Time-honored best practices that could stop most breaches
The following best practices are well known in the security community and time-honored. We know these best practices are effective in making the work of attackers far more difficult. In most cases, only the most sophisticated actors could defeat these countermeasures on a large scale. However, they are rarely implemented.
First, let's examine the Concept of Least Privilege.
Concept of Least Privilege
The Concept of Least Privilege, sometimes referred to as the Principle of Least Privilege, states that a user should not be granted any permissions beyond the minimum they need to perform their job function. While this sounds simple and rational, implementing least privilege is very difficult. Most organizations don't maintain a list of specific permissions each user needs to perform their job function. Second, when trying to implement least privilege, the default mode is blocking. As a result, if a mistake is...