Processes cannot use resources they don't need for their application.
If their application gets compromised, the processes will prevent their misbehaviour from accessing forbidden resources.
Last updated 1 year ago