醉代表什么生肖| 头总是昏昏沉沉的是什么原因| 绿字五行属什么| 皮肤黑的人适合穿什么颜色的衣服| 舌头发麻看什么科| 更年期失眠吃什么药效果好| 动脉夹层是什么病| fierce是什么意思| 不发烧流鼻涕打喷嚏吃什么药| 世界上最大的数是什么| 卡西欧属于什么档次| ppl是什么药| 鹦鹉吃什么蔬菜| 孕前检查挂什么科| 归脾丸的功效与作用治什么病| covu药片是什么药| 办健康证需要带什么证件| 苏打是什么| 什么还珠成语| 游龙斑是什么鱼| 腱鞘囊肿挂什么科| 生化全套主要检查什么| 9月6日什么星座| superstar是什么意思| 什么是资本家| 为什么狗不能吃巧克力| 喝酒前吃什么药| 什么门关不上| 男生圆脸适合什么发型| 2007年是什么生肖| 纪梵希属于什么档次| 笑刑是什么| 免疫系统由什么组成| 你干什么呢| 什么是幂| 什么蚂蚁有毒| 内分泌失调吃什么| 赤小豆和红豆有什么区别| 孕妇吃海带有什么好处| 葛根粉有什么功效| 惊风是什么意思| 包皮脱皮是什么原因| 此地无银三百两是什么意思| 拉墨绿色的大便是什么原因| 奄奄一息的息是什么意思| 腿肿是什么原因| 不堪入目是什么意思| 越睡越困是什么原因| 什么手机最贵| 徒刑是什么意思| 夹心饼干是什么意思| 甲状腺五类是什么意思| 吃了头孢不能吃什么| 左舌根疼痛是什么情况| 白带变多是什么原因| 前夕是什么意思| 坐蜡什么意思| 谷读什么| 梅花什么时候开| 戒指戴无名指是什么意思| 潜叶蝇打什么药效果好| 94年属什么的| 没落是什么意思| 镶牙与种牙有什么区别| ed是什么意思| 肥胖去医院挂什么科| 什么人适合学玄学| 舅舅和外甥女是什么关系| 子宫内膜异位是什么原因造成的| 怀孕甲减对孩子有什么影响| 同房后为什么会出血| 鸡蛋不能和什么食物一起吃| 手串14颗代表什么意思| 95年属什么多大| 怀孕周期是从什么时候开始算的| 排卵期什么症状和反应| 做背有什么好处及作用| 什么是乳腺增生| 饷是什么意思| 表水是什么意思| 什么时候着床| 电脑一体机什么牌子好| 你什么都没看见| 眼球内容物包括什么| 看望病人买什么东西好| 野兽是什么生肖| 非典型细胞是什么意思| 斑秃吃什么药| 内裤用什么洗比较好| 粒细胞是什么| 樱花的花语是什么| 吃甲硝唑有什么副作用| 捉摸不透是什么意思| 吃夏枯草有什么副作用| sds是什么| 师父的老公叫什么| 脉细滑是什么意思| 打嗝什么原因| 子年是什么年| 奥美拉唑有什么副作用| 回声团是什么意思| 血压高有什么好办法| 不思量 自难忘什么意思| 为什么怀孕了就不来月经了| 三文鱼不能和什么一起吃| 奇异是什么意思| 山楂搭配什么泡水喝好| 白天咳嗽晚上不咳嗽是什么原因| 尼日利亚说什么语言| 白色舌苔厚是什么原因| 惆怅是什么意思| 什么地方| 更年期是什么时候| 白敬亭父母是干什么的| 1943年属什么| 地笼捕河虾用什么诱饵| 什么是熵| 第三产业是什么| 6月18号什么星座| 欠钱不还被起诉会有什么后果| 左侧附件区囊性占位是什么意思| 羊肉汤放什么调料| 金脸银脸代表什么人物| 蔷薇色是什么颜色| 学海无涯苦作舟的上一句是什么| 什么的面目| 长白头发缺什么维生素| 违反禁令标志指示什么意思| 榴莲壳可以做什么| 死刑是什么意思| 慢性肠炎吃什么药调理| 家里为什么会有蚂蚁| 