The attacker didn’t smash the front door. They walked through an open side gate—an over-permissive account that no one remembered. This is why least privilege is not optional, and why access decisions need to be risk-based, not static.
Least Privilege Risk-Based Access means that every identity—human or machine—gets only the permissions required for its immediate task, and that those permissions adapt in real time to the context and risk level. Static roles and manual reviews can’t keep up with shifting threats. Attackers know this, which is why excessive standing privileges are gold to them.
With risk-based controls, access isn’t just granted or denied. It’s evaluated. The system can grant elevated rights for a short time, triggered by clear need, and revoke them automatically. It can factor in device health, location, recent behavior, and the sensitivity of the requested resource. This makes over-provisioning harder, and lateral movement risk much lower.
Poor access hygiene fuels insider threats and account compromises. Over-privileged accounts can persist for months unnoticed. Mapping every account’s actual usage against its granted rights is not optional work—it’s the core of enforcing least privilege. Risk-based enforcement takes this further, so even if an account is compromised, its risk profile will limit the blast radius.