KubeCon + CloudNativeCon in Atlanta, Teleport, the pioneer in Infrastructure Identity, announced expanded support for Amazon Elastic Kubernetes Service (EKS) within its Identity Security product. The new integration provides organizations with unprecedented visibility into Amazon EKS cluster activity, enabling teams to identify shadow access, privilege escalation, and identity-based risks across their managed Kubernetes environments.
Teleport’s enhanced EKS support debuts at KubeCon, where the company will showcase how engineering and security teams can unify access intelligence across AWS and Kubernetes to strengthen Zero Trust architectures.
Bringing identity-aware security to Amazon EKS
The new Amazon EKS integration extends Teleport’s Access Graph and Investigate capabilities to include EKS-specific audit logs, enabling users to visualize who has access to Kubernetes clusters and what actions are being taken, even when access occurs through AWS credentials rather than through Teleport directly.
“Organizations running Amazon EKS have struggled to gain a unified view of access activity across their cloud and Kubernetes layers,” said Ben Arent, Director of Product for Teleport. “By consolidating Amazon EKS audit data into Teleport Identity Security - Identity Activity Center, we help customers expose and eliminate hidden identity risks — from shadow user access to users abusing service accounts — before they become incidents.”
Identity context from AWS IAM
Until now, traditional Kubernetes security tools have focused on enforcing access policies without full visibility into how clusters are being used. While audit trails and session recordings provided some coverage, they couldn’t expose alternative access pathways or unaudited activity in complex cloud environments.
Teleport’s new Amazon EKS Audit Log Integration pulls telemetry from AWS CloudWatch, enriching it with identity context from AWS Identity and Access Management (IAM) and enterprise identity providers. This holistic view lets teams correlate user identities across systems, ensuring that every action in an EKS environment can be tied back to a verified individual.
Benefits for platform and security teams
With EKS Identity Security, teams can now:
- Visualize cluster access paths through the Teleport Access Graph
- Investigate activity across AWS, Teleport Zero-Trust Access and Amazon EKS in a single unified view
- Detect shadow access and identity-based anomalies in real time
- Prove access control enforcement for compliance and audit readiness
The result is simplified compliance, stronger security posture, and improved collaboration between platform engineering and security operations teams.
Availability
The Amazon EKS Identity Security enhancements will be available for on-premises Teleport deployments in November 2025, with Teleport Cloud support following in Q4 as part of minor version update to Teleport 18.