Summary is AI-generated, newsdesk-reviewed
  • Teleport enhances identity security with Amazon EKS support, boosting visibility in Kubernetes environments.
  • Integration allows teams to identify shadow access and privilege risks in Amazon EKS clusters.
  • EKS Identity Security offers real-time anomaly detection, simplifying compliance and enforcing access control.

Teleport has announced an expansion of its Identity Security product to include enhanced support for the Amazon Elastic Kubernetes Service (EKS).

Unveiled at KubeCon + CloudNativeCon in Atlanta, this integration offers organizations increased visibility into EKS cluster activities, crucial for identifying issues such as shadow access and privilege escalation within managed Kubernetes environments.

Enhanced Security for Amazon EKS

The enriched EKS support will be showcased by Teleport at KubeCon, emphasizing how engineering and security teams can unify access intelligence across AWS and Kubernetes to bolster Zero Trust security architectures.

This new integration enhances Teleport’s Access Graph and Investigate capabilities by incorporating EKS-specific audit logs. As a result, users can visualize Kubernetes cluster access and actions, even when AWS credentials, rather than Teleport, are used.

Organizations running Amazon EKS have struggled to gain a unified view of access activity across their cloud and Kubernetes layers,” said Ben Arent, Director of Product for Teleport. “By consolidating Amazon EKS audit data into Teleport Identity Security - Identity Activity Center, we help customers expose and eliminate hidden identity risks — from shadow user access to users abusing service accounts — before they become incidents.”

Integrating AWS IAM for Comprehensive Visibility

Kubernetes security tools emphasized policy enforcement without providing full insight into cluster usage

Previously, Kubernetes security tools emphasized policy enforcement without providing full insight into cluster usage. Traditional audit trails and session recordings fell short in uncovering alternative access pathways within complex cloud environments.

The new Amazon EKS Audit Log Integration by Teleport enriches AWS CloudWatch telemetry with identity information from AWS Identity and Access Management (IAM) and enterprise identity providers. This integration allows for detailed correlation of user identities across systems, ensuring EKS environment actions can be tracked to verified individuals.

Advantages for Platform and Security Teams

The EKS Identity Security enhancements offer platform and security teams the ability to:

  • Visualize cluster access routes using the Teleport Access Graph
  • Investigate activities across AWS, Teleport Zero-Trust Access, and Amazon EKS via a unified interface
  • Detect shadow access and identity-based anomalies in real time
  • Demonstrate access control enforcement for compliance and audit readiness

These features lead to streamlined compliance, a strengthened security stance, and enhanced collaboration between platform engineering and security operations teams.

Availability Timeline

The enhanced security features for Amazon EKS will be available for on-premises Teleport deployments starting in November 2025.

Support for Teleport Cloud will follow in the fourth quarter, as part of a minor version update to Teleport 18.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...