent their immediate reuse.
You can read more about passwords and their settings in password best practices.
You should also apply an account lockout policy, as detailed in account lockout best practices.
Deleting Accounts
When someone leaves the company, for any reason, that user’s accounts should be disabled immediately, and
then deleted after a period of time. If you delete the account immediately, you might not be able to access impor-
tant data, and you might even lose some logs associated with the account. You can get more information in user
termination best practices.
5
Privilege Management
Using Groups
Trying to manage privileges individually for hundreds or thousands of employees and adhere to the principle of
least privilege is a difficult task. A better access control strategy is to place users into groups based on their job
roles and then to manage privileges for those groups. For example, suppose your company invests in a new HR
application. Instead of having to grant each HR staff member access to the application individually — a time-con-
suming and error-prone task — you simply give the HR group the appropriate permissions. Similarly, if a user
transfers from one department to another, you can simply remove them from certain groups and add them to
others, rather than having to manually remove dozens or hundreds of specific access rights and add a similar
number of new ones.
Assigning User Working Hours
For employees who work a relatively consistent schedule, another layer of least privilege is to restrict the use of
accounts to the individual’s normal working hours. For example, if a given employee generally works from 8 a.m.
to 5 p.m., their account should not be usable at 1 a.m. Of course, people fluctuate a bit, so you might want to set
up this hypothetical account to be operational from 7 a.m. to 7 p.m.
Using Location-based Restrictions
In many cases, you can also limit which locations an account can be used from. For instance, an account might
work fine in the San Francisco office but not work at all from the Los Angeles office.
Using Machine-based Restrictions
Machine-based restrictions are a special type of location-based controls. For instance, you can keep a user who
works in the Accounting department on the 4th floor from using machines on the 10th-floor software develop-
ment area. Again, not all accounts can be locked down like this; for example, some technical support personnel
might need to be able to work from almost any computer on the network.
6
Secure Configurations
Each system should also be configured so that it is capable of doing only what it is intended to do and no more.
Best practices for locking down systems including changing all default passwords and disabling any default
accounts and services you don’t use. After all, a simple Google search is all it takes to find the default user-
name and password for any system but changing those credentials is an easy task, and simply shutting down
anything that you don’t need will go quite a long way to improving computer security. It is amazing how often
real-world system audits turn up systems with default usernames and passwords — even backbone gateway
routers or storages with sensitive data that should be password protected and have multifactor authentication
implemented.
Auditing Accounts
Setting up the right accounts, assigning them the appropriate privileges and applying any applicable restrictions
is a good first step. However, you also need to audit those accounts periodically. Tree types of audits are rele-
vant to accounts: usage audits, privilege audits and change audits.
Usage audits — It’s critical to monitor what each account is doing, including what data they access,
create and delete. Regular review of this data helps you assess whether the account is being used in
accordance with company security policies and only for legitimate purposes.
Privilege audits — Over time, users can end up with privileges that they no longer need. This can
occur when the user’s job role changes and new privileges are simply added to the old ones; other
times, users are simply provisioned with more privileges than their job role actually required. Regular
privilege audits help you spot accounts that have more privileges than required so you can enforce
least privilege. Privilege audits are closely related to recertification, which is the process of working
with data owners and users to determine if given accounts still require the privileges that they have.
Change audits — Any improper change to an account’s password, permissions or settings could
lead to a data breach. Therefore, you need to be sure that all changes are under your full control and
you are alerted about all critical changes.
7
Usage, privilege and change auditing can be automated by third-party tools like Netwrix Auditor, which will
report on all changes in your environment and alert you about changes you deem critical, such as changes to
administrative group membership.
Conclusion
Applying the principle of least privilege is hard, even for organizations with high incentives to be secure. It
requires constant testing of security boundaries and the monitoring of privileged access. But the benefits are
huge: It will help you defend against external attacks and insider threats, comply with regulatory requirements,
and simplify change and configuration management.
About Netwrix
Netwrix is a software company that enables information security and governance professionals to reclaim
control over sensitive, regulated and business-critical data, regardless of where it resides. Over 10,000 organi-
zations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise
content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and
knowledge workers.
Founded in 2006, Netwrix has earned more than 150 industry awards and been named to both the Inc. 5000
and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.
For more information, visit www.netwrix.com.
Corporate Headquarters:
300 Spectrum Center Drive, Suite 200, Irvine, CA 92618
Phone: 1-949-407-5125 Toll-free: 888-638-9749 EMEA: +44 (0) 203-588-3023 netwrix.com/social
8
Enforce the Principle
of Least Privilege
and Ensure Strong Data Access
Governance in Your Organization
Identify excessive access rights
and directly assigned permissions
Know who has access to what data
on your file servers and SharePoint
Control permissions changes
across systems
Download Free 20-Day Trial