Summary is AI-generated, newsdesk-reviewed
  • Teleport enhances Amazon EKS support for Zero Trust architectures at KubeCon.
  • New integration provides visibility into EKS activity, uncovering shadow access and privilege escalation.
  • EKS Audit Log Integration enriches data with AWS IAM, offering holistic identity security insights.

At KubeCon + CloudNativeCon in Atlanta, Teleport has unveiled expanded support for Amazon Elastic Kubernetes Service (EKS) within its Identity Security offerings.

This integration enhances organisational visibility into EKS cluster activity, allowing teams to detect shadow access, privilege escalation, and identity-related risks in managed Kubernetes environments.

Introduction at KubeCon

Teleport's latest EKS integration, given at KubeCon, shows how engineering and security teams can merge

Teleport's latest EKS integration, presented at KubeCon, demonstrates how engineering and security teams can merge access intelligence for AWS and Kubernetes, fostering stronger Zero Trust frameworks.

The advanced integration extends the capabilities of Teleport's Access Graph and Investigate features by including EKS-specific audit logs. This advancement enables visualisation of Kubernetes cluster access and actions, even when access is obtained through AWS credentials instead of directly through Teleport.

Enhancing identity security for EKS

Organisations utilising Amazon EKS have found it challenging to achieve a consistent view of access activities across their cloud and Kubernetes layers,” expressed Ben Arent, Director of Product for Teleport.

By consolidating Amazon EKS audit information into Teleport Identity Security's Identity Activity Centre, hidden identity risks, such as shadow user access and misuse of service accounts, can be addressed before they lead to security incidents.

Integrating identity context from AWS IAM

Traditional Kubernetes security tools have typically been limited to enforcing access policies

Traditional Kubernetes security tools have typically been limited to implementing access policies and have lacked comprehensive insight into cluster usage.

Teleport’s Amazon EKS Audit Log Integration, sourcing telemetry from AWS CloudWatch and enhancing it with identity context from AWS Identity and Access Management (IAM), offers an all-encompassing view. This approach allows teams to consistently link user identities to actions within EKS environments.

Advantages for platform and security teams

With EKS Identity Security, teams are enabled to:

  • Visualise cluster access paths using the Teleport Access Graph
  • Investigate activities across AWS, Teleport Zero-Trust Access, and Amazon EKS from a single interface
  • Identify shadow access and identity-based anomalies in real-time
  • Confirm enforcement of access control for compliance and audit purposes

The integration promises to simplify compliance tasks, enhance security posture, and facilitate collaboration between platform engineering and security operations teams.

Future availability

The enhancements to Amazon EKS Identity Security are scheduled to be available for on-premises Teleport deployments in November 2025.

Support for Teleport Cloud is anticipated in the fourth quarter as part of a minor version update to Teleport 18.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...