Home > Cloud PRWire > Cloud Security Just In Time Privileges & User Access Management Service Update

Cloud Security Just In Time Privileges & User Access Management Service Update

The updated cloud security system delivers unified access cross-cloud. This means that companies limit data exposure to standing privileges and secrets by selecting who has access to specific information at any given time.

More details can be found at https://www.britive.com/news/defense-in-depth

Britive’s platform does this by enabling cloud-first security best practices such as multi-cloud just-in-time (JIT) privilege grants, cloud secrets governance, and intelligent privilege right-sizing. The company’s updated JIT grants fit seamlessly into any company’s approval workflow processes, providing businesses with an additional layer of internet security.

Through the JIT grants, businesses can now separate authorization and authentication – with human and/or non-human IDs – so that only permitted users have access to sensitive data. The JIT grants quickly check out a role-based elevated privilege profile for a specific cloud service and give access only until the task is completed. Once the task is complete, these privileges are automatically revoked.

In a recent video published on its website, Britive explains that process as similar to a hotel key. Guests to a hotel are given an access card to their room, which is only usable for the duration of their stay. Once they check out, the card is no longer useful.

With JIT grants, user and machine IDs are quickly validated and only given privilege either for the duration of a session or task or until the user checks the profile back manually.

Adding to this process is Britive’s Zero Standing Privilege (ZSP) security posture. Based on a zero-trust concept, it does not allow standing access to cloud accounts and data to any human or machine ID.

“The Britive solution is a lightweight platform that integrates with your operation critical cloud and SaaS services through an easy-to-deploy API,” said a spokesperson. “Users are granted the same level of access across multiple, dissimilar environments due to our unified access model. The unified access model provides visibility and control from a single pane of glass.”

Interested parties can find more information by visiting https://www.britive.com/news/defense-in-depth


450 North Brand Boulevard
Suite 600
United States

comtex tracking


Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Daily Pune journalist was involved in the writing and production of this article.