Download PDFOpen PDF in browserA Secure, Manifest-Based Framework for Delegated Privilege PromotionEasyChair Preprint 160187 pages•Date: May 1, 2026AbstractLarge-scale enterprise software systems commonly run as unprivileged service accounts to enforce least privilege, yet still depend on a small set of privileged components—such as executables with elevated ownership, permissions, or capabilities—for narrowly scoped operations. This creates a persistent security and operational conflict during maintenance. Automated patching tools running without elevated privileges cannot safely update privileged components without either executing the entire patch with full administrative rights or requiring manual administrator intervention. We present a secure, manifest-based infrastructure for delegated promotion of privileged software components, deployed in production as part of a large-scale enterprise database system serving both cloud and on-premises installations. The design centers on a minimal privileged mediator that validates cryptographically protected metadata and allows an unprivileged process to promote only vendor-approved files. The system explicitly mitigates Time-of-Check-to-Time-of-Use (TOCTOU) attacks using file-descriptor–bound validation and promotion, supports offline key rotation and revocation, and enables zero-downtime self-update via atomic replacement. Keyphrases: Secure software updates, Software Supply Chain Security, TOCTOU Mitigation, least privilege, privilege separation
|

