At KubeCon + CloudNativeCon in Atlanta, Teleport has unveiled expanded support for Amazon Elastic Kubernetes Service (EKS) within its Identity Security offerings.
This integration enhances organisational visibility into EKS cluster activity, allowing teams to detect shadow access, privilege escalation, and identity-related risks in managed Kubernetes environments.
Introduction at KubeCon
Teleport's latest EKS integration, given at KubeCon, shows how engineering and security teams can merge
Teleport's latest EKS integration, presented at KubeCon, demonstrates how engineering and security teams can merge access intelligence for AWS and Kubernetes, fostering stronger Zero Trust frameworks.
The advanced integration extends the capabilities of Teleport's Access Graph and Investigate features by including EKS-specific audit logs. This advancement enables visualisation of Kubernetes cluster access and actions, even when access is obtained through AWS credentials instead of directly through Teleport.
Enhancing identity security for EKS
“Organisations utilising Amazon EKS have found it challenging to achieve a consistent view of access activities across their cloud and Kubernetes layers,” expressed Ben Arent, Director of Product for Teleport.
By consolidating Amazon EKS audit information into Teleport Identity Security's Identity Activity Centre, hidden identity risks, such as shadow user access and misuse of service accounts, can be addressed before they lead to security incidents.
Integrating identity context from AWS IAM
Traditional Kubernetes security tools have typically been limited to enforcing access policies
Traditional Kubernetes security tools have typically been limited to implementing access policies and have lacked comprehensive insight into cluster usage.
Teleport’s Amazon EKS Audit Log Integration, sourcing telemetry from AWS CloudWatch and enhancing it with identity context from AWS Identity and Access Management (IAM), offers an all-encompassing view. This approach allows teams to consistently link user identities to actions within EKS environments.
Advantages for platform and security teams
With EKS Identity Security, teams are enabled to:
- Visualise cluster access paths using the Teleport Access Graph
- Investigate activities across AWS, Teleport Zero-Trust Access, and Amazon EKS from a single interface
- Identify shadow access and identity-based anomalies in real-time
- Confirm enforcement of access control for compliance and audit purposes
The integration promises to simplify compliance tasks, enhance security posture, and facilitate collaboration between platform engineering and security operations teams.
Future availability
The enhancements to Amazon EKS Identity Security are scheduled to be available for on-premises Teleport deployments in November 2025.
Support for Teleport Cloud is anticipated in the fourth quarter as part of a minor version update to Teleport 18.
Learn why leading casinos are upgrading to smarter, faster, and more compliant systems
