Under active development Content is continuously updated and improved

KSI-IAM-JITAuthorizing Just-in-Time

LOW
MODERATE

Formerly KSI-IAM-04

>Control Description

Use a least-privileged, role and attribute-based, and just-in-time security authorization model for all user and non-user accounts and services.

>NIST 800-53 Controls

>Trust Center Components
3

Ways to express your implementation of this indicator — approaches vary by organization size, complexity, and data sensitivity.

From the field: Mature implementations express JIT access through measurable metrics — average approval time, access duration, and auto-revocation rates tracked as dashboard indicators. PAM platforms enforce bounded duration and auto-expiration, with every JIT session logged and revocation verified automatically.

Just-in-Time Access Documentation

Product Security Features

How JIT access provisioning works — automatic expiration, approval workflows, and bounded duration as product features

Temporary Access Metrics

Dashboards

Dashboard expressing JIT access posture — request volumes, approval times, and expiration compliance as live indicators

Automated: PAM APIs verify JIT access requests have bounded duration and auto-expire

JIT Access Workflow

Processes & Procedures

How JIT access is requested, approved, and automatically revoked — the workflow behind the metrics

>Programmatic Queries

Beta
Cloud

CLI Commands

List roles with session duration limits
aws iam list-roles --query "Roles[].{Role:RoleName,MaxSession:MaxSessionDuration}" --output table
Check role trust policies for time-bounded conditions
aws iam get-role --role-name <role-name> --query "Role.AssumeRolePolicyDocument" --output json

>20x Assessment Focus Areas

Aligned with FedRAMP 20x Phase Two assessment methodology

Completeness & Coverage:

  • Does just-in-time access apply to all privileged operations — production infrastructure, databases, security tooling, CI/CD pipelines, and cloud management consoles?
  • Are there any standing privileged accounts (always-on admin access) that have not been migrated to JIT, and how are those exceptions justified and tracked?
  • How do you ensure JIT applies to non-user accounts and services, not just human operators?
  • Does your RBAC/ABAC model cover all resources in the authorization boundary, or are there systems where access control is managed outside the central model?

Automation & Validation:

  • What automated system grants temporary elevated access, and how do you ensure access is automatically revoked when the time window or task expires?
  • What happens if the JIT system itself goes down — can privileged access still be obtained, and what compensating controls apply?
  • How do you detect if someone circumvents JIT by creating persistent credentials or assuming a role outside the JIT workflow?
  • What automated monitoring detects JIT sessions that run longer than approved or perform actions outside the approved scope?

Inventory & Integration:

  • What privileged access management (PAM) or JIT platform is in use, and how does it integrate with your identity provider and cloud IAM?
  • How do JIT access requests and approvals integrate with your ticketing system to create an auditable justification trail?
  • What tools enforce RBAC and ABAC policies at the cloud provider level (IAM Conditions, Azure PIM, GCP IAM Conditions)?
  • How does your JIT system handle multi-cloud or hybrid environments where privileges span different IAM systems?

Continuous Evidence & Schedules:

  • What percentage of privileged access events use JIT versus standing access, and how is this metric trending over time?
  • Is JIT session data (requestor, approver, duration, actions performed) available via API or structured audit logs?
  • How do you demonstrate that JIT access durations are appropriate — not too long (reducing security) or too short (causing operational friction)?
  • What evidence shows all JIT sessions over the past 90 days had proper justification, approval, and automatic revocation?

Update History

2026-02-04Removed italics and changed the ID as part of new standardization in v0.9.0-beta; no material changes.

Ask AI

Configure your API key to use AI features.