The alert hits. Something is wrong. Access is needed now, but the system is sealed tight. Least privilege rules hold the line—only break-glass access can cut through.
Break-glass access is the controlled override of strict permissions. It exists for rare, high-stakes situations where normal privileges block critical fixes. Combined with least privilege, it is a safeguard against both chaos and complacency. Users get exactly the rights they need, exactly when they need them, and nothing more.
The least privilege model limits permissions to the bare minimum for normal workflows. This reduces attack surfaces, stops lateral movement, and shrinks the blast radius of compromises. But no matter how well planned, there will be moments when regular permissions are not enough—patching a vulnerability, restarting locked systems, accessing hidden configurations. Without break-glass, response times stretch. With it, risk remains contained.