CISSP · · 4 min read

Authorization and the Principle of Least Privilege: Giving People Exactly What They Need

Excessive access powers many breaches. Learn how least privilege, separation of duties, and privileged access management keep authorization aligned with real job needs.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Authorization and the Principle of Least Privilege: Giving People Exactly What They Need

Hook / Why this matters

Many breaches involve attackers using valid accounts that simply had too much access. Authentication worked, but authorization failed. Least privilege turns access control from a yes or no decision into a careful question of how much access is truly needed.

Core concept explained simply

Authorization determines what an authenticated user or system is allowed to do. Where authentication answers "who are you", authorization answers "what are you allowed to do".

Least privilege and need to know

The principle of least privilege says that every subject should have the minimum access necessary to perform assigned tasks, and no more. Need to know focuses this on information, granting access only to data required for a job function.

When applied effectively, least privilege:

Separation of duties

Separation of duties ensures that no single person can control all steps of a critical process. Examples include:

This reduces fraud and error risk. Authorization systems must enforce these separations, not just policies on paper.

Privilege escalation

Privilege escalation occurs when a user gains more privileges than intended.

Poorly designed authorization often makes these attacks easier.

Privileged Access Management

Privileged Access Management (PAM) focuses on high value accounts such as system administrators, database administrators, and domain admins.

Modern PAM practices include:

This approach reduces the number of always privileged accounts and improves accountability.

Entitlement reviews

Over time, people change roles, take on projects, and collect new access rights. If old access is not removed, privilege creep builds up.

Entitlement reviews or access certification campaigns ask managers and data owners to periodically confirm that access rights are still appropriate.

CISSP lens

For Domain 5, authorization concepts connect directly to risk management and governance.

Important exam points:

Questions often describe an employee who changed roles but kept old access, or a process where one person can create and approve their own transactions. The best answers apply least privilege, separation of duties, and periodic reviews.

Real world scenario

A mid sized company had an accounts payable clerk who joined as an assistant and grew into a more senior role over several years. Each time she took on new duties, IT added the necessary access.

No one removed her old rights. Eventually she could:

There was no technical enforcement of separation of duties.

She created fake vendors, entered invoices, approved them herself, and paid them out. The fraud continued for months before a pattern was noticed during an external audit.

In response, the company:

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: An employee moves from the finance department to marketing but retains full access to the finance system. Which principle is being violated, and what control would best address this

Answer: The principle of least privilege is violated, since the employee now has access beyond what is needed for the new role. Stronger role based access control with automated role change handling, combined with regular access reviews, would ensure that old finance privileges are removed when the employee changes roles.

Read next

© 2025 Threat On The Wire. All rights reserved.