Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Least Privilege (not using admin permissions) explained in detail: https://www.beyondtrust.com/blog/what-is-least-privilege/
 PDF Format: 

View file
nameLeast Privilege_ What it is and Why You Need it _ BeyondTrust.pdf
height250

Abandoned. Seems too technical and doesnt spell out and underline the risks clear enough. Members need to know "How this affects them" in every way so they feel it is important.

A Guide for Best Practices

At REMC1 we recommend that our clients follow a policy of "Least Privilege" when granting rights to users. The principle is simple, and the impact of applying it correctly greatly increases your security and reduces your risk. The principle states that all users should log on with a user account that has the absolute minimum  permissions necessary to complete the current task and nothing more. Doing so provides protection against malicious code, amongst other attacks. This principle applies to computers and the users of those computers.

The following excerpt is from the Microsoft Windows Security Resource Kit, first published in 2005:

"Always think of security in terms of granting the least amount of privileges required to carry out the task. If an application that has too many privileges should be compromised, the attacker might be able to expand the attack beyond what it would if the application had been under the least amount of privileges possible. For example, examine the consequences of a network administrator unwittingly opening an email attachment that launches a virus. If the administrator is logged on using the domain Administrator account, the virus will have Administrator privileges on all computers in the domain and thus unrestricted access to nearly all data on the network. If the administrator is logged on using a local Administrator account, the virus will have Administrator privileges on the local computer and thus would be able to access any data on the computer and install malicious software such as keystroke logging software on the computer. If the administrator is logged on using a normal user account, the virus will have access only to the administrator's data and will not be able to install malicious software. By using the least privileges necessary to read email, in this example, the potential scope of the compromise is greatly reduced."

REMC1 advises that all of our clients consider carefully whether users require administrative rights on their workstations, and if they do, a better approach may be to create a separate local account on the computer that is a member of the Administrators group. When users require elevation, they can present the credentials of that local account for elevation, but because the account is local, it cannot be used to compromise other computers or access domain resources. As with any local accounts, however, the credentials for the local privileged account should be unique; if you create a local account with the same credentials on multiple workstations, you expose the computers to pass-the-hash attacks.