0 votes
in AWS by

An administrator is tasked to configure privileges for the new joiners in the department.

The admin is selectively granting privileges and ensuring that not all the team members can access all the resources. Which principle is the administrator following?

1 Answer

0 votes
by

Answer: D.

Option A is INCORRECT.

This is not a valid option.

Option B is INCORRECT.

This is not a valid option.

Option C is INCORRECT.

This is not a valid option.

Option D is CORRECT.

The administrator follows the “Principle of least privilege” as not all the privileges are granted to all the new joiners.

The privileges are being selectively granted.

Reference:

https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#grant-least-privilege

The principle that the administrator is following is the Principle of Least Privilege, which is the practice of limiting user access rights to the minimum level necessary to perform their job functions. This principle is an essential part of any security strategy and helps to minimize the risk of a security breach.

By selectively granting privileges, the administrator is ensuring that each team member has access only to the resources they need to perform their job functions. This helps to prevent accidental or intentional misuse of resources and limits the potential damage that could occur in the event of a security breach.

The Principle of Least Privilege is often used in combination with other security principles and best practices, such as the Principle of Privileged Users, which involves restricting access to high-level privileges and closely monitoring privileged accounts. It is also related to the Best Practices of Permission Advisory, which involves regularly reviewing and auditing user permissions to ensure that they are appropriate and up-to-date.

Overall, the Principle of Least Privilege is a fundamental security principle that helps organizations to minimize risk and protect their resources. By following this principle, administrators can ensure that each team member has access only to the resources they need to do their job, while limiting the potential damage that could occur in the event of a security breach.

...