肠系膜多发淋巴结是什么意思| 阿尔卑斯是什么意思| 为什么叫关东军| 9月19是什么星座| 藏茶属于什么茶| 吃什么爱放屁| 窈窕淑女君子好逑是什么意思| 两千年前是什么朝代| 熳是什么意思| 早上吃什么好| 一什么石头| 拔指甲挂什么科| 双侧卵巢多囊性改变是什么意思| 上海话册那是什么意思| 心脏24小时监测叫什么| 练深蹲有什么好处| 笑面虎比喻什么样的人| 血晕症是什么病| 为什么肛门会出血| 5月12日什么星座| 饭撒是什么意思| 外寒内热感冒吃什么药| 骗婚是什么意思| 火车票改签是什么意思| 鸟字旁与什么有关| 检测怀孕最准确的方法是什么| 电光性眼炎用什么眼药水| 酒不醉人人自醉是什么意思| 女儿茶属于什么茶| 孕酮低什么原因| 女人吃桑葚有什么好处| 重庆五行属什么| 严重贫血的人吃什么补血最快| 孕早期适合吃什么食物| 好吃懒做是什么生肖| 四眼狗有什么迷信说法| 属兔带什么招财| 湿疹是什么症状| 做梦梦到乌龟是什么预兆| 性冷淡什么意思| 帕金森吃什么药好得快| 1999年发生了什么事| 为什么手淫很快就射| 维纳斯是什么意思| 男人阴茎硬不起来是什么原因| 无利不起早是什么意思| 路的尽头是什么| 那悲歌总会在梦中惊醒是什么歌| balenciaga是什么牌子| 起付线是什么意思| 脚心抽筋是什么原因引起的| 乌龟为什么喜欢叠罗汉| 8月12日是什么星座| 亦或是什么意思| 爱新觉罗是什么意思| 木鱼花是什么做的| 芊字五行属什么| 九头身什么意思| 为什么气血不足| 养殖业什么最赚钱农村| 宝宝入盆有什么感觉| 梅毒单阳性是什么意思| 晚上2点是什么时辰| 输卵管不通有什么症状| 医学美容技术学什么| 脚底红润是什么原因| 甘油三酯高吃什么能降下来| 中考报名号是什么| 检查头部挂什么科室| 孕晚期为什么会脚肿| 什么补血快| 博士在古代是什么意思| 脾胃不和吃什么药| 小姨是什么| hb是什么意思| 龟龟是什么意思| 六字箴言是什么意思| 锁骨是什么骨| tf卡是什么| 两个山念什么| 太平猴魁是什么茶| 被虫咬了挂什么科| 黄疸是什么意思| 牡丹是什么意思| 心灵的洗礼是什么意思| 什么食物胆固醇含量高| 子宫内膜炎是什么原因造成的| 身骑白马是什么方言| 什么交加| 右手臂痛是什么预兆| 黄色配什么颜色最搭| 脂肪肝什么症状| 水漂是什么意思| 做绝育手术对女人有什么影响| 继发性高血压什么意思| 湿气重吃什么水果| 氯雷他定为什么比西替利嗪贵| 又当又立是什么意思| 吃什么对神经恢复快速| 小孩抽动症是什么引起的| ect是什么| 开市是什么意思| 女人小肚子疼是什么原因| 嘴角周围长痘痘是什么原因| 苦瓜有什么营养| 鳄鱼是什么动物| 丢包是什么意思| 刮痧用什么油刮最好| 怀孕是什么脉象| 葡萄糖氯化钠注射作用是什么| 保护嗓子长期喝什么茶| 男人嘴角有痣代表什么| 药店最怕什么样的举报| lee是什么牌子中文名| 水猴子长什么样子| 女人辟邪带什么最好| 狐狸是什么动物| 北京五行属什么| 儿童过敏性结膜炎用什么眼药水| 像什么一样| 滋味是什么意思| 壬水是什么水| 辟谷期间可以吃什么| 台阶是什么意思| honey什么意思| 矿物油是什么油| 小孩子肚子疼吃什么药| 肥皂水是什么| 额是什么意思| 甲状腺看什么科| 就加鸟念什么| 合肥属于什么省| 百度Jump to content

