Programs must comply with the principle of least privilege not only by providing privileged blocks with the minimum permissions required for correct operation, but also by ensuring that privileged blocks contain only those operations that require the increased privileges. Superfluous code contained within a privileged block necessarily operates with the privileges of that block; this increases the potential attack surface exposed to an adversaryattacker. Consequently, privileged blocks are forbidden to contain superfluous code.
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d804df46e11997c9-96fb9df9-44094e38-8ca18b27-6e786c7a43021f1cc307c38d"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE 272 | http://cwe.mitre.org/data/definitions/272.html] "Least Privilege Violation" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d0c51ff949b0d7a1-9f2a0f16-46a14a18-ac598bb6-a87b973477140e350ca6d2d9"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | Class | ]]></ac:plain-text-body></ac:structured-macro> |
...