Answer:
It is where each system is designed so that it only has the permissions necessary to operate, nothing more.
Step-by-step explanation:
This is done for security concerns, which is the whole reason for cybersecurity.
4.5m questions
5.8m answers