authority-delegation-garden-patch

Principle of Least Access

Allen’s Principle of Least Access (2023) extends the least privilege lineage from system permissions into data. Where least privilege and least authority address what entities can do, least access addresses what entities can see. The shift is motivated by self-sovereign identity and verifiable credentials, where the primary concern is not unauthorized system access but unnecessary data exposure and the correlation opportunities it creates.

The Data Extension

Least privilege minimizes permissions. Least authority minimizes transitive authority chains. Least access minimizes data exposure — and specifically targets the correlation surface.

In credential systems, a verifier who receives a full date of birth when they only need to confirm “over 21” has acquired unnecessary access. That extra data is not just wasted — it becomes a correlation vector. Combined with data from other interactions, it can reconstruct a profile the holder never intended to share. Least access incorporates Miller’s ecosystem awareness (transitive authority thinking) but redirects it toward data flows rather than capability chains.

Allen frames this with a dignity orientation rather than asset protection. The military tradition of information security protects information as an organizational asset. Least access protects individuals “who are uniquely due respect and dignity.” The threat model shifts from adversaries breaching perimeters to systems routinely extracting more data than they need.

Architectural Coercion Resistance

Allen argues that a datastore implementing least access can refuse to grant improper data requests, creating architectural coercion resistance. If the system cannot produce data it does not hold, coercive demands are negated by design rather than by policy. This is a strong claim — coercion in practice operates through channels outside the data system (device confiscation, legal compulsion). But the architectural layer is real: what the system cannot produce, no order can extract.

Position in the Taxonomy

Least access completes the restrictive row of Allen’s 2x3 taxonomy: privilege (1975) → authority (2006) → access (2023). Its inside-out counterpart is Necessary Access, which inverts the interaction model from “limit what the verifier gets” to “declare what the system needs, so the holder can make an informed consent decision.”

Sources

Relations