The principle that a security architecture should be designed so that each entity must be granted the minimum system resources and authorizations that the entity needs to perform its function.
Australian Cyber Security Centre. (2023, November). Essential Eight explained. cyber.gov.au. https://www.cyber.gov.au/resources-business-and-government/essential-eight-maturity-model/essential-eight-explained