Not because the perimeter failed, but because access control failed.
The NIST Cybersecurity Framework calls for strict access management under the “Protect” function. At the core is the principle of Least Privilege—granting users, processes, and systems only the minimum access they need to perform their task, and nothing more. It is a simple rule with far-reaching impact on security posture.
Under the NIST CSF, Least Privilege aligns with Category PR.AC-4: “Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties.” This is not a suggestion. It is a control that reduces lateral movement, limits blast radius, and blocks escalation paths that attackers exploit.
Implementing Least Privilege begins with access audits. Remove unused accounts. Reduce elevated permissions. Map roles to required actions, then enforce policy across identity providers, databases, servers, and CI/CD pipelines. Monitor changes and log every access decision. Automate revocation when roles shift or projects end.