Cloudanix Joins AWS ISV Accelerate Program
Back to Changelog
new release May 19, 2026

GenAI Security: JIT for Coding Agents and Insights Dashboard

We have been busy and our agents have been busier. Story of every team, every organization. Last few months we took a deep dive into GenAI security and now ready to share several updates along those paths. Here’s one to begin with.

The Shift Left Of GenAI Era

Cloudanix JIT (used by humans) has been a cornerstone in our CNAPP+ platform. While traditional CNAPP focused largely on Posture and Runtime, we extended our security offering to including Just In Time access for Cloud Console, Databases, VM, Kubernetes, SaaS applications. Largely used by Humans.

But with Cursor, Claude, Kiro, Whisper Flow and other GenAI coding tech stack making their way up into our SDLC lifecycles, it is clear that we need to put a access guardrail around them too.

Why this is important?

What you don’t want is your team member using any of Agentic coding platform start to share their access keys, database connection strings, API tokens and asking these platform to connect to the end systems. Instead you want a JIT layer in between which understands the context and works on behalf of the user (human) and provides minimal, contextual, audit logged access to these agents. After all access is what empowers us, isn’t it?

With Cloudanix Agentic JIT, developers can now safely delegate infrastructure tasks to AI coding assistants without exposing permanent credentials. The system:

  • Understands context - Analyzes what the agent needs to accomplish
  • Grants minimal access - Provides only the permissions required for the specific task
  • Time-bound sessions - Automatically revokes access after the task completes
  • Full audit trail - Logs every action taken by the agent for compliance and security review
  • Works on behalf of users - Maintains human accountability while enabling agent autonomy

This extends our Just In Time Access capabilities from human users to the GenAI agents that are becoming integral to modern development workflows.

Give Claude the job. Not the keys. - Cloudanix Agentic JIT for secure AI coding assistant access

Coding Agent JIT - Powered by Cloudanix Agentic JIT


Insights

Our graph database has a lot of information which we share with you. To make consumption easier and to give you a head start we have been building “Insights” feature which is now available across various areas including the main Dashboard, Code, Misconfig and others. These are datasets finding the highest quality signal which your team should take a look at and act. So instead of you searching for what’s next, we present to you a game plan.

The new Insights feature transforms how you consume security data:

  • Curated intelligence - Automatically surfaces the most critical findings from your security graph
  • Actionable priorities - Presents a clear game plan instead of overwhelming data
  • Context-aware - Available across Dashboard, Code Security, Misconfigurations, and more
  • High-quality signals - Filters noise to show what truly matters for your team

We will be investing more in this area in coming months.

Cloudanix Insights Dashboard showing security metrics and trends

Insights Dashboard - High-quality security signals at a glance


Cloudanix Resources


The future of secure development is here - Where AI agents work alongside humans with the right guardrails in place.

Ready to see your graph?

Connect a cloud account in under 30 minutes. See every finding rooted in identity, asset, and blast radius — with a fix path attached.

Book a Demo

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, May 19, 2026

Top 10 CNAPP Tools in 2026: Complete Guide

What is CNAPP and why is it Important? A Cloud-Native Application Protection Platform (CNAPP) is a

Read More

Wednesday, Apr 29, 2026

Code Security Best Practices for DevSecOps Teams in 2026

In 2026, the speed of software development has reached a point where traditional security methods can no longer keep up.

Read More

Wednesday, Apr 29, 2026

Integrating Security into Every Stage: A Blueprint for Secure Software Development

The escalating frequency and severity of software vulnerabilities exploited in the wild forced a paradigm shift in how a

Read More