All posts

Your root account is a loaded gun

A single permanent admin right is enough to blow a hole through system integrity. The old way was to over-provision and hope nothing goes wrong. The better way is Just-In-Time Privilege Elevation with OpenID Connect (OIDC) — delivering precise, temporary permissions exactly when they’re needed, then taking them away the moment the job is done. Just-In-Time Privilege Elevation removes standing admin rights. No idle accounts sitting in the dark with god-mode powers. Instead, access is granted on

Free White Paper

Cross-Account Access Delegation + Read-Only Root Filesystem: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

A single permanent admin right is enough to blow a hole through system integrity. The old way was to over-provision and hope nothing goes wrong. The better way is Just-In-Time Privilege Elevation with OpenID Connect (OIDC) — delivering precise, temporary permissions exactly when they’re needed, then taking them away the moment the job is done.

Just-In-Time Privilege Elevation removes standing admin rights. No idle accounts sitting in the dark with god-mode powers. Instead, access is granted on demand, authenticated and authorized through OIDC. Every permission has a clear reason, a clear time window, and a clear audit trail.

OIDC provides the identity backbone. It’s lightweight, cloud-native, and secure, enabling authentication that integrates seamlessly across federated systems. Combined with Just-In-Time access control, it enforces trust at the moment of request — not days or months before. This means zero trust isn’t just a buzzword. It means your systems only ever run with the least power necessary at that exact instant.

The benefits stack fast:

Continue reading? Get the full guide.

Cross-Account Access Delegation + Read-Only Root Filesystem: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Reduce attack surface by eliminating permanent high-privilege accounts.
  • Enforce policy-driven access with automated, tamper-proof logs.
  • Integrate with SSO, MFA, and existing identity providers through OIDC.
  • Scale across engineering teams without bottlenecks or manual approvals.

Security incidents often start with stale permissions. That risk disappears when “always-on” admin roles vanish. With JIT elevation and OIDC, credentials are ephemeral. Stolen tokens expire swiftly. Compromised accounts are harmless without privilege escalation at the moment of use.

Implementation can be streamlined:

  1. Use OIDC to federate identity across services.
  2. Apply Just-In-Time elevation only to verified, contextual requests.
  3. Automate expiry of elevated rights — minutes, not hours.
  4. Log every access event for compliance and forensics.

High security no longer has to slow down development or operations. The right setup grants engineers the access they need instantly, without leaving open doors for attackers.

You can see it running, live, in minutes at hoop.dev — secure, fast, and simple. Try it, and watch permanent privileges disappear without slowing the work that matters.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts