Least Privilege Sample Clauses
The Least Privilege clause restricts access rights for users, systems, or processes to only those resources and permissions necessary to perform their assigned tasks. In practice, this means employees or software are granted the minimum level of access required, such as limiting database access to read-only for certain users or restricting administrative privileges to select personnel. This approach minimizes the risk of accidental or intentional misuse of sensitive information, thereby enhancing security and reducing the potential impact of security breaches.
POPULAR SAMPLE Copied 3 times
Least Privilege. Assignment of permissions and capabilities must be narrowly tailored and follow the Principle of Least Privilege. Each individual, Role, and account may have only the minimum level of access required to perform their authorized function. For example, a normal desktop user should not have administrator-level access on their machine and should not be able to change basic system settings or install new software; similarly, a web application should not be run with administrator rights (or root in the Linux/Unix context) to the operating systems on which it runs. At a minimum, Information Resources must have the following separate Roles and associated Accounts defined by EOTSS standard IS.003 Access Management:
a. User Account
b. System (or Application) Account
c. Service Account
d. Administrator (or Root) Account
e. Firecall (or breakglass/emergency recovery) Account
Least Privilege. Servicer must apply the "Principle of Least Privilege" (or "PLP") model for access to Cellco Confidential Information, enabling access only to such information as are necessary for person or process to perform a legitimate business function. Periodic review of PLP is required.
Least Privilege i. Technical support personnel are only permitted to have access to customer data when needed for the performance of their job function.
ii. The Data Importer restricts access to customer data to only those individuals who require such access to perform their job function.
Least Privilege. Vertice shall limit Representatives’ access to Data to those Representatives who have an actual need to access such Data to perform their assigned duties.
Least Privilege. Contractor shall authorize access only to the minimum amount of resources required for a function.
Least Privilege. Provider shall authorize access only to the minimum amount of resources required for a function;
Least Privilege. Limits systems access to Workers and resources that are needed to perform specific responsibilities or functions.
Least Privilege every user and program must operate using the least set of privileges necessary to complete the authorized job function.
Least Privilege. Cisco shall limit access to Personal Data to that personnel who need access for the purpose of providing the Services and Products and, to the extent technical support is needed, its personnel performing such technical support.
Least Privilege. The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function. Major Applications and Systems: Any system or application that includes one or more of the following characteristics: