翻訳と辞書
Words near each other
・ Priniatikos Pyrgos
・ Prink Callison
・ Prinkipo Greek Orthodox Orphanage
・ Prinknash Abbey
・ Prinny
・ Prinomastat
・ Prinos oil field
・ Prinoth
・ Principle of individuation
・ Principle of lateral continuity
・ Principle of least action
・ Principle of least astonishment
・ Principle of least effort
・ Principle of least interest
・ Principle of least motion
Principle of least privilege
・ Principle of locality
・ Principle of marginality
・ Principle of material objectivity
・ Principle of maximum entropy
・ Principle of maximum work
・ Principle of minimum energy
・ Principle of no-work-no-pay (dies non)
・ Principle of nonvacuous contrast
・ Principle of normality
・ Principle of opportunity
・ Principle of original horizontality
・ Principle of orthogonal design
・ Principle of permanence
・ Principle of plenitude


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Principle of least privilege : ウィキペディア英語版
Principle of least privilege

In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.〔Saltzer 75〕〔Denning 76〕
== Details ==

The principle means giving a user account only those privileges which are essential to that user's work. For example, a backup user does not need to install software: hence, the backup user has rights only to run backup and backup-related applications. Any other privileges, such as installing new software, are blocked. The principle applies also to a personal computer user who usually does work in a normal user account, and opens a privileged, password protected account (that is, a superuser) only when the situation absolutely demands it.
When applied to users, the terms ''least user access'' or ''least-privileged user account'' (LUA) are also used, referring to the concept that all user accounts at all times should run with as few privileges as possible, and also launch applications with as few privileges as possible. Software bugs may be exposed when applications do not work correctly without elevated privileges.
The principle of least privilege is widely recognized as an important design consideration in enhancing the protection of data and functionality from faults (fault tolerance) and malicious behavior (computer security).
Benefits of the principle include:
* Better system stability. When code is limited in the scope of changes it can make to a system, it is easier to test its possible actions and interactions with other applications. In practice for example, applications running with restricted rights will not have access to perform operations that could crash a machine, or adversely affect other applications running on the same system.
* Better system security. When code is limited in the system-wide actions it may perform, vulnerabilities in one application cannot be used to exploit the rest of the machine. For example, Microsoft states “Running in standard user mode gives customers increased protection against inadvertent system-level damage caused by "shatter attacks" and malware, such as root kits, spyware, and undetectable viruses”.
* Ease of deployment. In general, the fewer privileges an application requires the easier it is to deploy within a larger environment. This usually results from the first two benefits, applications that install device drivers or require elevated security privileges typically have additional steps involved in their deployment, for example on Windows a solution with no device drivers can be run directly with no installation, while device drivers must be installed separately using the Windows installer service in order to grant the driver elevated privileges.
In practice, true least privilege is neither definable nor possible to enforce. Currently, there is no method that allows evaluation of a process to define the least amount of privileges it will need to perform its function. This is because it is not possible to know all the values of variables it may process, addresses it will need, or the precise time such things will be required. Currently, the closest practical approach is to eliminate privileges that can be manually evaluated as unnecessary. The resulting set of privileges still exceeds the true minimum required privileges for the process.
Another limitation is the granularity of control that the operating environment has over privileges for an individual process.〔(Matt Bishop, ''Computer Security: Art and Science'', Boston, MA: Addison-Wesley, 2003. pp. 343-344 cited Barnum & Gegick 2005 )〕 In practice, it is rarely possible to control a process's access to memory, processing time, I/O device addresses or modes with the precision needed to facilitate only the precise set of privileges a process will require.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Principle of least privilege」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.