The root account sat idle. No keys. No session. No silent permissions. This is Zero Standing Privilege as Lnav runs it—access stripped to the bone until the moment it’s needed, then gone again before the dust settles.
Lnav Zero Standing Privilege means no permanent high-risk credentials living in your system. No admin tokens hanging in memory. No SSH keys sitting in config files. It enforces on-demand elevation, so privilege exists only for the exact task, in the exact time window, then evaporates. The attack surface collapses. Persistence dies.
The model is simple but absolute.
- No standing credentials for any privileged role.
- Privilege granted only through explicit, time-bound approval.
- Automatic revocation—forced and final—without relying on human discipline.
For engineers, this changes the security equation. A misconfiguration or credential leak no longer means instant total compromise. Attackers can't pivot into root access because root doesn't exist until the request is approved and verified. Lnav brokers the session, logs the activity, and closes it as soon as the work is done.