Why just-in-time access is becoming the only sane way to survive PCI in a multi-cloud world

There’s a comforting fiction many organizations still cling to: “We’ve restricted access to the cardholder data environment (CDE).” What they often mean is: “We gave a small group of people permanent admin rights and promised to review them later.”

PCI DSS v4 quietly killed that (somewhat spurious) method of operation.

Not with a single dramatic requirement, but with a steady drumbeat of expectations around least privilege access management, access reviews, MFA everywhere, time-limited exceptions, and audit logs that actually tell a story. If you squint, PCI isn’t asking for heroics. It’s asking you to stop relying on standing privilege and start demonstrating control.

That’s where just-in-time access (JIT) stops being a “nice security idea” and becomes “operationally inevitable.”

PCI DSS v4: access control, minus the theater

PCI DSS v4.x sharpened the focus on how access is granted and how long it sticks around. A few themes matter more than the rest:

  • Business need-to-know isn’t optional anymore. All access to the cardholder data environment (CDE) must be justified, limited, and regularly reviewed.
  • User and privilege reviews aren’t box-ticking exercises. You’re expected to confirm access is still appropriate, including for third-party and system accounts.
  • Shared or generic access is only allowed as a tightly controlled exception, explicitly approved, time-limited, and attributable to an individual.
  • MFA is required for all non-console access into the CDE, not just remote admins.
  • Audit logs must clearly capture privilege elevation and account changes, not just logins.

None of that says “use JIT” or privilege elevation and delegation management (PEDM). But all of it quietly assumes you are. Essentially, attribute-based access control (ABAC).

What “CDE Access” Actually Means in the Cloud

One reason teams struggle with PCI in cloud environments is that “CDE access” is broader than people expect. It’s not just database admins typing SQL at midnight. In AWS, Azure, and GCP, CDE-impacting access includes:

  • Identity and access management changes
  • Network and firewall rules
  • Key management and secrets
  • CI/CD pipelines that deploy payment services
  • Logging and monitoring configurations

If an identity can weaken controls around payment systems, PCI considers it in scope. That includes humans and machines.

AWS: Where JIT usually lives

In AWS environments, JIT tends to anchor around temporary role assumption.

  • Console and admin access: Engineers authenticate via SSO and assume narrowly scoped roles only when needed, with session durations capped and logged.
  • Breakglass roles: Kept separate, heavily protected, and used rarely — with approvals and post-use review.
  • CI/CD deploy roles: Often overlooked, but critical. Pipelines that can change IAM roles, task definitions, environment variables, or secrets are effectively privileged users. JIT here means time-bound role assumption tied to a specific job.
  • Database administration: Temporary elevation for schema changes or incident response, rather than permanent admin entitlements.

AWS CloudTrail provides the raw evidence, but JIT workflows turn that evidence into something an assessor can understand without excessive caffeine and guesswork.

Azure: JIT by design (if you actually use it)

Azure’s native story leans heavily on eligible vs. active roles.

  • Privileged role activation allows engineers to be eligible for high-risk roles but only activate them for a limited time, with MFA and approvals.
  • Emergency access accounts still exist, but PCI expects them to be tightly governed and rarely used.
  • Service principals and managed identities warrant the same level of scrutiny as humans. If they can deploy to Azure Kubernetes Service (AKS), modify Key Vaults, or change RBAC, they need scoping, monitoring, and periodic validation.
  • Database admin roles should be separated from data-plane access and activated only when required.

The trap is enabling these features but leaving half your engineers permanently activated “for convenience”. PCI assessors' notice.

GCP: Conditional access is your JIT lever

GCP approaches JIT differently, but the building blocks are there.

  • Time-based conditional role bindings allow roles to exist only within approved windows.
  • Scoped IAM roles reduce blast radius when elevation is necessary.
  • Service accounts powering CI/CD and GKE workloads must be treated as privileged identities, not background noise.
  • Database and KMS administration should be time-boxed and auditable, not static.

When done well, conditional access removes the need for long-lived admin rights entirely.

Why PCI Assessors Like JIT (even if they don’t say it)

From an assessor’s point of view, JIT solves several chronic problems at once:

  • Access reviews become verification, not archaeology
  • Shared or emergency access has a clear approval and expiry trail
  • MFA is enforced at the moment of risk
  • Logs show who elevated, when, and for how long. Cleanly

It turns “trust us” into “here’s the receipt”.

The Quiet Operational Win

The real benefit of JIT in PCI environments isn’t compliance. It’s sanity.

When access is temporary by default, teams stop arguing about who should have admin and start focusing on when it’s needed. Engineers spend less time hoarding permissions “just in case”. Security teams stop inheriting decades of entitlement drift. Incidents are easier to contain because the blast radius is smaller by design.

And yes, you still need policies. PCI still expects them. But policies without operational enforcement are just optimistic fiction.

Summing Things Up

PCI DSS v4 doesn’t demand perfection. It demands control you can prove.

In multi-cloud environments, just-in-time access is the simplest way to align least privilege, MFA, auditability, and real-world operations without grinding delivery to a halt. Standing privilege might feel convenient, but not when you’re explaining to an assessor why it still exists, and assessors ask awkward questions for a living.

Nik Hewitt

Technology

February 18, 2026

Read More Blogs

Don't fall behind the curve

Discover powerful features designed to simplify access management, track progress, and achieve frictionless JIT.

Book a Demo