An engineer approved the change at 2:03 p.m. and by 2:07, the attacker had full admin rights.
This is the risk with privilege. It’s not the weeks you’re secure; it’s the seconds you’re not. Just-In-Time (JIT) Privilege Elevation, done right, changes that. It trims those seconds to a sliver. It grants rights only when needed, only to the exact scope, and only for the shortest necessary time. When combined with chaos testing, it becomes a weapon against privilege misuse you didn’t even know was possible.
Chaos testing for JIT Privilege Elevation is not theory. You inject controlled failures into your access control systems. You simulate a breached account. You watch your own systems fail or survive under pressure. You see how your elevation workflows hold up when requests spike, tokens expire early, or policy servers lag. This isn’t about trusting code. It’s about proving, live, that bad timing won’t kill you.
Security reviews rarely reach this depth. Most focus on static policies and assume the policy server will always respond. They miss reality—elevation requests can fail open, queues can back up, and poorly scoped policies can grant far more than intended. Chaos testing surfaces these flaws while they can still be fixed. A live simulation of unexpected privilege escalation after a microservice crash will tell you more than a 40-page audit ever could.