POLA = Principle of Least Authority.
In a capability based computing environment, a piece of code just naturally has authority to only those things its needs to do its job.
Extra design for security is not generally required.
By contrast Unix and other non capability based systems, protect computing objects, but only with coarse grained and static access rules. Extra effort is required to control this apparatus for particular security requirements of the application. Over permissive blunders in this effort are not likely to be caught in testing for most testing is of benign usage. These rules are enforced by a large, complex and monolithic set of code that is not user replaceable and these rules are not not well suited for defining new security functions.
These things are wrong with access lists and category permissions:
Applications have no domain within which they have the means to insure their own integrity. If the hardware is shared, they are at risk from other applications. The second order effect is that program builders may not aspire to truly reliable service since other apps provide a ready excuse for failure; and should they succeed in producing a perfect design and perfect code, they would seldom get credit, since their application would still be perceived as flaky as other apps transgress. It is a tragedy of the commons. In short, the incentives for solid code are badly weakened, and the possibility of solid applications is almost destroyed.