Teleport Unified Access Plane
Audit Logging
Restricting access and granting specific permissions through role-based access controls is the first step to securing your infrastructure. The next step is to log all activity across your infrastructure. Learn more about audit logging for SSH and Kubernetes.
