Zero Trust in Practice: Enhancing Privileged Access Security with Just-in-Time (JIT) and Self-Service Models

Abstract

The enterprise security landscape is current, remote work and hybrid cloud adoption highlights the inadequacy of legacy or traditional perimeter-based security controls, hence, the shift to Zero Trust, where in this new paradigm, privileged accounts are viewed as assets – most important and highly targeted. This document will discuss how Just-in-Time (JIT) Access and Self-Service models enable businesses to operate under a Zero Trust concept using Privileged Access Management (PAM). JIT enables dismantling “always-on” or “standing” privileged account risks by provisioning temporary time-based privileges for both human and non-human identities only when needed. Different from traditional PAM approaches that typically leave unwanted sources vulnerable thereby leading to “privilege creep,” unmonitored “orphaned accounts” available for attack, JIT will narrow the window considerably to more than 90% reduction in the threat window associated with privilege attacks. It also covers how self-service access, fueled by smart workflows and Risk-Based Authentication, can strike that fine line between tight security and productivity through seamless experience for the user. The paper finally imagines a world where Zero Trust PAM would be inseparably linked to Artificial Intelligence and Automation in delivering pro-active, end-to-end security leveraging Identity Threat Detection and Response (ITDR). At the end of it all, the value of strategic and actionable insights for an organization is immense, especially when operating in highly regulated industries. Insights that will help systematically move the organization from a 'trust-by-default' state to one of 'trust-by-exception,' thereby are creating a security-aware environment without impeding users.

Country : United States

1 Suresh Pairu Subramanyam

  1. Technical Manager, United States

IRJIET, Volume 9, Issue 12, December 2025 pp. 13-18

doi.org/10.47001/IRJIET/2025.912003

References

  1. S. Ahmadi, “Autonomous IdentityBased Threat Segmentation for Zero Trust Architecture,” SSRN preprint, 2025.
  2. S. Aggarwal, S. Mehra, and S. Sathar, “Combined HyperExtensible ExtremelySecured ZeroTrust CIAMPAM Architecture,” arXiv preprint, Jan. 2025.
  3. D. Ajish, “The Significance of Artificial Intelligence in Zero Trust Technologies: A Comprehensive Review,” Journal of Electrical Systems & Information Technology, vol. 11, article no. 30, 2024.
  4. S. Arora and A. Tewari, “Zero Trust Architecture in IAM with AI Integration,” International Journal of Science and Research Archive, vol. 8, no. 2, pp. 737–745, 2023.
  5. M. Rana, “Enhancing Zero Trust Cybersecurity with AI,” Journal of Information Systems Engineering & Management, vol. 10, 32s, 2025.
  6. G. Karamchand, “Zero Trust and AI: A Synergistic Approach to NextGeneration Cyber Threat Mitigation,” World Journal of Advanced Research and Reviews, vol. 24, no. 3, pp. 3374–3387, 2024.
  7. K. Khan, “Solid Access Management: AIBased ZeroTrust Architectures for Corporate Security,” Newark Journal of Human-Centric AI & Robotics, vol. 4, 2024.
  8. N. Bistolfi, A. Georgescu, and D. Hodson, “The Data Enclave Advantage: A New Paradigm for Least-Privileged Data Access in a Zero-Trust World,” arXiv preprint, 2025.
  9. K. Huang, Y. Mehmood, H. Atta, J. Huang, M. Baig, and S. Balija, “Fortifying the Agentic Web: A Unified Zero-Trust Architecture Against Logic-Layer Threats,” arXiv preprint, Aug. 2025.
  10. R. Nair Rajendran, S. K. Anumula, D. K. Rai, and S. Agrawal, “Zero Trust Security Model Implementation in Microservices Architectures Using Identity Federation,” arXiv preprint, Nov. 2025.