Teleport Access Plane

Teleport Resource Center

A collection of helpful resources that include tech papers, webinars, tutorials, and more.
title image

FILTER BY

Identity-Based Data Security on AWS

WEBINAR

Identity-Based Data Security on AWS

Teleport CEO Ev Kontsevoy and Open Raven CEO Dave Cole present a practical view of modern data security.

Lessons From Billions of Breached Records

WEBINAR

Lessons From Billions of Breached Records

Lessons From Billions of Breached Records with Troy Hunt

Innovation Lessons We Can Learn From Hackers - On Demand

WEBINAR

Innovation Lessons We Can Learn From Hackers - On Demand

Listen to Keren Elazari talk about how we can prepare for security threats by learning from hackers.

What is a BISO? How a BISO can help accelerate Fintech innovation.

PODCAST

What is a BISO? How a BISO can help accelerate Fintech innovation.

The Transcipt of Access Control Podcast with Alyssa Miller of S&P Global.

Teleport 9 Webinar - Machine ID

WEBINAR

Teleport 9 Webinar - Machine ID

Learn about Teleport Machine ID, an easy way for developers to secure machine-to-machine communications based on X.509 and SSH certificates.

Securing CI/CD Podcast with CircleCI CTO Rob Zuber.

PODCAST

Securing CI/CD Podcast with CircleCI CTO Rob Zuber.

How Rob Zuber is helping to secure CI/CD at CircleCI and for it's customers.

Teleport Security Audit 2021

AUDIT REPORT

Teleport Security Audit 2021

Teleport engaged Latacora to perform a security assessment of Teleport 6.2 and 7.0. This report documents their findings.

Zero Trust - Replacing Depth with Logic

WEBINAR

Zero Trust - Replacing Depth with Logic

This Identity & Access Management eSummit 2022 talk shows how Teleport helps organizations ensure identities are safe and hack-proof.

Balancing Security and Agility While Scaling Your Company

WEBINAR

Balancing Security and Agility While Scaling Your Company

Balancing Security and Agility While Scaling Your Company with Michael Coates

Modern Privileged Access Management (PAM) Buyer’s Guide

TECH PAPER

Modern Privileged Access Management (PAM) Buyer’s Guide

This Modern PAM Buyer’s Guide details the questions to ask vendors when evaluating a PAM solution...

Access Control Podcast. Episode 13

PODCAST

Access Control Podcast. Episode 13

An interview with Hisham Alhakimi about Security Compliance & FedRAMP

Securing the Supply Chain

WEBINAR

Securing the Supply Chain

Learn about securing the software supply chain and the function of an SBOM.

How to Protect Your CI/CD Pipeline

WEBINAR

How to Protect Your CI/CD Pipeline

Learn how to protect your CI/CD pipeline so it doesn’t turn into a vulnerability superspreader.

451research: Teleport ‘shifts left’ with cloud-native PAM platform

ANALYST REPORT

451research: Teleport ‘shifts left’ with cloud-native PAM platform

‘Shifting left’ has become a thing in security circles, and addressing the needs of developers is no less true in the privileged access management market. Teleport’s Access Plane combines connectivity, authentication, authorization and auditing functionality into a single PAM platform that could rightly be viewed as ‘Okta for infrastructure.'

Keep Cloud Infrastructure Secure & Compliant

WEBINAR

Keep Cloud Infrastructure Secure & Compliant

Learn the essential elements of secure infrastructure access and how to implement best practices in your environment.

How to Enable Compliance for Database Access

WEBINAR

How to Enable Compliance for Database Access

Learn how to unify access controls for connectivity, authentication, authorization and audit for popular OSS databases.

Securing a World of Physically Capable Computers

WEBINAR

Securing a World of Physically Capable Computers

Securing a World of Physically Capable Computers with Bruce Schneier

Reduce Complexity to Increase Security

WEBINAR

Reduce Complexity to Increase Security

Learn how consolidating the essential elements of infrastructure access into a single platform yields productivity gains and improved security.

MFA Everything

WEBINAR

MFA Everything

Learn what MFA is, why it is critical to use for all access, and strategies for implementing it.

Teleport State of Infrastructure Access and Security Report 2021

TECH PAPER

Teleport State of Infrastructure Access and Security Report 2021

The 2021 State of Infrastructure Access and Security Report seeks to better understand...

Teleport | 3 minute preview

WEBINAR

Teleport | 3 minute preview

This short video shows the basic capabilities of Teleport. The easiest, most secure way to access all your infrastructure.

Teleport | 10 minute demo

WEBINAR

Teleport | 10 minute demo

Teleport is the easiest, most secure way to access all your infrastructure.

