Shift Left Is Dead for Cloud PAM
嗯,用户让我帮忙总结这篇文章的内容,控制在100个字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解作者的主要观点。 文章的标题是“Why I Stopped JIT’ing Users and Started JIT’ing Permissions”,作者是Cole Horsman,Sonrai Security的Field CTO。他讲述了自己在云身份管理方面的经历,从“shift left”到JIT(Just-in-Time)的不同尝试。 一开始,他尝试在开发阶段就进行安全控制,但发现这种方法并不奏效,因为开发者无法准确预测未来的权限需求。接着他转向JIT访问模式,但传统的方法依赖于用户账户或共享权限,导致权限过期和管理困难。 后来他发现真正有效的应该是对权限进行JIT管理,而不是用户账户。通过Sonrai Security的解决方案,直接在云权限层进行控制,确保权限只在需要时生效,并自动撤销。这种方法解决了传统方法中的问题,让团队更愿意遵守安全措施。 总结一下,文章的核心是指出传统的云PAM方法存在缺陷,并提出了一种新的基于权限的JIT方法来解决这些问题。这种方法不仅提高了安全性,还减少了管理负担和摩擦。 现在我要把这些要点浓缩到100字以内。首先提到传统方法的问题:shift left和JIT用户账户都失败了。然后指出正确的做法是JIT权限,并提到Sonrai的解决方案如何实现这一点。最后强调这种方法带来的好处:减少摩擦、提高安全性和治理能力。 所以最终的总结应该是:传统云PAM方法(如shift left和JIT用户账户)未能有效管理云身份风险。正确的做法是实时授予和撤销权限,并通过原生云控制平面进行集中治理。这种方法减少了摩擦、提升了安全性,并使团队更愿意遵守安全措施。 </think> 传统云PAM方法(如shift left和JIT用户账户)未能有效管理云身份风险。正确的做法是实时授予和撤销权限,并通过原生云控制平面进行集中治理。这种方法减少了摩擦、提升了安全性,并使团队更愿意遵守安全措施。 2026-2-2 12:5:36 Author: securityboulevard.com(查看原文) 阅读量:0 收藏

Why I Stopped JIT’ing Users and Started JIT’ing Permissions

By Cole Horsman
Field CTO, Sonrai Security

I first tried to “shift left” cloud identity in early 2020.

We were building a greenfield AWS environment with a strong cloud team and leadership support to do things properly. The idea was familiar: push security decisions earlier, give developers autonomy, and avoid becoming the bottleneck later.

We accepted early that perfect least privilege was unrealistic. The goal was not precision. The goal was to reduce risk without slowing teams down.

In practice, shift left for identity turned into IaC scanning, service control policies, and cleanup controls meant to catch whatever slipped through.

The failure was consistent.

Trying to anticipate permissions ahead of time did not work. After two or three rounds of back-and-forth, policies almost always ended up with a wildcard. Developers were not careless. They were being asked to predict access needs months in advance while still shipping.

Once access worked, it stayed. The people deploying permissions were not accountable for their long-term risk. No one came back later to clean it up. Fixing excess access required months of negotiation.

And when access actually mattered, during incidents or production issues, the permission that was needed was usually missing. AWS permission sets like “Developer” or “DBA” rarely fit real situations. IAM became the bottleneck, not the guardrail.

Shift left filtered out obvious mistakes. It did not solve the identity problem.

JIT Sounded Right, But Failed Anyway

Just-in-time access felt like the logical next step. Grant access when needed. Remove it afterward.

This is where legacy PAM broke down.

We tried to treat everything as code. That never held. Environments drifted constantly. Months later, a stack update would break production because someone had manually changed a security group outside the pipeline.

We built a shared account checkout workflow spanning Active Directory, a secrets manager, Entra ID, AWS Identity Center, and permission sets. It looked clean on a diagram. It was painful to operate.

Shared accounts forced MFA exceptions that were difficult to defend. Custom integrations took months. And once it finally worked, access did not always expire.

That is not just-in-time access. That is standing privilege with extra steps.

Why Building It Ourselves Didn’t Scale

When vendors failed, I tried to build it myself.

Automation made JIT possible, technically. Operationally, it fell apart.

Ownership was unclear. IAM teams owned identity providers, not automation platforms. Failures bounced between teams. Group-based access still depended on directory sync timing. Audit trails were scattered across systems.

The integrations were fragile. One API change or token issue and the workflow failed at exactly the wrong moment.

Homegrown JIT worked as a proof of concept. It did not survive enterprise pressure.

At that point, it was clear the problem was not execution. It was the model.

Where JIT Actually Fails in the Cloud

Traditional JIT approaches break down because they operate at the wrong layer.

In practice, cloud JIT fails when it relies on:

  • Standing permissions behind role switching or group membership
  • Directory sync timing as a control
  • Ticket queues that turn access into a waiting problem
  • Shared or break-glass accounts that quietly persist
  • Workflows that grant access without enforced expiration

None of these remove standing privilege. They just move it around.

Why Legacy PAM Doesn’t Work for Cloud

Shift left failed because it pushed IAM decisions to developers who should not own them.

Legacy PAM failed because it was built for static servers and a small number of human admins. It understands vaults and sessions. It does not understand cloud identity.

AWS identity is built on policies, permissions, roles, resource boundaries, services, and tags. Legacy PAM was never designed to:

  • Monitor API-level activity across thousands of cloud identities
  • Detect privilege escalation hidden in IAM role chaining
  • Enforce policy-based restrictions without breaking production
  • Govern machine identities that outnumber humans by orders of magnitude

Legacy PAM JITs users. Cloud environments require permissions on demand.

When attackers gain valid credentials with excessive permissions, legacy PAM records the activity. It does not prevent it.

The Model That Finally Worked

After three years of trying to make JIT work, I was close to accepting that least privilege would always be more aspirational than real.

Then I saw Sonrai Security talking about JIT with ChatOps.

What stood out was not a feature. It was what disappeared.

  • No vaults
  • No shared accounts
  • No directory sync dependencies
  • No credential sharing
  • No MFA exceptions to justify
  • Access in seconds, not hours

Everything was built on native cloud constructs like tags, customer-managed IAM policies, and service control policies.

That change mattered. Developers stopped routing around access controls because access was no longer the slowest part of the workflow.

This approach is enforced through Sonrai’s Cloud Permissions Firewall, which operates directly at the cloud permission layer rather than brokering sessions or credentials.

From Skeptic to Customer

I deployed the Cloud Permissions Firewall in two very different environments: A regulated insurance enterprise and a top private equity firm.

In both cases, we deployed the control plane in minutes and enforced guardrails across the organization the same day.

For the first time, JIT actually worked.

Later, Sonrai partnered with Software Secured to validate the approach against real AWS attack paths. Sixteen real-world privilege escalation and persistence scenarios were tested. All sixteen were blocked. The difference between observing risk and controlling it was proven.

What Teams Mean When They Say “We Already Have JIT”

Almost every team tells me they already have JIT.

What they usually have is role switching with standing permissions, directory group changes, ticket-based approvals, or break-glass accounts. Sometimes there is automation, but the access never expires.

None of that JITs the permissions themselves.

This is why real just-in-time access in the cloud has to operate at the permission layer, not the account layer.

What Actually Matters in JIT

The question isn’t whether you have JIT.

It’s what you’re JIT’ing.

If the answer is user accounts or group membership, you’re solving the wrong problem.

The answer should be: Permissions on demand.

Governing the Permission Stack 

Cloud identity risk should be owned by whoever controls organization-level policies. Permissions should remain explicit. IAM should not be hidden behind abstractions.

Modern cloud PAM has to govern the full permission stack:

Layer What’s Controlled
Account External access and blast radius
Role Privileged access sessions
Service Which cloud services can be used
Permission Sensitive API actions

This is what Cloud Privileged Access Management actually means in practice.

AWS alone has more than 18,000 permissions. Most identities that hold powerful permissions never use them. That is standing privilege, not misconfiguration.

The Bottom Line

I spent years trying to make the wrong models work.

Shift left assumed developers could predict identity needs far in advance. They can’t. Legacy PAM assumed cloud privilege looked like users and sessions. It doesn’t. Homegrown automation assumed identity was a workflow problem. It isn’t.

In the cloud, privilege access management is a permissions problem. And permissions only become safe when they are enforced continuously, at the native control plane, without turning access into a bottleneck.

When permissions are granted only when they are needed, revoked automatically, and governed centrally, something important happens. Teams stop fighting security controls. Incidents stop turning into access drills. Standing privilege stops being the default.

That is what finally worked for me in production. Everything else was friction, drift, or false confidence.

*** This is a Security Bloggers Network syndicated blog from Sonrai | Enterprise Cloud Security Platform authored by Sonrai Security Marketing. Read the original post at: https://sonraisecurity.com/blog/shift-left-is-dead-for-cloud-pam/


文章来源: https://securityboulevard.com/2026/02/shift-left-is-dead-for-cloud-pam/
如有侵权请联系:admin#unsafe.sh