Sign inSupport

PRESS RELEASE

P0’s Next-Gen Platform Redefines Production Access Across Users, Machines and Environments

New innovations leapfrog legacy PAM, IGA, CIEM and NHIM tools with ephemeral SSH, Microsoft Teams workflows and cross-cloud credential orchestration—all under a unified access control layer.

SAN FRANCISCO — June 24, 2025

P0 Security, the next-generation platform for production access, today announced a major expansion of its Unified Privileged Access platform, introducing new capabilities across its three core product pillars: orchestration, risk posture and governance.

With these updates, P0 is helping organizations achieve Zero Standing Privilege (ZSP) faster and more safely—delivering a unified control layer that extends existing identity investments.

This release introduces the industry’s first bastion-less JIT SSH and Sudo provisioning across AWS, Azure and GCP; full Microsoft Teams support for just-in-time (JIT) access workflows; and expanded credential lifecycle automation for service accounts. New dashboards and posture insights round out the release, helping teams track adoption, reduce access risk and enforce least privilege at scale.

“We’ve expanded our orchestration and governance capabilities to cover what legacy tools can’t—from SSH access and Teams workflows to service account credentials,” said Shashwat Sehgal, CEO and co-founder of P0 Security. “This release is about helping teams move faster and safer—with real policy enforcement, less manual toil and guardrails that work in every environment.”

P0 is built on a continuously updated Access DNA model—a real-time map of identities, credentials, permissions, and resources—powered by its Identity Graph: a unified, queryable layer that connects all access elements across environments. This foundation enables deep insight into who or what can access what and how, and drives everything from risk detection and policy enforcement to precise, automated remediation—across users and machines, clouds and services. 

What’s New in This Release

Orchestration: JIT for developers, lifecycle automation for machines

  • Service account credential orchestration: Manage the full lifecycle of cloud service-account credentials with continuous rotation, revocation and enforcement.
  • Microsoft Teams support: For requesting, approving and tracking JIT access.
  • Jira integration: Assign tasks, trigger approvals and track ownership in-line with existing workflows.
  • JIT, least-privileged access to cloud servers: First-of-its-kind SSH and Sudo provisioning across AWS, GCP and Azure—no bastions, no proxies, fully ephemeral.

Risk Posture: See and remediate access risks before they spread

  • Expanded AWS posture: Detect unused IAM users, keys, passwords and permission sets across multiple identity sources.
  • Deep GCP analysis: New lateral movement detection (direct/indirect service account impersonation, SSH paths, Google Workspace group elevation).
  • Cross-cloud access graph: Unified mapping of users, machines, credentials, permissions, resources and lateral movement across environments.
  • IAM health dashboard: Report on posture progress, highlight coverage gaps and surface executive-ready insights.

Governance: Continuous control without bottlenecks

  • Auto-approval rules for JIT: Eliminate standing privileges with policy-driven ephemeral access.
  • Azure JIT access: Fine-grained, scoped access to Azure resources—delivered through native IAM and Teams workflows.
  • Session recordings: Audit trail of actions taken by users in the cloud console during a privileged session.

These capabilities are powered by P0’s Identity Graph, a unified, queryable model that connects all Access DNA elements across environments. It provides the context necessary to detect risk, enforce policy and automate remediation with precision—across users and machines, clouds and services.

Supporting the Journey to Zero Standing Privilege

Today’s teams want access to be fast, secure, and invisible. With this release, P0 helps organizations on their journey to modern production access.

“Short-lived, least-privileged JIT access isn’t just a convenience layer. It’s how you align developer velocity with least privilege and how you enforce access that actually expires,” said Sehgal. “These features make it real. And for NHIs, we’ve made secure access just as seamless, with built-in automated credential rotation, revocation and least-privilege enforcement.”

To support security leaders navigating this shift, the CISO’s Field Guide to Modern Production Access, outlines the phases, principles and architectural shifts required to adopt least-privilege, ephemeral access at scale in cloud and hybrid environments.

About P0 Security

P0 Security is the next-generation privileged access platform, redefining how security teams manage production access across cloud and hybrid environments.

Unlike legacy approaches that rely on a patchwork of PAM, IGA, CIEM, NHIM and IAM tools, P0 delivers orchestration, risk posture and governance in one unified control plane—built for scale, speed and Zero Standing Privilege. 

At the core is P0’s continuously updated Identity Graph and Access DNA layer, giving teams real-time insight and control across all identities, resources and environments—including multi-cloud, on-prem and hybrid infrastructure. With P0, access is short-lived, auditable and policy-driven—from humans to service accounts. 

Deployed across cloud-native startups, hybrid enterprises and global financial institutions, P0 goes live in under 60 days—no portals, proxies, or stitched-together workflows required.

To explore P0’s Unified Privileged Access platform and book a demo, visit p0.dev