Static keys rot security from the inside. They linger in config files for months or years. They’re copied, shared, forgotten, and sometimes leaked. Every AWS breach story starts the same way—an old key left unrevoked. The fix is simple: stop giving them a chance to exist beyond the moment you need them.
AWS CLI-style profiles with Just-In-Time (JIT) access cut off that threat at the root. Instead of storing long-lived credentials in ~/.aws/credentials, you request short-lived sessions when you need them—and they vanish when you’re done. The profile name stays the same. The credentials change every time.
With JIT access, your workflow barely changes:
- Request a new session.
- Use the CLI with your named profile.
- Expire and forget.
There’s no manual cleanup. No leftover secrets. No exposure in git commits or CI logs. Credential rotation stops being a chore and becomes the default state.