Infra-as-Code Not Jira Tickets to Pass Audits

WEBINAR

Infra-as-Code Not Jira Tickets to Pass Audits

Learn how infrastructure-as-code can replace tickets while providing real security benefits.

Sharpen Your Security Skills with Open Source!

WEBINAR

Sharpen Your Security Skills with Open Source!

Teleport, the open source identity-aware access proxy, facilitates secure access to complex computing environments.

Access Control Podcast. Episode 12

PODCAST

Access Control Podcast. Episode 12

Ben Arent interviews LVH, principal and co-founder of security consultancy, Latacora.

Teleport DigitalOcean 1-Click Droplet

TUTORIAL

Teleport DigitalOcean 1-Click Droplet

Sakshyam Shah, in this brief demo, shows you how to protect access to your droplets using Teleport.

Applying Least Privilege in Kubernetes

WEBINAR

Applying Least Privilege in Kubernetes

Jonathon Canada discusses best practices for implementing least privilege and enforcing zero trust principles within Kubernetes clusters.

Access Control Podcast. Episode 11

PODCAST

Access Control Podcast. Episode 11

An interview with the San Francisco FBI Field office on when to work with the FBI.

Access Control Podcast. Episode 10

PODCAST

Access Control Podcast. Episode 10

How Figma protects internal tools using off the shelf AWS services with Max Burkhardt, a security engineer at Figma.

Access Control Podcast. Episode 9

PODCAST

Access Control Podcast. Episode 9

Senior SRE at Carta Mario Loria talks about improving developer productivity and securing Kubernetes.

Access Control Podcast. Episode 8

PODCAST

Access Control Podcast. Episode 8

How to evaluate and secure Kubernetes from a range of possible attacks.

MongoDB Access Webinar

WEBINAR

MongoDB Access Webinar

In this webinar, Roman Tkachenko shows how Teleport Database Access helps provide secure access to MongoDB clusters.

Introducing Teleport Database Access

WEBINAR

Introducing Teleport Database Access

Learn how to approach secure database access at your company and why it’s an essential part of the access plane.

Access Control Podcast. Episode 7

PODCAST

Access Control Podcast. Episode 7

How companies can leverage the power of hacker community with bug bounties with Ben Sadeghipour.

Federating Amazon Redshift Access Using Teleport

TUTORIAL

Federating Amazon Redshift Access Using Teleport

Ben Arent, in this video, shows how to federate Redshift access using Teleport.

Connecting IoT Devices to Teleport

TUTORIAL

Connecting IoT Devices to Teleport

In this video, Ben Arent explains how the Teleport feature called Teleport IoT, or node tunneling, works.

Setting Up PAM Authentication with Teleport

TUTORIAL

Setting Up PAM Authentication with Teleport

Ben Arent provides a quick walkthrough of integrating Teleport's node service with PAM.

Access Control Podcast. Dylan Stamat. How to achieve HIPPA compliance.

PODCAST

Access Control Podcast. Dylan Stamat. How to achieve HIPPA compliance.

Ben Arent chats with Dylan Stamat about how VerticalChange helps startups achieve HIPAA Compliance.

Tokens, TLS and Teleport

WEBINAR

Tokens, TLS and Teleport

In this webinar, Ben Arent and Steven Martin show how to use Tokens to add resources to Teleport.

Securing Access to Fleets of Postgres & MySQL

WEBINAR

Securing Access to Fleets of Postgres & MySQL

Stephen Faig hosts Teleport's Steven Martin who shows how to use open source Teleport to secure access to fleets of Postgres and MySQL.

Access Control Podcast. Episode 5

PODCAST

Access Control Podcast. Episode 5

This episode is a deep dive with Julien Vehent about his book Securing DevOps. Security in the Cloud. We touch on security topics at Mozilla and Google GCP and provide updated advice on securing the cloud since it's publication.

Transferring Files with SCP

TUTORIAL

Transferring Files with SCP

Learn how to transfer files with Teleport SCP in this brief training video.

Teleport Server Access

TUTORIAL

Teleport Server Access

Server Access often involves managing your resources, configuring new clusters, and issuing commands, as covered in this video.

Access Control Podcast. Episode 4

PODCAST

Access Control Podcast. Episode 4

Ben Arent chats with Adam Baldwin about what offensive security means and other security challenges.

Adding Your First Server to Teleport

TUTORIAL

Adding Your First Server to Teleport

Watch a quick walkthrough of how to add your first server to Teleport.

