
Sign up to save your podcasts
Or
In this episode of Access Granted, Nauman sits down with Britive’s Product Manager, Matt Wilson, to unpack what many organizations are finally confronting head-on: a growing crisis caused by static credentials in today’s hybrid, multi-cloud, and AI-driven environments.
With the explosion of non-human identities (NHIs), cloud-native services, and automated pipelines, traditional Privileged Access Management (PAM) practices are no longer enough. The conversation explores the critical evolution toward Zero Standing Privileges (ZSP) and why this modern approach is essential for securing both human and non-human access in today’s dynamic infrastructures.
Matt breaks down the differences between Just-in-Time access and true ZSP, debunks common misconceptions, and explains why eliminating standing permissions is key to achieving Zero Trust in modern environments.
Key topics include:
Hardcoded keys, long-lived tokens, and static secrets remain prevalent in cloud environments.
Just-in-time access doesn’t guarantee ZSP. Many solutions only gate access to static credentials instead of eliminating standing permissions entirely.
Dynamic, ephemeral, auto-revoked permissions ensure identities only have access when needed for true ZSP.
Vaulting and password rotation no longer meet the demands of cloud-native environments. Agent- and proxy-based models introduce friction and fail to scale.
Modern environments require a single platform that can manage and enforce access policies for developers, AI agents, bots, and automated workflows alike.
ZSP support, agentless deployment, cloud-native integration, and coverage across all identity types and environments are non-negotiable features of modern access security.
The future of identity security lies in unified, dynamic access management, not siloed tools.
Done right, security becomes an enabler for innovation, developer productivity, and adoption of cutting-edge technologies.
Looking forward at the evolution toward behavior-based authorization and continuous, adaptive access control as AI agents and dynamic workloads scale.
🍏 Listen on Apple: https://podcasts.apple.com/us/podcast/access-granted/id1770083136
📺 Watch Access Granted on YouTube: https://www.youtube.com/playlist?list=PLotHzn4KKa4K7qanA_Oi2-LZagw_mINyA
In this episode of Access Granted, Nauman sits down with Britive’s Product Manager, Matt Wilson, to unpack what many organizations are finally confronting head-on: a growing crisis caused by static credentials in today’s hybrid, multi-cloud, and AI-driven environments.
With the explosion of non-human identities (NHIs), cloud-native services, and automated pipelines, traditional Privileged Access Management (PAM) practices are no longer enough. The conversation explores the critical evolution toward Zero Standing Privileges (ZSP) and why this modern approach is essential for securing both human and non-human access in today’s dynamic infrastructures.
Matt breaks down the differences between Just-in-Time access and true ZSP, debunks common misconceptions, and explains why eliminating standing permissions is key to achieving Zero Trust in modern environments.
Key topics include:
Hardcoded keys, long-lived tokens, and static secrets remain prevalent in cloud environments.
Just-in-time access doesn’t guarantee ZSP. Many solutions only gate access to static credentials instead of eliminating standing permissions entirely.
Dynamic, ephemeral, auto-revoked permissions ensure identities only have access when needed for true ZSP.
Vaulting and password rotation no longer meet the demands of cloud-native environments. Agent- and proxy-based models introduce friction and fail to scale.
Modern environments require a single platform that can manage and enforce access policies for developers, AI agents, bots, and automated workflows alike.
ZSP support, agentless deployment, cloud-native integration, and coverage across all identity types and environments are non-negotiable features of modern access security.
The future of identity security lies in unified, dynamic access management, not siloed tools.
Done right, security becomes an enabler for innovation, developer productivity, and adoption of cutting-edge technologies.
Looking forward at the evolution toward behavior-based authorization and continuous, adaptive access control as AI agents and dynamic workloads scale.
🍏 Listen on Apple: https://podcasts.apple.com/us/podcast/access-granted/id1770083136
📺 Watch Access Granted on YouTube: https://www.youtube.com/playlist?list=PLotHzn4KKa4K7qanA_Oi2-LZagw_mINyA