
Privilege refers to the authorization to bypass certain security restraints. Use the Cyber Security Slack channel ( #cyber-security-help) to set up the audit trail. The principle of least privilege (POLP), an important concept of computer security, is the practice of limiting access rights for users, accounts and computing processes to only those needed to do the job at hand. You should send the audit trail of admin access to the Cyber Security team. You should set up the admin account so that the session timeout is less than 12 hours.

You should only assume an admin role when absolutely necessary for a specific task. If you’re using the gds-users account to log into your AWS accounts, you should assume a read-only role by default.
#Principle of least privilege in security password
establish an audit trail for the use of privileged accessįor human-readable secrets, such as a username and password, you should set up a separate secret or password manager.make sure session time of the privileged access is set to no more than 12 hours, and/or terminates when the user logs out of their laptop.use just-in-time (JIT) access provisioning to grant users an on-demand, time-limited privileged role or security token to access the privileged resources.use the role or credentials with the least possible privilege as the default option.Restricting the level access to only whats needed also restricts the amount of things an attacker can do if the account is compromised. create the roles or credentials with the least possible privilege, with only necessary permissions required for normal users to perform their day-to-day jobs The principle of least privilege means only having the access you need to do your job.


