04/30/2025 | News release | Archived content
Traditional approaches to cloud access rely on static, permanent permissions that are often overprivileged. Learn how just-in-time access completely changes the game.
As cloud adoption accelerates, organizations are grappling with a fundamental security challenge: How do you grant people the access they need - such as on-call developers needing to debug problems, site reliability engineers (SREs) needing to repair issues with infrastructure, or DevOps engineers needing to provision or architect resources - without opening the door to overprivileged accounts and breach risks?
Traditional approaches rely heavily on static, permanent permissions. Human users often receive more access than necessary simply because it's hard to predict specifically which permissions they'll need. These permissions rarely get revoked, leaving organizations exposed.
This is where Tenable Cloud Security changes the game. As a powerful cloud-native application protection platform (CNAPP) solution, Tenable Cloud Security doesn't just identify access-related risk - it actively helps you solve it.
In this blog, we explore how you can address the excessive permissions challenge using the just-in-time (JIT) access capability in Tenable Cloud Security.
JIT access enables organizations to dramatically reduce their exposure from compromised identities by providing a substitute for permanent access. Instead of being granted standing access, which may be exploited if and when an identity is compromised, users are provided with the eligibility to request temporary access based on a defined business need.
Here's how it works:
JIT access dramatically reduces the attack surface tied to human identities, ensuring that elevated privileges are used only when necessary and only for as long as needed.
Fig. 1: Creating an eligibility to request just-in-time access to a cloud environment instead of standing permissionsTenable understands that even the best security solution won't succeed without adoption and cooperation from its target audience. That's why JIT access in Tenable Cloud Security is designed with a seamless user experience in mind.
Access requests and approvals can be managed directly within messaging platforms, such as Slack or Microsoft Teams, which meet your teams where they are. Users and approvers stay in their native workflows while benefiting from a secure, auditable process.
Fig. 2: Filling out the access request form directly from SlackFig. 3, below, shows how the request, approval and access link are all grouped together on the same thread for a simplified, clean and simple experience.
Fig. 3: The request generated, approval granted and connection link to the cloud environment all in one thread in SlackAnd speaking of audits, Tenable Cloud Security doesn't just log access. It provides a clean, intuitive activity log interface for every session. Unlike the often fragmented logs from cloud providers, these are tailored for easy auditing, compliance review or incident response. So, if you want to apply more scrutiny and review what happened during sessions, or if you are compelled to do so in the event of an incident, it's extremely easy to open up the session log and review it.
Fig. 4: The intuitive activity log for events generated in the cloud environment during the JIT access session; easy to review and filter to perform scrutiny / investigate incidentsBased on customer feedback, Tenable extended JIT functionality to cover identity provider (IdP) group memberships. This is a big deal.
In many organizations, access to software as a service (SaaS) applications (such as secrets managers, observability tools, ticketing platforms, etc.) is governed through group memberships in identity providers like Okta or Microsoft Entra ID. With Tenable Cloud Security, you can now provide temporary group membership through the same JIT access model - effectively controlling and auditing access to SaaS apps with the same granularity and automation as cloud resources.
This means Tenable Cloud Security customers now have unified control over cloud infrastructure and SaaS access through a single solution.
Perhaps the most exciting news: JIT access no longer requires a separate purchase. As of today, it's included with Tenable Cloud Security.
Billing is simple. Just as Tenable Cloud Security charges based on the number of cloud resources, JIT access treats each eligible user as a billable resource. If you're a Tenable Cloud Security customer, you already have access to the full power of JIT - no separate contract, no additional platform. For example, if you have a team of five developers eligible to request elevated permissions, these would count as an additional five billable resources, no matter how many eligibilities they have.
Tenable Cloud Security doesn't just identify problems. It solves them:
The best security tools blend into your workflow and quietly eliminate risk before it becomes a problem.
Tenable Cloud Security's JIT access capability is more than a feature - it's a philosophy shift. It reduces identity-based risk without sacrificing agility. It simplifies compliance without adding overhead. And it empowers teams to move fast, stay secure and maintain clarity over who has access to what, when and why.
If you're already a Tenable Cloud Security customer, there's never been a better time to start using JIT access. And if you're evaluating CNAPPs, ask yourself: do they help you fix the problem, or just show you where it is?
With Tenable Cloud Security, the answer is clear.
Visit https://www.tenable.com/announcements/provide-access-just-in-timeto learn more about how JIT access capabilities in Tenable Cloud Security can help you reduce your exposures.