Principle of Least Privilege and Privilege Escalation for the PCA Exam

GCP Study Hub
Ben Makansi
March 27, 2026

The Principle of Least Privilege is one of the most testable governance concepts on the Professional Cloud Architect exam. The Google Cloud platform makes it easy to grant broad access, and that ease is exactly what creates risk. This article walks through the risks of over-privileged access, what the Principle of Least Privilege actually says, and the benefits you should be able to recall on exam day.

What over-privileged access looks like in practice

Imagine a developer who has privileged access to the DEV, SIT, and PROD environments. The intended workflow is to push code to DEV, wait for tests to pass, push to SIT, wait for additional tests to pass, and only then push to PROD. That works fine on a normal day.

One day the developer accidentally targets PROD instead of DEV. Because they have access to PROD, the push goes through. The code skips both test environments and lands directly in production. Tests never run, and PROD breaks. The error was a typo. The damage was caused by the access.

This is the first risk of over-privileged access. When users, applications, or service accounts have more permissions than they need, they can inadvertently or maliciously perform actions that compromise the security, integrity, or confidentiality of the system.

Blast radius when an account is compromised

Now consider a user who has been granted read and write access to BigQuery, Cloud SQL, Dataflow, Cloud Run, Cloud Storage, and App Engine. In reality, they only ever use BigQuery, Cloud SQL, and Dataflow. The other three services are leftover permissions that nobody bothered to clean up.

If an attacker compromises that account, they don't just get access to the three services the user actually touches. They get access to all six. The blast radius of the compromise is much larger than it needed to be, purely because the user had permissions they were never going to use.

The lesson is that unused permissions are not free. They sit on the account waiting to be exploited if the account is ever taken over.

Privilege escalation

There is a more dangerous version of this problem called privilege escalation. Imagine a user who has access to only a couple of services. On the surface that looks tight. But suppose one of those services is Cloud IAM itself.

If an attacker breaks into that account, they can use the existing Cloud IAM access to grant themselves access to anything else in the project or organization. A small foothold becomes total control. That is privilege escalation, and it is one of the worst outcomes of over-privileged access.

The implication for an architect is that IAM administration permissions need to be tightly held. Handing out roles like Project IAM Admin or Owner casually is how privilege escalation attacks become possible.

The Principle of Least Privilege

The mitigation is the Principle of Least Privilege. The way I phrase it: always allocate the minimum necessary permissions for someone, or a service account, to do what it needs. Depending on your tolerance for role maintenance, this usually involves either custom roles or predefined roles.

The idea is simple. Grant the exact permissions required and nothing more. If a service account needs to read data from BigQuery, it does not need permissions to modify or delete resources. If a user needs to run Cloud Composer jobs, they do not need permissions to manage the Composer environment itself. By minimizing what is granted, you reduce the chance of unauthorized actions and security breaches.

Custom roles give you the tightest fit because you specify the exact permissions. Predefined roles are coarser but require less ongoing maintenance as Google Cloud adds new permissions to existing roles. The right choice depends on how much role maintenance you can tolerate.

Benefits to remember for the exam

The Professional Cloud Architect exam expects you to know why the Principle of Least Privilege matters, not just what it says. There are four benefits worth memorizing.

First, it reduces the blast radius of compromised accounts. If an account is breached, the attacker only inherits the limited permissions that account had.

Second, it mitigates the risk of insider threats. When users only have the access they need, the opportunity to misuse other resources shrinks.

Third, it lowers the chances of accidents. Fewer permissions means fewer ways for a user or system to delete critical data or take destructive action by mistake.

Fourth, it simplifies compliance and auditing. When permissions are tightly scoped, the audit trail is cleaner and easier to defend during compliance reviews.

The exam will almost certainly test this principle in scenario form. Expect questions where one option grants Owner or a broad predefined role and another option grants a tighter predefined role or a custom role. The Principle of Least Privilege tells you which one is correct.

My Professional Cloud Architect course covers the Principle of Least Privilege and privilege escalation alongside the rest of the IAM and governance material.

arrow