无现金联盟成立,支付宝用60亿推进无现金社会

From Wikipedia, the free encyclopedia
百度 桐昆股份方面,国海证券(000750)表示,公司2017年业绩符合预期,持续内生增长+参股浙石化,盈利有望再上台阶。

In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege (PoMP) or the principle of least authority (PoLA), requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.[1]

Details

[edit]

The principle means giving any user accounts or processes only those privileges which are essentially vital to perform its intended functions. For example, a user account for the sole purpose of creating backups does not need to install software: hence, it has rights only to run backup and backup-related applications. Any other privileges, such as installing new software, are blocked. The principle applies also to a personal computer user who usually does work in a normal user account, and opens a privileged, password protected account only when the situation absolutely demands it.

When applied to users, the terms least user access or least-privileged user account (LUA) are also used, referring to the concept that all user accounts should run with as few privileges as possible, and also launch applications with as few privileges as possible.

The principle (of least privilege) is widely recognized as an important design consideration towards enhancing and giving a much needed 'Boost' to the protection of data and functionality from faults (fault tolerance) and malicious behavior.

Benefits of the principle include:

  • Intellectual Security. When code is limited in the scope of changes it can make to a system, it is easier to test its possible actions and interactions with other security targeted applications. In practice for example, applications running with restricted rights will not have access to perform operations that could crash a machine, or adversely affect other applications running on the same system.
  • Better system security. When code is limited in the system-wide actions it may perform, vulnerabilities in one application cannot be used to exploit the rest of the machine. For example, Microsoft states “Running in standard user mode gives customers increased protection against inadvertent system-level damage caused by "shatter attacks" and malware, such as root kits, spyware, and undetectable viruses”.[2]
  • Ease of deployment. In general, the fewer privileges an application requires, the easier it is to deploy within a larger environment. This usually results from the first two benefits, applications that install device drivers or require elevated security privileges typically have additional steps involved in their deployment. For example, on Windows a solution with no device drivers can be run directly with no installation, while device drivers must be installed separately using the Windows installer service in order to grant the driver elevated privileges.[3]

In practice, there exist multiple competing definitions of true (least privilege). As program complexity increases rapidly, so do the number of potential issues, rendering a predictive approach impractical. Examples include the values of variables it may process, addresses it will need, or the precise time such things will be required. Object capability systems allow, for instance, deferring granting a single-use privilege until the time when it will be used. Currently, the closest practical approach is to eliminate privileges that can be manually evaluated as unnecessary. The resulting set of privileges typically exceeds the true minimum required privileges for the process.

Another limitation is the granularity of control that the operating environment has over privileges for an individual process.[4] In practice, it is rarely possible to control a process's access to memory, processing time, I/O device addresses or modes with the precision needed to facilitate only the precise set of privileges a process will require.

The original formulation is from Jerome Saltzer:[5]

Every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job.

Peter J. Denning, in his paper "Fault Tolerant Operating Systems", set it in a broader perspective among "The four fundamental principles of fault tolerance".

"Dynamic assignments of privileges" was earlier discussed by Roger Needham in 1972.[6][7]

Historically, the oldest instance of (least privilege) is probably the source code of login.c, which begins execution with super-user permissions and—the instant they are no longer necessary—dismisses them via setuid() with a non-zero argument as demonstrated in the Version 6 Unix source code.

Implementation

[edit]

The kernel always runs with maximum privileges since it is the operating system core and has hardware access. One of the principal responsibilities of an operating system, particularly a multi-user operating system, is management of the hardware's availability and requests to access it from running processes. When the kernel crashes, the mechanisms by which it maintains state also fail. Therefore, even if there is a way for the CPU to recover without a hard reset, security continues to be enforced, but the operating system cannot properly respond to the failure because it was not possible to detect the failure. This is because kernel execution either halted or the program counter resumed execution from somewhere in an endless, and—usually—non-functional loop.[citation needed] This would be akin to either experiencing amnesia (kernel execution failure) or being trapped in a closed maze that always returns to the starting point (closed loops).

The principle of least privilege demonstrated by privilege rings for the Intel x86

If execution picks up after the crash by loading and running trojan code, the author of the trojan code can usurp control of all processes. The principle of least privilege forces code to run with the lowest privilege/permission level possible. This means that the code that resumes the code execution-whether trojan or simply code execution picking up from an unexpected location—would not have the ability to perform malicious or undesirable processes. One method used to accomplish this can be implemented in the microprocessor hardware. For example, in the Intel x86 architecture the manufacturer designed four (ring 0 through ring 3) running "modes" with graduated degrees of access-much like security clearance systems in defence and intelligence agencies.[citation needed]

As implemented in some operating systems, processes execute with a potential privilege set and an active privilege set.[citation needed] Such privilege sets are inherited from the parent as determined by the semantics of fork(). An executable file that performs a privileged function—thereby technically constituting a component of the TCB, and concomitantly termed a trusted program or trusted process—may also be marked with a set of privileges. This is a logical extension of the notions of set user ID and set group ID.[citation needed] The inheritance of file privileges by a process are determined by the semantics of the exec() family of system calls. The precise manner in which potential process privileges, actual process privileges, and file privileges interact can become complex. In practice, least privilege is practiced by forcing a process to run with only those privileges required by the task. Adherence to this model is quite complex as well as error-prone.

