Table of Contents
Question
A security administrator notices that users in different departments have access to data that they do not need for their roles. Which security principle should be enforced?
A. Least privilege
B. Zero trust
C. Defense in depth
D. Role-based access control (RBAC)
E. Multi-factor authentication
Answer
A. Least privilege
Explanation
The least privilege principle ensures users only have access to the data necessary for their job functions, reducing security risks.
What is the principle of least privilege, and why should it be enforced when users have access to data they don’t need? Learn how least privilege reduces risk and protects sensitive information—essential for the Cisco Certified Support Technician (CCST) Cybersecurity 100-160 exam.
The security principle that should be enforced when users in different departments have access to data not required for their roles is the principle of least privilege.
The principle of least privilege (PoLP) is a foundational cybersecurity concept that dictates users should be granted only the minimum access rights necessary to perform their job functions—no more, no less.
Enforcing least privilege limits the risk of accidental or intentional misuse of sensitive information, reduces the attack surface, and helps contain the impact of security incidents by restricting lateral movement within the network.
For example, if an employee in marketing can access confidential HR files, this violates least privilege and increases the risk of data leakage or insider threats.
Least privilege should be applied to all user accounts, applications, and systems, ensuring that each has access only to the resources essential for their specific tasks.
Regular reviews and adjustments are necessary to prevent privilege creep, where users accumulate unnecessary permissions over time, further increasing organizational risk.
Enforcing least privilege ensures users only have access to the data necessary for their job functions, significantly reducing security risks and protecting sensitive information.
Cisco Certified Support Technician (CCST) Cybersecurity 100-160 certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Cisco Certified Support Technician (CCST) Cybersecurity 100-160 exam and earn Cisco Certified Support Technician (CCST) Cybersecurity 100-160 certification.