{"id":78490,"date":"2024-05-26T15:29:14","date_gmt":"2024-05-26T07:29:14","guid":{"rendered":"https:\/\/version-2.com\/?p=78490"},"modified":"2024-06-14T12:36:25","modified_gmt":"2024-06-14T04:36:25","slug":"what-is-the-principle-of-least-privilege-polp-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/05\/what-is-the-principle-of-least-privilege-polp-2\/","title":{"rendered":"What is the Principle of Least Privilege (PoLP)?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"78490\" class=\"elementor elementor-78490\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"607\" \/><\/p><div><div class=\"my-3 PostContent_excerpt__wB2qU\"><p class=\"nord-text text-lead font-medium leading-normal text-black\">In cybersecurity, the principle of least privilege (PoLP) is a concept that states that a user should have the least amount of access privileges possible to carry out. PoLP aims to squash risks associated with unauthorized access and improve the security perimeter generally.<\/p><p class=\"nord-text text-lead font-medium leading-normal text-black\">Today, we\u2019re taking a deeper look at the principle of least privilege. We\u2019re showcasing why PoLP is important, how it relates to zero-knowledge principles and how it can help organizations to further improve their overall security posture.<\/p><\/div><div class=\"mb-12 mt-6 md:mt-12\"><p class=\"mb-6 text-base text-black font-medium\">Contents<!-- -->:<\/p><ul class=\"leading-loose List_list__BljM0 List_noStyle__kj8bR\"><li class=\"ListItem_item__ZgGQo list-item mt-4\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base font-medium\" href=\"#how-does-the-principle-of-least-privilege-work\" data-link=\"NordUIlink\">How does the principle of least privilege work? <\/a><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base font-medium\" href=\"#why-is-the-principle-of-least-privilege-important\" data-link=\"NordUIlink\">Why is the principle of least privilege important?<\/a><br \/><ul class=\"leading-loose mt-4 ml-8 List_list__BljM0 List_noStyle__kj8bR\"><li class=\"ListItem_item__ZgGQo list-item mt-4 TOC_nestedListItem__mOhUb\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base\" href=\"#zero-trust-vs-least-privilege\" data-link=\"NordUIlink\">Zero Trust vs Least Privilege<\/a><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4 TOC_nestedListItem__mOhUb\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base\" href=\"#what-is-privilege-creep\" data-link=\"NordUIlink\">What is Privilege Creep?<\/a><\/li><\/ul><\/li><li class=\"ListItem_item__ZgGQo list-item mt-4\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base font-medium\" href=\"#how-to-implement-the-least-privilege-principle-in-your-organization\" data-link=\"NordUIlink\">How to Implement the Least Privilege Principle in Your Organization<\/a><br \/><ul class=\"leading-loose mt-4 ml-8 List_list__BljM0 List_noStyle__kj8bR\"><li class=\"ListItem_item__ZgGQo list-item mt-4 TOC_nestedListItem__mOhUb\"><a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark text-base\" href=\"#how-can-nordpass-help\" data-link=\"NordUIlink\">How can NordPass help? <\/a><\/li><\/ul><\/li><\/ul><\/div><div class=\"PostContent_content__eM_tn text-black break-words\" data-content-type-blog=\"true\"><section class=\"my-3\"><div class=\"Article_wrapper__8_7eU\"><div class=\"richtext\"><h2 id=\"how-does-the-principle-of-least-privilege-work\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How does the principle of least privilege work?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Technically speaking, the principle of least privilege, which is deeply embedded in the <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-zero-trust-security\/\">Zero Trust security<\/a> philosophy, works by simply limiting a user\u2019s (employees) access rights to certain data, applications, resources, and systems \u2014 leaving the user with the least amount of privileges that are needed to do their job. However, before the least access principle can be applied in a business setting, it is critical to first assess user roles and responsibilities, in other words, to pinpoint which access rights and privileges are essential for which users. Once the analysis is complete and users are assigned their appropriate access rights, the next step is the continuous management of these permissions. After all, employees come and go, roles change, and so access rights have to be adjusted accordingly.<\/p><h2 id=\"why-is-the-principle-of-least-privilege-important\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Why is the principle of least privilege important?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Let\u2019s look at a hypothetical situation. Say an HR employee has access to the human resources management system to update employee records. But if they also have access rights to access the IT infrastructure, which are not essential for their HR-related tasks, the risk of a full-blown data breach increases significantly in the event their account is compromised.<\/p><p class=\"nord-text text-base leading-normal text-black\">The hypothetical above showcases the principle of least privilege benefits, which include:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Reduce the potential attack surface:<\/b> Limiting user access privileges means fewer opportunities for bad actors to exploit those privileges.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Minimize the impact of exploits: <\/b>Even if a hacker can gain unauthorized access to the user\u2019s account, the security principle of least privilege confines the possible damage.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Come closer to adhering to regulatory frameworks such as GDPR and HIPAA:<\/b> Regulatory frameworks such as GDPR and HIPAA require strict access controls. By applying PoLP and ensuring users have access only to the information and system essential for their tasks, an organization can get closer to being compliant with various regulations.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Improve security within the hybrid work environment: <\/b>In a hybrid work environment, where employees access systems remotely, maintaining strict access controls becomes even more important. Implementing the principle of least privilege ensures that the security risks associated with remote access are reduced significantly.<\/p><\/li><\/ul><h3 id=\"zero-trust-vs-least-privilege\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Zero Trust vs Least Privilege<\/h3><p class=\"nord-text text-base leading-normal text-black\">Zero Trust is a cybersecurity concept built on another simple idea: never trust, always verify. Unlike the traditional security frameworks, Zero Trust Security assumes that threats can come from within as well as outside the network.