Least privilege is key to good cybersecurity.

Author: Rob Black