Security Principles: Least Privilege, Defense in Depth, Secure by Design, and Zero Trust

Key Takeaways

  • Least privilege grants only the access required for the task, for the required time, under the required conditions.
  • Defense in depth layers controls so one failure does not expose the entire environment.
  • Secure by design builds security requirements into architecture and development instead of adding them after deployment.
  • Zero trust removes implicit trust and continuously evaluates identity, device, context, and session risk.
  • Security+ scenarios often combine these principles with business constraints such as usability, downtime, and auditability.
Last updated: April 2026

Security Principles in Practice

Security principles guide control selection when answer choices all sound reasonable. They help you decide which option reduces risk without creating unnecessary access, single points of failure, or unverified trust.

PrinciplePractical meaningScenario clue
Least privilegeGrant only required access"Excess permissions", "temporary access", "admin rights"
Defense in depthUse layered controls"If one control fails", "multiple safeguards"
Secure by designBuild security in from the start"New application", "architecture review", "requirements"
Zero trustVerify explicitly and continuously"No implicit trust", "device posture", "context-aware access"
Separation of dutiesSplit sensitive tasks across roles"Same person requests and approves"
Fail secureDefault to a protected state when failure occurs"If system fails, what should happen?"

Least Privilege Scenario

A developer needs to troubleshoot a production application for one weekend.

Weak answerBetter answer
Add the developer to Domain AdminsGrant scoped production read or break-glass access for the approved time
Share an administrator passwordUse named account access with MFA and logging
Leave access in place for convenienceSet expiration and review after the work is complete

Least privilege is about scope, time, and accountability.

Defense in Depth Scenario

A public web application handles customer profile data. A layered design might include:

LayerExample control
EdgeWAF, DDoS protection, TLS
ApplicationInput validation, secure session management, code review
IdentityMFA for admins, RBAC, privileged access management
NetworkSegmentation between web, app, and database tiers
DataEncryption at rest, key management, database permissions
MonitoringCentralized logs, alerts, file integrity monitoring
RecoveryTested backups and documented restoration steps

If an attacker bypasses the WAF, segmentation and database permissions still limit impact.

Secure by Design Scenario

A team is building a new customer portal. Secure by design means security requirements are part of the project before launch.

Design questionStrong requirement
Who can access sensitive records?RBAC with least privilege and periodic access review
How is sensitive data protected?Encryption in transit and at rest with managed keys
How are defects found?Threat modeling, code review, dependency scanning, testing
What happens during failure?Fail securely and log meaningful security events
How is evidence retained?Centralized logs with retention aligned to policy

Adding a WAF after launch can help, but it does not replace secure input handling, authentication, authorization, and logging in the design.

Zero Trust at Exam Speed

Zero trust does not mean "block everything forever." It means do not trust a request merely because it came from an internal network.

Zero trust actionWhat it verifies
Strong authenticationUser identity
Device posture checkEndpoint health and compliance
Context-aware policyLocation, risk, time, behavior
Least-privilege authorizationExact allowed action
Continuous monitoringSession changes and anomalies

Common Traps

TrapBetter exam reasoning
"Internal network means trusted"Zero trust requires explicit verification
"One strong control is enough"Defense in depth expects layered failure resistance
"Admin rights are faster"Least privilege favors scoped access, even during urgent work
"Security can be added later"Secure by design starts at requirements and architecture
"Fail open is user friendly"For sensitive systems, fail secure is often preferred
Test Your Knowledge

A contractor needs access to one project repository for 14 days. Which option best applies least privilege?

A
B
C
D
Test Your Knowledge

Which statement best describes zero trust?

A
B
C
D
Test Your KnowledgeMulti-Select

Which examples show defense in depth? Select all that apply.

Select all that apply

Using WAF rules, input validation, segmentation, database permissions, logging, and backups for a web application
Relying only on a strong perimeter firewall for all security needs
Combining MFA, privileged access management, audit logs, and access reviews for administrator accounts
Giving every user local admin rights so support tickets are easier