top of page

PoLP (Principle of Least Privilege)

  • Writer: Eva Vetter
    Eva Vetter
  • Jul 4
  • 1 min read

Looking back to my early days as an apprentice in the Information Technology realm, the significance of IAM (Identity Access Management) was often overlooked. In many cases, particularly within smaller organizations, the approach involved granting administrator privileges to all to streamline access, a practice humorously dubbed the "God rule" due to its all-encompassing nature.


Over time, these entities recognized the flaws in this approach and pivoted towards implementing PoLP (Principle of Least Privilege) to enhance security measures.


It's concerning to observe the American government's utilization of an insecure messaging platform, coupled with the allowance for unauthorized users to access top-secret messages. This prompts critical questions about the root cause of such lapses. Could the breach be attributed to the use of personal devices or the absence of BYOD (Bring Your Own Device) security protocols?

ree

To reiterate, these were the security protocols that were blatantly dismissed in my opinion:


Use of personal devices 

Communication in foreign countries 

Insecure messaging 

Lack of VPN

No BYOD protocols 

Classification tags not present


I would love to hear from Security Professionals, much more intelligent than myself, to add any others that I may have missed in the mishandling of this information.



Comments


Subscribe for updates

Thanks for signing up! Stay tuned for updates!

Get In Touch

Eva's Apple Memoji

I'm excited to hear from you! If you have any questions, or want to share  your own tangy takes, just shoot me an email at admin@evavetter.com. Can't wait to connect!

 

© 2025 by Eva's Tangy Takes: A Portfolio Showcasing Product and Technology. Powered and secured by Wix 

 

bottom of page