PAM Training Series — Module JIT
Identity Security · Access Governance · Zero Trust
Just-in-Time Access

The End of
Standing Privilege

How Just-in-Time access eliminates the persistent attack surface created by always-on admin rights — and why it is the cornerstone of modern identity security.

01
The Standing Privilege Problem

Before understanding JIT, we must understand the vulnerability it addresses: the chronic, unnecessary over-assignment of persistent admin rights.

"Every minute an account holds privilege it doesn't need is a minute an attacker can use it."

Core Principle — Principle of Least Privilege
⚠️
The Standing Privilege Problem: Most organizations grant privileged access for administrative tasks — then never revoke it. Admins accumulate permissions that persist 24/7/365, even when not actively needed. This "standing privilege" creates a massive, permanent attack surface.
⛔ Standing Privilege Model
Admin rights granted once, never expire
Credentials valid 24/7, even when not in use
No oversight of when or why access is used
A compromised account = persistent access
Privilege creep as access accumulates over time
Single static password as the only barrier
VS
✅ Just-in-Time Model
Access granted only when requested and approved
Time-boxed sessions — auto-expire after task
Every request logged with business justification
Compromise window reduced to session duration
Clean-slate permissions; no accumulation
MFA + approval workflow before elevation
Risk Analysis

Attack Surface Comparison

The bars below compare exposure levels between standing privilege and JIT access. Values represent relative risk exposure (higher = more exposed).

Credential Theft Impact
92%
↳ With JIT
18%
Lateral Movement Risk
85%
↳ With JIT
22%
Insider Threat Window
100%
↳ With JIT
12%
Real-World Impact

The Dwell Time Problem

The average attacker dwell time — how long they operate undetected inside a network — is over 200 days. With standing privilege, a single compromised admin credential provides persistent, unrestricted access for the entire dwell period. JIT limits this to the session window.

Compliance Driver

Regulatory Requirements

Frameworks including PCI DSS HIPAA SOX NIST 800-53 and ISO 27001 explicitly require time-limited access, least privilege enforcement, and audit trails — all core JIT properties.

Section 1 of 5
02
Just-in-Time Access Explained

A deep dive into how JIT works, its core components, and the three primary delivery models used in enterprise environments.

⏱️
Definition: Just-in-Time (JIT) access is a PAM control that provisions elevated permissions only when explicitly requested, for a specific duration, to perform a defined task — and automatically revokes them when the window expires or the task is complete.
Who

Identity Verification

The requestor is authenticated (MFA), their identity context is checked, and their role eligibility for the requested privilege is validated before approval.

What & Why

Scoped Access + Justification

Access is scoped to the minimum necessary for the specific task. A business justification or ticket number is required, creating an accountability record.

When

Time-Bounded Window

A maximum session duration is set (e.g. 1 hour, 4 hours). Access is automatically revoked when the window expires — no human action required.

JIT Workflow

The Access Request Lifecycle

Step 01 — Request
User Submits Access Request
The user submits a request through the PAM portal or self-service interface, specifying the target system, required permission level, expected duration, and a business justification or ticket ID.
Step 02 — Policy Evaluation
Automated Risk & Policy Check
The PAM system evaluates the request against predefined policies: Is the user eligible? Is the requested scope appropriate? Is the risk level acceptable based on user behavior history, time-of-day, and device posture?
Step 03 — Approval
Human or Automated Approval
Low-risk requests may be auto-approved. High-sensitivity requests route to a manager or security team for human approval. Approvers see full context: requestor identity, target, scope, and justification.
Step 04 — Provisioning
Privilege Elevation & Session Start
Upon approval, the PAM system dynamically adds the user to the privileged group, issues a time-limited credential, or grants a scoped role. The session clock starts. All activity is logged and recorded.
Step 05 — Expiry
Automatic Revocation
When the time window closes, the privilege is automatically revoked — the user is removed from the group, the credential expires, or the role is unassigned. No residual access remains.
Step 06 — Audit
Full Audit Trail & Review
Every step — request, decision, session activity, commands executed, and expiry — is immutably logged. Anomaly detection flags unusual behavior. Compliance reports are generated automatically.
Three JIT Models

Delivery Approaches

Model A

Ephemeral Accounts

A brand-new privileged account is created for each session and destroyed afterwards. No standing privileged account exists at all — not even a dormant one.

Model B

Temporary Group Membership

The user's existing account is temporarily added to a privileged group (e.g. Domain Admins) for the approved window, then removed. This integrates seamlessly with Active Directory environments.

Model C

Brokered / Proxied Sessions

The PAM vault acts as a broker: it injects credentials into the session without the user ever seeing them. Access is via a gateway — revocable mid-session if behavior is suspicious.

