Not by accident, and not by a firewall—by a razor‑sharp rule that said only the process that needed access could touch it, and only for as long as necessary. That is the core of least privilege platform security.
Least privilege means every account, service, container, and pipeline runs with the smallest set of permissions required to function. No write access without a write task. No network route without a network need. Every extra permission is a potential attack vector.
A platform built on least privilege has hard boundaries. Identity and access management enforces them. Role‑based access control or policy‑based access control defines them. Continuous auditing tests them. Secrets are kept in secure vaults, rotated often, and never exposed in logs.
Without least privilege, escalation is easy. One compromised API token can wander across systems unchecked. A dev account can alter production code. A misconfigured role can open the door to lateral movement. By constraining privilege, you choke these paths before they exist.