The token was dead the second it was issued. A single-use key. No lingering session. No persistent permission. That’s Zero Standing Privilege for REST APIs.
Most API breaches don’t happen because attackers are magical. They happen because privilege sits around, waiting to be stolen. Permanent tokens, admin sessions, wide-open scopes—these are traps. Once a credential exists beyond its immediate need, it becomes an attack surface. Zero Standing Privilege (ZSP) erases that surface.
In a REST API world, Zero Standing Privilege means no static API keys in code, no long-lived sessions in memory, and no pre-granted access waiting to be abused. Every request should earn its permissions on demand. Auth tokens exist for seconds or minutes, tied only to the current operation. When they expire, they’re useless—even if intercepted.
Implementing ZSP in REST APIs changes the security posture from reactive to preemptive. Instead of monitoring for leaked keys, you remove the possibility that keys can be reused. Instead of depending on vaults and rotations, you stop storing standing credentials at all. Every call is verified in the moment, bound to a known user, device, and context, and tied to a short window of execution.