


Zero Standing Privileges at Scale
How Marqeta secured privileged access for 1,600 engineers across cloud and SaaS without adding friction to developer workflows.
1,600+ Users Onboarded
500 Unique Logins / Week
4,000+ Profile Checkouts / Week
12 Hrs Max Session Duration
"Privileged access in the cloud is not something you store and rotate. It is something you mint when it is needed and tear down when it is not. Once we got to that model, the operational story changed. Engineers stopped routing around access controls because access was no longer the bottleneck."
Chetan Jha, Head of Identity and Vulnerability Management, Marqeta
Scaling Access Policy and Enforcement
About Marqeta
Marqeta is a global modern card issuing platform that enables businesses to build and manage their own card programs with speed and flexibility. Processing billions of dollars in payments annually, Marqeta serves fintech companies and enterprises across financial services, on-demand delivery, and expense management. Operating under PCI-DSS requirements in a regulated payments environment, Marqeta's engineering teams need fast, auditable access to complex cloud infrastructure. Privileged access management is a core operational requirement, not a compliance checkbox.
The Challenge
As Marqeta's cloud footprint scaled, a gap developed between access policy and enforcement reality. The prior model controlled access to AWS by toggling group membership in Okta, which federated into AWS through IAM Identity Center. This approach had a structural limitation that grew harder to manage as the engineering organization expanded.
Session Persistence
Removing a user from an Okta group did not end their active AWS session. Privilege persisted for as long as the session remained valid, often spanning multiple days. In a PCI-DSS environment processing live card transactions, a session that continues days after an engineer's task is complete is an exposure window that security teams have no precise way to close without disrupting other active sessions.
Audit Evidence Reconstruction
Access evidence across AWS, Okta, Salesforce, and Snowflake lived in separate systems with no shared record. Compliance reporting required pulling and correlating data from each platform individually. That recurring effort added cost to every audit cycle and created gaps that external auditors flagged.
Incomplete Platform Coverage
The group membership model had no native integration with Salesforce or Snowflake. Engineers and analysts accessing payment and customer data on those platforms operated outside the same governance model applied to AWS. Policy was inconsistent across the stack.
Scalability
With over 1,600 engineers in scope and a growing cloud footprint across two AWS organizations, manually managing group memberships to control access was not operationally sustainable as headcount and cloud coverage continued to grow.




Use Cases Britive Had to Solve
Marqeta's privileged access requirements span five distinct scenarios, each with different users, time constraints, and compliance implications. The prior model did not address any of them cleanly. Britive needed to work across all five.
Use Case 1: Cloud Infrastructure Access for Engineers AWS: Scoped, Time-Bound Access for Engineering Teams
Scenario: Marqeta engineers routinely need elevated access to AWS for deployments, production debugging, configuration changes, and incident investigation across two AWS organizations.
Before: Engineers held elevated AWS permissions tied to Okta group membership. Sessions persisted for days regardless of task completion. Standing access was the default state.
After: Engineers check out a scoped AWS IAM role through the Britive UI, Slack, or CLI. The role is granted on AWS IAM at the moment of checkout and removed when the session ends or the 12-hour maximum window expires.
Why It Matters: In a payments infrastructure environment, scoping the exposure window of a compromised cloud credential to the active session duration significantly reduces the potential impact of a credential compromise.
Use Case 2: On-Call Incident Response PagerDuty Integration: No Access Delays During Active Incidents
Scenario: Engineers on call in PagerDuty need immediate elevated access when an incident fires. In a payments platform that runs 24/7, access delays during incident response affect live transaction processing and SLA performance.
Before: On-call engineers either held standing elevated access permanently or waited for manual approval during an active incident, introducing a delay at the point when fast access matters most.
After: When an engineer receives a PagerDuty alert, their Britive checkout is automatically approved based on active on-call status. No manual approval step. Access is available in seconds.
Why It Matters: Britive built this integration from scratch in four weeks to meet Marqeta's go-live requirements. It is now a standard platform capability available to all Britive customers. For a payments company where infrastructure incidents affect live card processing, removing the approval queue from incident response is operationally significant.
Use Case 3: Cloud Data Platform Access Snowflake: Governed Access to Payment and Analytics Data
Scenario: Marqeta's engineering and data teams need privileged access to Snowflake environments containing payment processing data, transaction records, and customer analytics, all of which fall within PCI-DSS scope.
Before: Snowflake had no integration with the group membership-based access model. Access to sensitive data environments was managed separately, with no shared policy engine or audit trail.
After: Britive manages JIT access to Snowflake natively under the same policy engine governing AWS access. An engineer or analyst checks out a scoped Snowflake role, completes the task, and access is revoked. The checkout logs in the same audit trail as every other platform.
Why It Matters: A unified access record across payment infrastructure and data platforms directly addresses PCI-DSS and SOC 2 control requirements. One audit trail across AWS and Snowflake removes the need to correlate access evidence from two separate systems during audit reviews.
Use Case 4: SaaS Admin and Privileged User Access Okta and Salesforce: Consistent Governance Across the Business Stack
Scenario: Privileged access at Marqeta extends beyond cloud infrastructure. Okta administrators managing identity configurations and Salesforce users with access to customer records require the same JIT governance applied to AWS.
Before: Okta admin access and Salesforce elevated access operated outside the cloud-native access model. Privileged SaaS access lacked the same governance standards applied to infrastructure, creating coverage gaps that auditors flagged.
After: Britive applies the same checkout, session enforcement, and audit model to Okta and Salesforce as to AWS. Privileged actions in identity management and CRM are time-bound, logged, and governed from a single control plane.
Why It Matters: Consistent access governance across cloud and SaaS is a baseline expectation during compliance audits. A gap in Salesforce or Okta coverage creates audit findings even when cloud infrastructure access is well-controlled. A single policy engine covering both removes that inconsistency.
