The principle of least privileges only limits the damage but does not prevent the misuse of access privileges associated with a module if the module were to be compromised.For instance,if a system code is given the access privileges to deal with the task of managing tertiary storage,a security loophole in the code would not cause any damage to other parts of the system,but it could still cause protection failures in accessing the tertiary storage.
The principle of least privileges only limits the damage but does not prevent the misuse of access privileges associated with a module if the module were to be compromised.For instance,if a system code is given the access privileges to deal with the task of managing tertiary storage,a security loophole in the code would not cause any damage to other parts of the system,but it could still cause protection failures in accessing the tertiary storage.