<\/p><p class=\"nord-text text-base leading-normal text-black\">At its core, Zero Trust embodies the principle of least privilege by enforcing strict access controls and permissions. Every access or connection request, regardless of origin, is treated as untrusted until verified otherwise. This stringent verification process is an extension of PoLP\u2019s main idea \u2014 to provide users with only the necessary access levels.<\/p><p class=\"nord-text text-base leading-normal text-black\">In practice, Zero Trust treats every access request as if it&#8217;s the first request coming from an untrusted network. Each request is always re-authenticated regardless of previous requests or connections. In this sense, you can think of Zero Trust as a dynamic framework while PoLP can be considered static because it provides users with specific access rights that remain the same unless adjusted.<\/p><p class=\"nord-text text-base leading-normal text-black\">To make the distinction between Zero Trust and PoLP clearer, let\u2019s imagine a high-end office building. In this case, Zero Trust would be the foundation of the building\u2019s security system, which requires employees, regardless of their position, to use an access card to enter the office building and other facilities. The principle of least privilege, in this scenario, could be likened to the specific programming of access cards based on the employee\u2019s role: for instance, providing the IT staff with access to server rooms, while not granting the same privileges to, say, the marketing team.<\/p><div id=\"Inner content blog banner - Business\"><section class=\"overflow-hidden relative\"><div class=\"rounded-3 bg-custom-msp-blue-dark pt-8 px-4 pb-6 md:px-6 md:py-6\"><div class=\"nord-row row justify-start items-center\"><div class=\"nord-col md:col-9 text-center md:text-left\"><p>\u00a0<\/p><\/div><\/div><\/div><\/section><\/div><h3 id=\"what-is-privilege-creep\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What is Privilege Creep?<\/h3><p class=\"nord-text text-base leading-normal text-black\">Privilege creep is a term that refers to a user that gradually accumulates more access rights than are required to execute their function. Privilege creeps most often come into being due to role changes that do not trigger an adjustment concerning access privileges. When thinking about organizational cybersecurity, privilege creeps pose a serious risk where unauthorized access to a single account could lead to an enterprise-wide data breach.<\/p><p class=\"nord-text text-base leading-normal text-black\">Here are best practices when it comes to the principle of least privilege, helping to prevent privilege creeps from materializing:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Implement role-based access controls:<\/b> Clearly define roles and associated permissions to make sure access rights are granted based on the necessities of the job.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Conduct regular access reviews:<\/b> Schedule periodic reviews of user privileges to identify and rectify any discrepancies or excessive access rights.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Enforce a Zero-Trust security approach:<\/b> Adopt a zero-trust policy where no user is trusted by default. Verify every access request, regardless of the user\u2019s position within the organization.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Make use of automated tools: <\/b>Leverage automation for managing access rights. Tools like Privileged Access Management (PAM) systems can help in monitoring and controlling access rights efficiently.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Promote security awareness:<\/b> Educate employees about the risks of privilege creep and the importance of adhering to cyber security protocols.<\/p><\/li><\/ul><p class=\"nord-text text-base leading-normal text-black\">By proactively managing user permissions and educating employees, you can significantly mitigate the risk of privilege creep and enhance your organization\u2019s overall security posture.<\/p><h2 id=\"how-to-implement-the-least-privilege-principle-in-your-organization\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How to Implement the Least Privilege Principle in Your Organization<\/h2><p class=\"nord-text text-base leading-normal text-black\">Adopting the principle of least privilege in your organization can be a lengthy process; however, the juice is well worth the squeeze. Once your organization operates under PoLP, the potential attack surface will shrink significantly. Here are a few best practices when it comes to the implementation of PoLP:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Define access requirements clearly:<\/b> Before adopting the principle of least privileges in your organization, you need to have a clear understanding of the data access needs of various roles within the organization.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Implement Role-based access control (RBAC):<\/b> Once you have a clear understanding of access requirements, setting up RBAC will be a lot easier. You\u2019ll need to create roles based on job functions and assign permissions to these roles rather than for individual users.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Utilize Just-In-Time (JIT) privilege access:<\/b> Enhance security by granting time-limited privileges on a need-to-use basis. Establishing JIT access privileges will restrict the window of opportunity for access to sensitive data, minimizing the risk of insider threats or external breaches that would exploit user access privileges.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Enforce Multi-factor authentication (MFA) and password policies: <\/b>Strengthen the authentication processes by establishing MFA as an additional layer of security next to company-wide password policies. MFA ensures that even if the password of a critical account is compromised, the attackers will not have a chance to access it as they will not have another authentication factor required.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Implement system monitoring: <\/b>Establish surveillance of system and user activities to quickly identify and respond to abnormal access patterns or potential security incidents.<\/p><\/li><\/ul><h3 id=\"how-can-nordpass-help\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How can NordPass help?<\/h3><p class=\"nord-text text-base leading-normal text-black\">These days, when access points seem to multiply as fast as potential security threats, adopting the principle of least privilege within a business setting should be a no-brainer. PoLP implementation can reduce, quite significantly, the organization\u2019s attack surface and generally improve overall cybersecurity. There\u2019s also the added benefit of coming closer to compliance with various regulatory frameworks such as HIPAA or GDPR.