Use Case 5: Agentic AI Identity Access AI Agents: Applying Zero Standing Privileges to Non-Human Identities
Scenario: Marqeta has onboarded agentic AI identities, specifically Claude agents, into Britive in Phase 1 of its deployment. As AI agents take on tasks in production engineering workflows, their access requires the same governance applied to human engineers.
Before: The common approach to AI agent access is static service accounts with persistent, broadly scoped permissions. As agents multiply across engineering workflows, that model creates the same standing access risks as human standing access, without the same oversight.
After: Britive applies the same zero standing privilege architecture to AI agents as to human and machine identities. An agent gets a privilege created at runtime, scoped to the specific action it is executing, and removed when the action ends. One policy engine and one audit trail cover every identity type.
Why It Matters: Marqeta is one of the first production deployments to govern agentic AI identity access under a JIT framework. The ability to apply least-privilege access enforcement to AI agents using the same policy model as human engineers is an architectural requirement as AI takes on more consequential tasks in cloud environments.
Why Marqeta Chose Britive
Marqeta's security and engineering teams evaluated solutions against a clear set of requirements: just-in-time access with enforcement at the target system level, coverage across cloud and SaaS under one policy engine, and a developer experience that does not create friction that engineers route around. Several factors drove the decision.
Runtime Privilege Creation
The prior model controlled access to privileges that already existed on AWS by toggling Okta group membership. Britive works differently. It integrates directly with AWS IAM to create the privilege on the target at the moment of checkout and remove it when the session ends. There is no standing entitlement between sessions. Britive operates as an orchestration and enforcement layer on top of the AWS identity infrastructure Marqeta already had in place, extending IAM with session-level privilege lifecycle management that the native access model does not deliver on its own.
One Policy Engine Across Every Platform
Native integrations with AWS, Okta, Salesforce, and Snowflake mean one policy engine, one audit trail, and one place to govern access regardless of the target platform. The alternative was managing separate tools per surface and correlating their audit outputs manually for compliance reporting. Marqeta chose the single control plane.
Developer-First Access Experience
Security controls that create friction tend to get bypassed. Britive's integrations with Slack and the Britive CLI let engineers request, approve, and check out access without leaving their existing tools. The checkout takes seconds. That is what produces 4,000 checkouts per week at Marqeta, not policy mandates.
Coverage for What Comes Next
Marqeta's roadmap includes extending JIT enforcement to Kubernetes clusters and on-premises databases, and expanding agentic AI identity governance as AI agents mature in production. The Britive architecture covers all of it under the same platform. Marqeta was looking for a solution that did not require revisiting the platform decision within 18 months as hybrid and AI identity requirements hardened.
"We were not looking for a tool that managed group memberships more efficiently. We were looking for a platform that removed standing privilege from the equation. That required direct integration at the target system level, not another proxy layer on top of what we already had."
Chetan Jha, Head of Identity and Vulnerability Management, Marqeta
REQUEST A DEMOREQUEST A DEMO
Deployment: August through October 2025
The full deployment, covering migration off the prior platform, onboarding of over 1,600 users, and live JIT coverage across AWS, Okta, Salesforce, and Snowflake, was completed in approximately three months.
Deployment: August through October 2025
The full deployment, covering migration off the prior platform, onboarding of over 1,600 users, and live JIT coverage across AWS, Okta, Salesforce, and Snowflake, was completed in approximately three months.
Terraform Pipeline Integration
Marqeta operates a sophisticated infrastructure-as-code environment built around a complex internal Terraform data structure. Britive's implementation team worked with Marqeta's engineers to map existing Terraform constructs to Britive's profile model, enabling automated provisioning and deprovisioning through the same pipeline the engineering team already used. Existing IaC workflows were preserved rather than replaced.
PagerDuty Integration — Custom Integration Delivered in Four Weeks
Marqeta required that on-call engineers in PagerDuty receive automatic checkout approval for elevated access during active incidents. This capability did not exist in Britive at the start of the engagement. Britive's product and engineering teams built and delivered the full integration within four weeks to meet Marqeta's go-live date. The PagerDuty integration is now a standard capability available across the Britive platform.
Adoption
At an average of 4,000 profile checkouts per week across 500 active weekly users, engineers at Marqeta check out privileged access approximately eight times per user per week. Checkout volume has grown consistently week over week since go-live. That level of organic, steady usage indicates JIT access has become a routine part of engineering workflows rather than a tool kept around for compliance purposes.
Slack and CLI integrations are central to that adoption rate. Engineers request access from within the tools they already use. Approvals come back in the same Slack channel. On-call engineers receive automatic PagerDuty-backed approvals without opening the Britive UI. The access workflow fits into existing developer practices rather than requiring a separate context switch.
Security and Business Outcomes
Reduced Exposure Window
Replacing group-membership-proxied access with runtime privilege creation at the target system removes the session persistence gap that was the core architectural problem. Privilege does not exist on the target between sessions. When a session ends or a credential is compromised, there is no standing entitlement to exploit. The exposure window for any given checkout is bounded by the 12-hour maximum session duration.
Compliance Evidence Without Recurring Effort
Because every access event generates a checkout record with approvals logged, session durations enforced, and revocations immediate, the audit trail is current at all times without operational effort to maintain it. PCI-DSS access control evidence and SOC 2 Type II access records are produced as a structural output of every engineer checkout rather than assembled before each audit cycle.
Developer Access That Does Not Create a Bottleneck
Marqeta's engineers request, approve, and check out elevated access without leaving Slack or the terminal. On-call engineers reach elevated access in seconds during active incidents. The JIT access model replaced standing privilege without adding process overhead that slowed engineering velocity.