Least Privilege
Specification
Employ the least privilege principle when implementing information system access.
Threat coverage
Architectural relevance
Lifecycle
Data storage, Resource provisioning, Team and expertise
Design, Supply Chain, Guardrails
Evaluation, Validation/Red Teaming, Re-evaluation
AI Services supply chain, Orchestration, AI applications
Operations, Maintenance
Archiving, Data deletion, Model disposal
Ownership / SSRM
PI
Shared across the supply chain
Shared control ownership refers to responsibilities and activities related to LLM security that are distributed across multiple stakeholders within the AI supply chain, including the Cloud Service Provider (CSP), Model Provider (MP), Orchestrated Service Provider (OSP), Application Provider (AP), and Customer (AIC). These controls require coordinated actions, communication, and governance across all involved parties to ensure their effectiveness.
Model
Shared Cloud Service Provider-Model Provider (Shared CSP-MP)
The CSP and MP are jointly responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies in the context of the services or products they develop and offer.
Orchestrated
Shared Model Provider-Orchestrated Service Provider (Shared MP-OSP)
The MP and OSP are jointly responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies in the context of the services or products they develop and offer.
Application
Shared Orchestrated Service Provider-Application Provider (Shared OSP-AP)
The OSP and AP are jointly responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies in the context of the services or products they develop and offer.
Implementation guidelines
Auditing guidelines
1. Verify CSP’s IAM policies restrict access based on least privilege principles. 2. Assess whether shared responsibilities (e.g., managed services) still enforce minimal access for tenants. 3. Check for continuous access reviews and revocations by CSP across platform layers. 4. Confirm that elevated privileges are temporary and tightly monitored. From CCM: 1. Examine the policy to determine the least privilege required for each role or user. 2. Evaluate the effectiveness of the implementation and review of policy.
Standards mappings
42001 B.3.2 - AI roles and responsibilities 27001 A.5.15 - Access control 27001 A.5.18 - Access rights 27001 A.8.2 - Privileged access rights
Addendum
N/A
Article 9 Article 10 Article 15
Addendum
Mandate the use of the least privilege principle, and require ongoing review, access right minimization, or role-based enforcement.
No Mapping
Addendum
No explicit reference to the employment of the least privilege principle when implementing information system access is made in the NIST AI 600-1 standard.
C4 DM-01 C4 DM-02 C5 IDM-02 C5 OIS-02
Addendum
N/A
AI-CAIQ questions (1)
Are least privilege principles employed when implementing information system access?