SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Teleport Expands EKS Support For Identity Security

12 Nov 2025

Teleport Expands EKS Support For Identity Security
Contact company
Contact Teleport
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Teleport enhances identity security with Amazon EKS support, boosting visibility in Kubernetes environments.
  • Integration allows teams to identify shadow access and privilege risks in Amazon EKS clusters.
  • EKS Identity Security offers real-time anomaly detection, simplifying compliance and enforcing access control.
Related Links
  • Teleport's Infrastructure Platform Secures AI

Teleport has announced an expansion of its Identity Security product to include enhanced support for the Amazon Elastic Kubernetes Service (EKS).

Unveiled at KubeCon + CloudNativeCon in Atlanta, this integration offers organizations increased visibility into EKS cluster activities, crucial for identifying issues such as shadow access and privilege escalation within managed Kubernetes environments.

Enhanced Security for Amazon EKS

The enriched EKS support will be showcased by Teleport at KubeCon, emphasizing how engineering and security teams can unify access intelligence across AWS and Kubernetes to bolster Zero Trust security architectures.

This new integration enhances Teleport’s Access Graph and Investigate capabilities by incorporating EKS-specific audit logs. As a result, users can visualize Kubernetes cluster access and actions, even when AWS credentials, rather than Teleport, are used.

“Organizations running Amazon EKS have struggled to gain a unified view of access activity across their cloud and Kubernetes layers,” said Ben Arent, Director of Product for Teleport. “By consolidating Amazon EKS audit data into Teleport Identity Security - Identity Activity Center, we help customers expose and eliminate hidden identity risks — from shadow user access to users abusing service accounts — before they become incidents.”

Integrating AWS IAM for Comprehensive Visibility

Kubernetes security tools emphasized policy enforcement without providing full insight into cluster usage

Previously, Kubernetes security tools emphasized policy enforcement without providing full insight into cluster usage. Traditional audit trails and session recordings fell short in uncovering alternative access pathways within complex cloud environments.

The new Amazon EKS Audit Log Integration by Teleport enriches AWS CloudWatch telemetry with identity information from AWS Identity and Access Management (IAM) and enterprise identity providers. This integration allows for detailed correlation of user identities across systems, ensuring EKS environment actions can be tracked to verified individuals.

Advantages for Platform and Security Teams

The EKS Identity Security enhancements offer platform and security teams the ability to:

  • Visualize cluster access routes using the Teleport Access Graph
  • Investigate activities across AWS, Teleport Zero-Trust Access, and Amazon EKS via a unified interface
  • Detect shadow access and identity-based anomalies in real time
  • Demonstrate access control enforcement for compliance and audit readiness

These features lead to streamlined compliance, a strengthened security stance, and enhanced collaboration between platform engineering and security operations teams.

Availability Timeline

The enhanced security features for Amazon EKS will be available for on-premises Teleport deployments starting in November 2025.

Support for Teleport Cloud will follow in the fourth quarter, as part of a minor version update to Teleport 18.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Show full press release

KubeCon + CloudNativeCon in Atlanta, Teleport, the pioneer in Infrastructure Identity, announced expanded support for Amazon Elastic Kubernetes Service (EKS) within its Identity Security product. The new integration provides organizations with unprecedented visibility into Amazon EKS cluster activity, enabling teams to identify shadow access, privilege escalation, and identity-based risks across their managed Kubernetes environments.

Teleport’s enhanced EKS support debuts at KubeCon, where the company will showcase how engineering and security teams can unify access intelligence across AWS and Kubernetes to strengthen Zero Trust architectures.

Bringing identity-aware security to Amazon EKS

The new Amazon EKS integration extends Teleport’s Access Graph and Investigate capabilities to include EKS-specific audit logs, enabling users to visualize who has access to Kubernetes clusters and what actions are being taken, even when access occurs through AWS credentials rather than through Teleport directly.

“Organizations running Amazon EKS have struggled to gain a unified view of access activity across their cloud and Kubernetes layers,” said Ben Arent, Director of Product for Teleport. “By consolidating Amazon EKS audit data into Teleport Identity Security - Identity Activity Center, we help customers expose and eliminate hidden identity risks — from shadow user access to users abusing service accounts — before they become incidents.”

Identity context from AWS IAM

Until now, traditional Kubernetes security tools have focused on enforcing access policies without full visibility into how clusters are being used. While audit trails and session recordings provided some coverage, they couldn’t expose alternative access pathways or unaudited activity in complex cloud environments.

Teleport’s new Amazon EKS Audit Log Integration pulls telemetry from AWS CloudWatch, enriching it with identity context from AWS Identity and Access Management (IAM) and enterprise identity providers. This holistic view lets teams correlate user identities across systems, ensuring that every action in an EKS environment can be tied back to a verified individual.

Benefits for platform and security teams

With EKS Identity Security, teams can now:

  • Visualize cluster access paths through the Teleport Access Graph
  • Investigate activity across AWS, Teleport Zero-Trust Access and Amazon EKS in a single unified view
  • Detect shadow access and identity-based anomalies in real time
  • Prove access control enforcement for compliance and audit readiness

The result is simplified compliance, stronger security posture, and improved collaboration between platform engineering and security operations teams.

Availability

The Amazon EKS Identity Security enhancements will be available for on-premises Teleport deployments in November 2025, with Teleport Cloud support following in Q4 as part of minor version update to Teleport 18.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Identity management
  • Cyber security
  • Cloud security
  • Related links
  • KubeCon + CloudNativeCon 2025
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Barricades
  • Barriers
Related white papers
Milestone Cloud Deployment Guide

Milestone Cloud Deployment Guide

Download
Maximizing Enterprise Security Systems In The Cloud

Maximizing Enterprise Security Systems In The Cloud

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

DigiCert's 2026 Security Predictions: AI & Quantum

DigiCert's 2026 Security Predictions: AI & Quantum

Zimperium's ClayRat Spyware: New Android Threats

Zimperium's ClayRat Spyware: New Android Threats

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Events news
About this page

Enhance Amazon EKS security with Teleport’s Identity Security, offering visibility into Kubernetes clusters, detecting shadow access and identity risks, ideal for decision-makers in physical security.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec