This talk describes what are the basic security functionalities under Unix needed to build privilege separation and how to use them to design more secure applications.