MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Principle Least Privilege POLP Explained

Principle of Least Privilege (POLP): What, Why & Best Practices

The principle of least privilege (POLP) is a policy in which end users are given only the amount of access they need to carry out their jobs — nothing more and nothing less. Understandably, some end u...

Photo of Joey Dupont Joey Dupont

The principle of least privilege (POLP) is a policy in which end users are given only the amount of access they need to carry out their jobs — nothing more and nothing less.

Understandably, some end users aren’t thrilled with POLP, because once enforced, it means they can no longer access certain non-essential apps, tools and networks. In some cases, it can involve removing interfaces such as USB ports from devices so that end users cannot unintentionally facilitate an infection by copying malware-laden files from a USB drive – or intentionally exfiltrate confidential information by copying it to a USB drive.

However, POLP is not designed to punish end users and make their lives more difficult. Rather, it is meant to minimize the size of the attack surface, and ultimately reduce the likelihood and severity of a cyber attack. This is especially important now that hackers routinely exploit compromised low-level accounts in order to spread laterally across devices and networks, and ultimately access critical systems and sensitive data.

Additional Benefits of POLP

In addition to minimizing the size of the attack surface, POLP offers additional security benefits, including:

POLP Factors

Depending on the operating system, POLP can be implemented across one or multiple factors, such as:

Typically, sysadmins customize the POLP profile that fits their organization’s specific needs, and seek to balance the need for strong security with the fact that end users require sufficient access to be productive and efficient.

POLP Best Practices

There are a number of POLP best practices that organizations are strongly encouraged to adopt — and not just big enterprises, either. SMBs have become “ground zero” for cyber crime, and a staggering 60% of small businesses go out of business altogether within six months of a major cyber attack. These best practices include:

How Devolutions Password Server Helps

Devolutions Password Server (DPS) can be an important piece of the overall POLP puzzle. It securely and centrally empowers organizations to:

In addition, when integrated with Remote Desktop Manager (RDM), DPS supports one-click direct connection to websites, apps and remote IT resources, providing a simplified and highly secured remote access management. It also features an easy-to-use and simplified web interface for end users to store passwords and other confidential information.

The Bottom Line

At the 2017 Black Hat conference, privileged account solutions company Thycotic conducted a survey of more than 250 self-described hackers who revealed that the number one way to get hold of sensitive data is by hacking privileged accounts. And according to the Verizon 2017 Data Breach Investigation Report, a whopping 81% of breaches derive from stolen, default or weak passwords. Add it all up and it means that POLP is not just a smart idea, but it is essential on an increasingly threatening landscape where the risks and costs of a breach are getting higher and higher.

More from Security

Read more articles