New capabilities connect discovery, posture, policy and provisioning to proactively eliminate standing privileges while ensuring seamless access to production for developers, workloads and agents
P0 Security, the modern privileged access control plane, today announced new capabilities that extend its core architecture to continuously enforce Zero Standing Privilege (ZSP) at scale. With these updates, P0 becomes the first platform to offer a closed-loop ZSP model that replaces standing privilege with short-lived, least-privilege, auditable access across production environments and identities. Whether that be for human users, machines or first-party AI agents.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251204088862/en/

P0's closed-loop Zero Standing Privilege system
The release adds a new privilege governance module that brings together posture risk assessment, least-privilege remediation and runtime policy conversion so teams can move from static access to dynamic control. When paired with P0’s API-driven discovery and provisioning, along with its session-level audit and replay, customers can automate Just Enough Privilege (JEP) and Just-in-Time (JIT) access across their environments to enforce least privilege as the default instead of just an aspiration.
“The future of privileged access management is proactive, adaptive, and invisible to developers,” said Shashwat Sehgal, CEO and co-founder of P0 Security. “Closing the loop means discovery leads to posture, posture informs policy, and policy is enforced automatically without slowing down the business. This set of releases allows our customers to achieve zero standing privilege as simply and scalably as possible."
Continuous visibility, policy, and enforcement
The compounding value of this release is a closed-loop model that centralizes the production access lifecycle to deliver zero standing privilege with zero friction:
- Continuous privilege risk visibility
- Guided least-privileged policy design
- Automated controls within target systems
- Verified user audit logging
"Our customers are demanding enforceable and scalable least-privilege governance that matches the speed of modern production environments,” said Rajesh Mittal, CTO of Avancer Corp – a trusted implementation partner to P0 Security. “P0's ability to continuously enforce ZSP for humans, machines and agents directly aligns with our identity-first security strategy. Together with P0, we deliver comprehensive privileged access controls that are auditable and automated."
What’s New in This Release
Closed-loop ZSP governance
- Privilege risk posture: Flags privilege sprawl, unused access, over-permissioned roles and orphaned credentials, giving teams actionable steps to replace standing access with JIT
- Policy Studio: A flexible rules engine that leverages posture signals and customer defined governance policies to inform downstream workflows
- Runtime policy conversion: Turns least-privilege policies into dynamic controls that are enforced natively and consistently across production systems
“Standing privilege has long been a known architectural liability and this release is how we combat that at scale,” said Greg Danyi, CTO of P0 Security. "The combination of granular identity lineage, live posture telemetry and runtime policy conversion creates a continuous ZSP model that informs and reinforces itself to not only govern human users, but just as critically, non-human identities like service accounts and agentic AI.”
Early access: First-party agentic controls
P0 Security is also rolling out early access agentic governance for AWS Bedrock and Google Vertex. The first set of capabilities include:
- Privilege right sizing on a per-agent basis with secondary controls, instead of relying on the broad permission sets the end user may have
- JIT, human-in-the-loop provisioning when an agent asks for access to data or cloud resources, based on the human identity behind the request
- Session-level audit and replay so teams can see exactly which agent did what, when they did it and with whose permissions
The same governance model applied across human, machine and agentic identities, so everything fits into one workflow instead of separate systems. Watch a quick tour here or visit booth #705 at the Gartner IAM Summit in Grapevine, Texas.
About P0
P0 Security is helping companies modernize PAM for multi-cloud and hybrid environments with the most agile way to ensure least-privileged, short-lived and auditable production access for users, NHIs and agents. Centralized governance, just-enough-privilege and just-in-time controls deliver secure access to production, as simply and scalably as possible. Every identity. Every system. All the time.
P0’s Access Graph and Identity DNA data layer make up the foundational architecture that powers privilege insights and access control across all identities, production resources and environments. With P0, production access is least-privilege, short-lived and auditable by default, including the new class of AI-driven agentic workloads emerging in modern environments.
To explore P0 Security further or book a demo, visit p0.dev
View source version on businesswire.com: https://www.businesswire.com/news/home/20251204088862/en/
Contacts
Media inquiries only:
Cari Jaquet
cjaquet@p0.dev
408.605.7575