Similar principles

[edit]

The Trusted Computer System Evaluation Criteria (TCSEC) concept of trusted computing base (TCB) minimization is a far more stringent requirement that is only applicable to the functionally strongest assurance classes(Link to Trusted Computer System Evaluation Criteria section Divisions and classes), namely the classes B3 and A1 (which are functionally identical but differ in terms of evidence and documentation required).

Least privilege is often associated with privilege bracketing: that is, assuming necessary privileges at the last possible moment and dismissing them as soon as no longer strictly necessary, therefore ostensibly reducing fallout from erroneous code that unintentionally exploits more privilege than is merited. Least privilege has also been interpreted in the context of distribution of discretionary access control (DAC) permissions, for example asserting that giving user U read/write access to file F violates least privilege if U can complete their authorized tasks with only read permission.

See also

[edit]

References

[edit]
  1. ^ Saltzer, Jerome H.; Schroeder, Michael D. (1975). "The protection of information in computer systems". Proceedings of the IEEE. 63 (9). Institute of Electrical and Electronics Engineers (IEEE): 1278–1308. doi:10.1109/proc.1975.9939. ISSN 0018-9219. OCLC 5871551104. S2CID 269166.
  2. ^ Jonathan, Clark; DABCC Inc. "Virtualization Guru Writes "User-mode is a Good Thing - Deployment to Locked-down Accounts without Security Elevation"". Archived from the original on 10 February 2013. Retrieved 15 Mar 2013.
  3. ^ Aaron Margosis (August 2006). "Problems of Privilege: Find and Fix LUA Bugs". Microsoft.
  4. ^ "Matt Bishop, Computer Security: Art and Science, Boston, MA: Addison-Wesley, 2003. pp. 343-344 cited Barnum & Gegick 2005". Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  5. ^ Saltzer, Jerome H. (1974). "Protection and the control of information sharing in multics". Communications of the ACM. 17 (7): 388–402. CiteSeerX 10.1.1.226.3939. doi:10.1145/361011.361067. ISSN 0001-0782. S2CID 326132.
  6. ^ Needham, R. M. (1972). "Protection systems and protection implementations". Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Part I. pp. 571–578. doi:10.1145/1479992.1480073. S2CID 7371342.
  7. ^ Fred B. Schneider. "Least Privilege and More" (PDF).

Bibliography

[edit]
[edit]
肚脐眼连接体内的什么器官 肝火旺盛吃什么食物好 高圆圆老公叫什么名字 精满自溢是什么意思 耳堵是什么
我什么都可以 囊肿是什么原因造成的 脂肪肝是什么意思啊 西安古时候叫什么 小排畸主要检查什么
属虎的脖子戴什么招财 肺气肿用什么药效果好 痔疮手术后可以吃什么 上尉是什么级别 教师节贺卡上写什么
hpv检查什么项目 胃酸反酸水吃什么药 顶到子宫是什么感觉 拉稀吃什么食物好 腰椎疼挂什么科
angelababy英文什么意思hcv9jop2ns7r.cn 脚底板疼用什么药0297y7.com 多五行属性是什么inbungee.com 什么东西能吃不能碰hcv8jop0ns5r.cn 正比是什么意思hcv7jop6ns9r.cn
蒙蔽是什么意思hcv8jop5ns1r.cn 医保报销需要什么材料hcv8jop3ns7r.cn svip是什么意思hcv8jop4ns5r.cn ivy什么意思hcv9jop4ns4r.cn 口大是什么字shenchushe.com
sc1是什么意思imcecn.com alike是什么意思xinmaowt.com 头颅mri是什么检查hcv8jop7ns6r.cn 吃什么可以提高记忆力hcv9jop4ns9r.cn vos是什么意思hcv8jop0ns6r.cn
人又不人鬼不鬼是什么生肖hcv9jop1ns0r.cn 什么东西不能托运hcv7jop6ns7r.cn 牛肉炒什么hcv9jop2ns0r.cn rose是什么意思hcv9jop3ns6r.cn 膻是什么意思hcv8jop0ns6r.cn
百度