JIT Access Architecture — Brokered Session Model
👤
User
requestor
📋
Request Portal
justification
⚖️
Policy Engine
risk + rules
Approval
human or auto
🔐
PAM Vault
credential broker
🖥️
Target System
time-limited
📊
Audit Log
immutable

The user never sees the privileged credential — the PAM vault injects it into the brokered session. The session is terminated automatically at expiry or can be force-terminated if anomalous behavior is detected.

03
JIT Access Simulator

Walk through a realistic JIT access request — from submission through approval, session use, and automatic expiry.

🎮
Interactive Exercise: Complete a JIT access request as an engineer needing temporary database admin access. Experience the full workflow: request → policy check → approval → session → auto-expiry.
PAM Console — JIT Access Request ● CONNECTED
Complete the access request form. All fields are required and will be logged.
Request submitted. Running policy evaluation and routing for approval...
🤖
Automated Policy Check — Risk score, eligibility, device posture
Pending
🔍
UEBA Behavioral Baseline — Comparing to historical access patterns
Pending
👤
Manager Approval — Sarah Park (Engineering Lead)
Pending
🔑
Credential Provisioning — PAM vault issuing time-limited credential
Pending
Waiting for automated checks to complete...
✓ Access Approved — Privileged session active on prod-db-01.internal
Session Expires In
60:00
DBA access · prod-db-01.internal · INC-4821
[09:14:28]SESSION START — DBA role provisioned, credential injected
[09:14:28]Connection established: prod-db-01.internal:5432
⏱ Session Expired — Privilege Automatically Revoked at 10:14:28
j.chen has been removed from db_admin group. Credential invalidated. Full session log archived.
Post-session audit record generated:
⛔ Access Request DENIED
Policy violation detected.
The request has been logged and the security team notified. If this access is genuinely required, escalate via your security team with additional business justification.
04
Implementation Guide

Practical guidance for rolling out JIT access in your environment — from quick wins to mature, risk-based automation.

Readiness Checklist

Pre-Implementation Controls

Complete Privileged Account Inventory
Enumerate all admin, service, and shared accounts across AD, cloud, and on-prem before JIT rollout
Define Access Tiers & Approval Policies
Establish which access levels require auto-approval vs. manager vs. CISO approval based on risk classification
Deploy PAM Vault / Session Broker
PAM platform (e.g. CyberArk, Delinea, BeyondTrust, Sailpoint) configured as the credential broker
Enroll All Privileged Users in MFA
JIT requests must require strong authentication — phishing-resistant MFA (FIDO2/passkeys) preferred
SIEM Integration for Session Audit Logs
All JIT session data (request, approval, activity, expiry) must feed into the SIEM for correlation and alerting
Define Maximum Session Durations by Risk Tier
E.g. Production DB: max 2h · Domain Admin: max 1h · Dev environments: max 8h · Emergency access: 4h with recording
Train Administrators on JIT Request Process
Ensure all privileged users understand the new workflow before standing access is revoked
Cloud Platforms

Cloud-Native JIT Options

AWS IAM Identity Center provides temporary elevated role sessions. Use Service Control Policies to prevent long-lived admin roles from being assigned permanently.

Azure Privileged Identity Management (PIM) is Microsoft's native JIT solution — activates eligible role assignments on demand with MFA and approval flows.

GCP Privileged Access Manager (PAM) grants temporary, time-bound IAM role bindings with full audit logging via Cloud Audit Logs.

Pitfalls to Avoid

Common JIT Mistakes

Overly generous session windows
Setting 24-hour sessions defeats the purpose. Keep max durations tight and risk-appropriate.
Auto-approving high-risk requests
Production DB, domain controllers, and cloud management planes require human approval, always.
Leaving "break-glass" accounts unmonitored
Emergency accounts must trigger immediate alerts and require session recording — not treated as exempt from PAM.
JIT without session recording
Time-limiting access without recording what happened during the session loses half the audit value.
Maturity Roadmap

JIT Maturity Levels

Level 1 — Foundational

Manual JIT

Privileged accounts are dormant by default. Admins request access via ticketing system, ops team manually enables and then disables. Slow but better than standing privilege.

Level 2 — Managed

PAM-Driven JIT

Formal PAM platform manages requests, approvals, credential injection, and session recording. Automated time-based expiry. Integrated with SIEM. Coverage for critical systems.

Level 3 — Optimised

Risk-Adaptive JIT

AI/ML risk scoring dynamically adjusts session duration, required approvers, and access scope based on real-time behavioral analytics, threat intelligence, and device posture.

05
Knowledge Assessment

Seven questions covering JIT concepts, implementation, and real-world application. Immediate feedback on every answer.