Why Just-in-Time (JIT) Privileged Access is the Next Big Step in Risk Reduction & How to Implement It

Originally aired on Tuesday, March 17

Sign Up:

(*) denotes required form field(s)

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.



A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation. Today, powerful accounts with always-on (24x7) privileged access proliferate across enterprises. The privileges of these accounts are always in an active mode—for both legitimate use and misuse. Just in Time (JIT) Administration is an approach in which organizations dynamically assign privileges to accounts and assets to ensure identities only have the appropriate privileges when necessary, and for the least time necessary. With JIT PAM, your admin privileges are no longer always ripe for abuse, so the threat window is drastically condensed. For example, a typical always-on privileged account may be “privilege-active” 168 hours a week, versus just a couple dozen minutes using a JIT approach. Multiplying this effect across all your privileged accounts will have a truly massive impact on risk-reduction. Adopting JIT as part of your PAM approach means you can implement a true least-privilege model across your enterprise.

Attend this session to gain a firm understanding of how to:
  • Significantly condense your organization’s threat surface by shifting from an always-on privileged access model to a JIT approach
  • Identify use cases where JIT PAM is an absolutely necessity
  • Choose and implement JIT PAM triggers, methodologies, and workflows that will immediately help you to drive down risk enterprise-wide


Kimberly Underwood
Senior Editor
View Biography
Morey Haber
Chief Technology Officer, Chief Information Security Officer
View Biography