1. National Institute of Standards and Technology (NIST). (2020). Security and Privacy Controls for Information Systems and Organizations (NIST Special Publication 800-53
Revision 5). U.S. Department of Commerce. See control AC-6 Least Privilege
Section 2.1
which states
"The principle of least privilege is applied to the privileges assigned to individuals and to the processes acting on behalf of individuals."
2. Saltzer
J. H.
& Schroeder
M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE
63(9)
1278–1308. https://doi.org/10.1109/PROC.1975.9939. See Section I.A.4
"Principle of Least Privilege
" which defines it as a fundamental design principle for secure systems.
3. MIT OpenCourseWare. (2014). 6.858 Computer Systems Security
Fall 2014. Massachusetts Institute of Technology. See Lecture 2: "Control Hijacking
" Section on "Security Principles
" which identifies "Least Privilege" as a core strategy to limit the capabilities of an attacker.