Why cloud-native demands an API-led approach to PAM

Shashwat Sehgal
•
Oct 14, 2025
Shashwat Sehgal
•
Oct 14, 2025
I recently did an interview with Cyber Symposium about how cloud-native adoption has fundamentally changed the privileged access landscape. The question I wanted to answer: how should organizations think about securing privileged access, in a world where the number and types of identities, as well as the access paths to sensitive systems has exploded? It’s a topic that really gets to the heart of what’s driving the next evolution of identity security.
Over the past 15 years, cloud-native adoption has reshaped production environments. What was once a handful of servers in a data center is now a sprawl of virtual machines, databases,Kubernetes clusters, and microservices.
Two changes stand out:
This complexity has broken the traditional privileged access management (PAM) model.
Most organizations struggle with a familiar tension. Security teams want every access to be short-lived,least-privileged, and fully auditable. Developers want fast, frictionless access to get their jobs done. Historically, enforcing security has slowed teams down, creating pressure to grant standing access and let privilege creep set in.
The path forward is to eliminate this trade-off: provision the right access instantly, revoke it automatically when the task ends, and preserve productivity while enforcing least-privilege.
Traditional PAM tools fall into two categories:
● Vault-led solutions. These rely on storing and rotating static credentials. Effective for root passwords in data centers, but obsolete in cloud-native environments where entitlements — not passwords — define access.
● Bastion-led solutions. These insert a proxy or jump server in front of environments. But they grant standing access and often still depend on SSH keys, failing to deliver true just-in-time (JIT) access.
Neither approach aligns with the API-driven nature of modern infrastructure.
An API-led PAM approach provisions and revokes access through native cloud and infrastructure APIs. This model:
● Covers every category of access, from VMs to cloud databases to Kubernetes.
● Eliminates static keys and credentials.
● Provides a user experience far superior to vault- or bastion-based solutions.
The result is privileged access that is short-lived, least-privileged, and auditable by design.
Organizations adopting this API-led model report gains across three dimensions:
I believe great work is already happening with early adopters of this new way of thinking and the new identity stack. For CISOs who want to dive deeper, I recently wrote a paper on first principles for identity security, designed to give CISO’s a practical framework for tackling these challenges head-on. Check it out.
Get a demo of P0 Security, the next-gen PAM platform built for every identity.