Utilizing a least privilege account for MySQL to execute as may reduce the impact of a MySQL-born vulnerability. A restricted account will be unable to access resources unrelated to MySQL, such as operating system configurations.
Solution
Create a user which is only used for running MySQL and directly related processes. This user must not have administrative rights to the system.