<\/p><p class=\"nord-text text-base leading-normal text-black\">While the adoption of PoLP can be challenging, there are tools that can make this a lot easier and <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/enterprise-password-manager\/\" data-link=\"NordUIlink\">NordPass Enterprise<\/a> is one of them. It\u2019s an enterprise-grade password manager that\u2019s built on the principle of the Zero-Knowledge architecture and is equipped with the XChaCha20 encryption algorithm.<\/p><p class=\"nord-text text-base leading-normal text-black\">But that\u2019s just the tip of the iceberg. NordPass&#8217;s integration with <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/single-sign-on\/\" data-link=\"NordUIlink\">Single Sign-On (SSO)<\/a> is a key asset in adopting PoLP. By allowing users to use a single set of credentials to access multiple resources, SSO simplifies authentication and enhances security. NordPass Enterprise is compatible with major identity providers such as Microsoft Azure AD, MS ADFS, and Okta. This centralized management system is effective in preventing unauthorized access and minimizing potential security breaches by assigning user access based on specific roles.<\/p><p class=\"nord-text text-base leading-normal text-black\">NordPass also helps organizations in managing user access effectively. It allows administrators to assign, revoke, or modify user access to login credentials, personal information, payment card data, and other sensitive data according to specific needs. This flexibility, powered by the <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/activity-log-feature-live\/\" data-link=\"NordUIlink\">Activity log<\/a> feature, is critical when adopting PoLP. Thanks to this functionality, you can easily adjust access rights in response to changes in roles or employment status.<\/p><p class=\"nord-text text-base leading-normal text-black\">Learn more about how NordPass Enterprise can benefit your organization\u2019s overall security strategy by visiting the official NordPass Enterprise website.<\/p><\/div><\/div><\/section><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In cybersecurity, the principle of least privilege (PoL [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1273,61],"tags":[974,1131,1272],"class_list":["post-78490","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1273","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is the Principle of Least Privilege (PoLP)? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/least-privilege\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the Principle of Least Privilege (PoLP)? - Version 2\" \/>\n<meta property=\"og:description\" content=\"In cybersecurity, the principle of least privilege (PoL [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/least-privilege\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-26T07:29:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-14T04:36:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/05\\\/what-is-the-principle-of-least-privilege-polp-2\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What is the Principle of Least Privilege (PoLP)?\",\"datePublished\":\"2024-05-26T07:29:14+00:00\",\"dateModified\":\"2024-06-14T04:36:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/05\\\/what-is-the-principle-of-least-privilege-polp-2\\\/\"},\"wordCount\":1532,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/05\\\/what-is-the-principle-of-least-privilege-polp-2\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/\",\"name\":\"What is the Principle of Least Privilege (PoLP)? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-05-26T07:29:14+00:00\",\"dateModified\":\"2024-06-14T04:36:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/least-privilege\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is the Principle of Least Privilege (PoLP)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is the Principle of Least Privilege (PoLP)? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/least-privilege\/","og_locale":"en_US","og_type":"article","og_title":"What is the Principle of Least Privilege (PoLP)? - Version 2","og_description":"In cybersecurity, the principle of least privilege (PoL [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/least-privilege\/","og_site_name":"Version 2","article_published_time":"2024-05-26T07:29:14+00:00","article_modified_time":"2024-06-14T04:36:25+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/least-privilege\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2024\/05\/what-is-the-principle-of-least-privilege-polp-2\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What is the Principle of Least Privilege (PoLP)?","datePublished":"2024-05-26T07:29:14+00:00","dateModified":"2024-06-14T04:36:25+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2024\/05\/what-is-the-principle-of-least-privilege-polp-2\/"},"wordCount":1532,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/least-privilege\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","keywords":["Nord Security","NordPass","2024"],"articleSection":["Nord Security","NordPass","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2024\/05\/what-is-the-principle-of-least-privilege-polp-2\/","url":"https:\/\/nordpass.com\/blog\/least-privilege\/","name":"What is the Principle of Least Privilege (PoLP)? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/least-privilege\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/least-privilege\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-05-26T07:29:14+00:00","dateModified":"2024-06-14T04:36:25+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/least-privilege\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/least-privilege\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/least-privilege\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/least-privilege\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What is the Principle of Least Privilege (PoLP)?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kpY","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=78490"}],"version-history":[{"count":11,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78490\/revisions"}],"predecessor-version":[{"id":79255,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78490\/revisions\/79255"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=78490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=78490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=78490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}