Skip to content

What is jitsudo?

Standing admin access is the single largest avoidable source of blast radius in cloud environments. When engineers hold persistent elevated permissions — even ones granted with good intentions — every compromised credential, phishing attack, or insider incident has immediate, unlimited scope.

Security teams know this. The principle of least privilege is a foundational control. The problem has never been the principle — it has been the operational friction of actually enforcing it. When granting temporary access takes longer than the incident demands, engineers route around the process.

jitsudo makes the secure path the easy path. Temporary, time-limited, approved, fully audited access — on every cloud, from a single CLI — fast enough to use in a P1 incident.

jitsudo is an open source, cloud-agnostic Just-In-Time (JIT) privileged access management (PAM) system. It replaces standing admin roles with on-demand elevation requests that:

  • Expire automatically at a configured TTL (no forgotten role assignments)
  • Require approval from a policy-designated approver before credentials are issued
  • Write a tamper-evident audit trail of every request, approval, denial, and expiry
  • Work across all four major cloud providers from a single control plane
SRE: jitsudo request --provider aws --role prod-infra-admin --duration 2h \
--reason "Investigating P1 ECS crash - INC-4421"
✓ Request submitted (ID: req_01J8KZ...)
⏳ Awaiting approval — notified: on-call SRE lead (sre-leads group)
Approver: jitsudo approve req_01J8KZ...
✓ Approved. Credentials active for 2 hours.
SRE: jitsudo exec req_01J8KZ... -- aws ecs describe-tasks --cluster prod
# 2 hours later — credentials automatically revoked
# Audit log entry written: grant.expired

Approvers are resolved dynamically by the OPA policy engine at request time — whoever currently satisfies the approval policy for this request type. Approval authority is a narrow, policy-governed privilege, not standing admin access.

AudienceProblem jitsudo solves
Security teams / CISOsEliminate standing admin as a persistent attack surface; enforce least privilege with full audit trail
SREs / on-call engineersGet the access you need in seconds during an incident, without a manual IAM change request
Multi-cloud infrastructure teamsOne access workflow across AWS, Azure, GCP, and Kubernetes
AI/ML teams deploying agentsGive AI agents cloud access with the same approval and audit controls as humans — no persistent credentials
ConceptDescription
Elevation RequestA request for temporary elevated access to a cloud resource
ProviderA cloud platform adapter (AWS, Azure, GCP, Kubernetes)
RoleAn abstract permission set mapped to provider-specific roles
ScopeThe resource boundary (AWS account ID, GCP project, K8s namespace)
Eligibility PolicyOPA/Rego policy: who can request which roles, for how long
Approval PolicyOPA/Rego policy: who must approve, and under what conditions
Trust TierA principal’s trust level (0–4), used by policy to gate auto-approval and access scope
Break-glassEmergency access that bypasses approval with immediate alerts and mandatory review
Audit LogTamper-evident, append-only record of every action (SHA-256 hash chain)
TierDecision makerTypical use
Tier 1OPA policy (auto-approve)Low-risk, high-trust requests approved in milliseconds
Tier 2AI agent via MCP (approve, deny, or escalate with reasoning)Medium-risk requests — AI synthesizes context, always escalates on uncertainty
Tier 3Policy-designated human approverHigh-risk operations; any request the AI tier escalates
Break-glassRequester-initiated emergency bypass (immediate alerts)P0 incidents when no approver is reachable

See Approval Model for the full architecture specification.

  • Not a secrets manager — use HashiCorp Vault or your cloud provider’s secrets manager for credential storage
  • Not a network access tool — use Teleport or HashiCorp Boundary for VPN, SSH, or RDP access
  • Not an identity provider — jitsudo delegates identity to your existing IdP (Okta, Entra ID, Keycloak, Google Workspace)
  • Not a compliance platform — jitsudo produces the audit data; SIEM and compliance tools consume it
  • Not a session recorder — jitsudo gates access; use your provider’s native session logging or a dedicated session recording tool
  • Not a bastion host or jump server — jitsudo manages permission grants, not network paths to resources
  • Not a VPN or zero-trust network access tool — jitsudo manages cloud IAM, not network connectivity