1. National Institute of Standards and Technology (NIST). (2017). NIST Internal Report 8112: Attribute Based Access Control.
Reference: Section 2.2.1, "Limitations of the RBAC Model," Page 6.
Quote: "Another issue with RBAC is that of ‘privilege creep’ or ‘role explosion’ where users tend to accumulate roles over time as they move from one project to another within the organization." This directly defines privilege creep as the accumulation of access over time.
2. National Institute of Standards and Technology (NIST). (2017). Special Publication 800-179: Guide to Securing Apple macOS 10.12 for Enterprise Deployments.
Reference: Section 3.3.1, "Limit Privileges," Page 21.
Quote: "This helps prevent 'privilege creep,' where users accumulate privileges over time as their job descriptions and tasks change." This source confirms the term and its definition in the context of enterprise security principles.
3. Purdue University. (2012). Role-Based Access Control (RBAC) and Role Engineering. The Center for Education and Research in Information Assurance and Security (CERIAS).
Reference: Section "Role Engineering," Paragraph 2.
Content: The document discusses the challenges in Role-Based Access Control (RBAC), including the problem of "privilege creep," where users accumulate permissions over time, leading to a violation of the principle of least privilege. It highlights that regular review and attestation are necessary to combat this issue.