What is Least Privilege?
Least privilege is the security principle of giving every user, account, and system only the minimum access required to do its job. Reducing permissions reduces the blast radius if a single credential is stolen or a device is compromised.
How Least Privilege works
Three-step view of how it operates in practice.
Inventory
Identify every account, role, and system. Document what it currently has access to.
Right-size
For each role, define the minimum permissions needed. Remove everything else. Convert admin-by-default setups to just-in-time.
Review
Privileges drift. Quarterly access reviews, automated recertification, and offboarding discipline keep the baseline clean.
Where least privilege applies
A clear breakdown of the common variants.
End-user accounts
Standard users shouldn’t be local admins on their laptops.
Admin accounts
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Service accounts
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
Applications
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why Least Privilege matters for SMBs
Least privilege is the security principle of giving every user, account, and system only the minimum access required to do its job.
Common Least Privilege mistakes
- Giving everyone admin to "make things easier"It makes attacks easier too. Standard-user accounts are the baseline.
- Never reviewing permissionsAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- Single shared admin accountBreaks auditability and blocks offboarding. Every admin needs a named account.
- Service accounts with god-modeApplications get scoped permissions, never Global Admin.
Least Privilege frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Privileged access sprawl?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.