Least Privilege is the principle that every account, process, or system should have the minimum access needed to perform its job—nothing more. It reduces the attack surface and limits the blast radius when something is compromised. No admin rights for normal tasks. No database access for code that doesn’t query it. No permissions you “might” need someday.
Zero Standing Privilege takes this further. It means no account holds privileged access by default. Privilege is granted only when required, approved, and for a short window of time. When the task ends, privileges expire automatically. This removes persistent admin accounts that attackers target. It also stops dormant high-risk permissions from being exploited.
The combination of Least Privilege and Zero Standing Privilege is a proven defense against credential theft, insider threats, and privilege escalation. Attackers can’t move laterally if network paths are closed. Malware can’t exfiltrate sensitive data if those routes don’t exist in idle accounts.