Privileged access is the greatest single risk factor in enterprise security. Attackers who gain privileged credentials — domain administrator accounts, root access, or service accounts with broad permissions — can access virtually any system and data in the organisation. Privileged Access Management (PAM) is the discipline of identifying, securing, and monitoring privileged accounts to reduce this risk. For the CISSP exam, PAM is tested as a governance and architecture topic in Domain 5, with specific attention to the concepts of least privilege, just-in-time access, and the controls that PAM systems provide.

The Principle of Least Privilege in Access Provisioning

The principle of least privilege states that every subject (user, process, system) should be granted only the minimum access rights required to perform its legitimate function, and nothing more. This applies to both the scope of access (which resources) and the level of access (what operations are permitted on those resources).

Least privilege is both a provisioning principle and an ongoing management obligation. At provisioning time, access should be granted based on the actual requirements of the role, not based on convenience or historical patterns of what previous holders of that role received. Provisioning based on copying another user's permissions ("give them the same access as Bob") is a common violation that leads to privilege creep.

Privilege creep occurs when users accumulate access rights over time as their roles change, without old access being revoked. An employee who moves from Finance to IT may retain all their Finance access while gaining new IT access. Over time, they have access to systems that far exceed what their current role requires. Regular access reviews (recertification) are the control for privilege creep.

For the exam: the principle of least privilege is the foundation of all access control. Provisioning should be role-based and minimal. Privilege creep is addressed through periodic access reviews.

Just-In-Time Access

Just-In-Time (JIT) access is an access provisioning model where privileged access is granted temporarily at the time it is needed and automatically revoked when the task is complete. Rather than maintaining standing privileged accounts that are always available for use (and always available for abuse), JIT access grants elevated permissions only for the duration of a specific task.