A process that has privileges to circumvent the system security policy and has been tested and verified to operate only as intended.