Adding Your First Kubernetes Cluster to Teleport

TUTORIAL

Adding Your First Kubernetes Cluster to Teleport

Ben Arent shows you how to add your first Kubernetes cluster to Teleport.

Adding Your First Database to Teleport

TUTORIAL

Adding Your First Database to Teleport

Ben Arent, in this brief demo, shows you how to add your first database to Teleport.

Adding Your First Application to Teleport

TUTORIAL

Adding Your First Application to Teleport

Ben Arent, in this brief demo, shows you how to add your first application to Teleport.

Hardened Teleport Access

WEBINAR

Hardened Teleport Access

Learn about the two new features released in Teleport 6.1: creating dual & multi authorization rules and enforcing per-session MFA.

Access Control Podcast. Episode 3

PODCAST

Access Control Podcast. Episode 3

Luca Carettoni on the current state of startup security.

Access Control Podcast. Episode 2

PODCAST

Access Control Podcast. Episode 2

Ben Arent and Dave Mangot discuss DevOps best practices and how to achieve them.

Teleport Multi-Factor Authentication

TUTORIAL

Teleport Multi-Factor Authentication

Ben Arent introduces Teleport's additional second-factor authentication.

Access Control Podcast. Episode 1

PODCAST

Access Control Podcast. Episode 1

Ben Arent chats with Donnie Hasseltine about his time working as a CSO at a boutique private equity firm.

Teleport Application Access

WEBINAR

Teleport Application Access

Learn how Teleport Application Access can protect access to web applications, use RBAC, and access protected apps' RESTful APIs.

Teleport Cloud Security Audit 2021

AUDIT REPORT

Teleport Cloud Security Audit 2021

Teleport engaged Doyensec to perform a security assessment of the Teleport Cloud. This report documents their findings.

Using Teleport with OpenSSH

TUTORIAL

Using Teleport with OpenSSH

Learn how to quickly set up Teleport to record and audit all SSH activity.

Using Google Workspace SSO with Teleport

TUTORIAL

Using Google Workspace SSO with Teleport

Configuring Google Workspace to be an SSO provider is covered in this video.

Setting Up Okta SSO with Teleport

TUTORIAL

Setting Up Okta SSO with Teleport

Ben Arent provides a quick walkthrough of how to set up Okta with Teleport.

Teleport Security Audit 2020

AUDIT REPORT

Teleport Security Audit 2020

Teleport engaged Doyensec to perform a security assessment of Teleport 5.0. This report documents their findings.

The Top 10 Hacks of the Past Decade

TECH PAPER

The Top 10 Hacks of the Past Decade

In 1971, when employees booted up their PDP-10 mainframe computers, they found a peculiar message waiting for them at the teletype console...

Secure RBAC/SSO for Kubernetes with Teleport

WEBINAR

Secure RBAC/SSO for Kubernetes with Teleport

Learn how to implement a robust RBAC tied into the corporate SSO/Identity provider using GitHub Teams and open source software.

Top 10 Hacks of The Past Decade

WEBINAR

Top 10 Hacks of The Past Decade

Research on the biggest hacks of the last decade and lessons learned so we don't repeat these same mistakes.

Teleport Cloud Overview and Demo

WEBINAR

Teleport Cloud Overview and Demo

Teleport Cloud provides secure access to SSH servers, Kubernetes clusters and web applications hosted and managed by Teleport Experts.

Teleport Access Plane | Application Access Demo

WEBINAR

Teleport Access Plane | Application Access Demo

Demo and webinar on how to unify secure access to servers, Kubernetes clusters, applications, and databases.

Using Teleport to Secure SSH and Kubernetes Access

WEBINAR

Using Teleport to Secure SSH and Kubernetes Access

In this Open Security Summit 2021 talk, Teleport's Sakshyam Shah shows how Teleport can secure SSH and Kubernetes Access.

Teleport 4.4 SSH Compliance and Visibility

WEBINAR

Teleport 4.4 SSH Compliance and Visibility

What's new in the Teleport 4.4 release and a demo how it enables greater visibility into access and behavior.

iDevNews: RBAC for SSH and Kubernetes Access

WEBINAR

iDevNews: RBAC for SSH and Kubernetes Access

Explanation of how Teleport provides Role Based Access - RBAC- for SSH and Kubernetes environments.

Teleport Access Workflows-Slack & PagerDuty

WEBINAR

Teleport Access Workflows-Slack & PagerDuty

Deep dive and demo on Teleport’s PagerDuty and Slack integrations and Authorization Workflow and Access Workflow API.

Securely Access Compute Resources in Cloud

WEBINAR

Securely Access Compute Resources in Cloud

Infrastructure Security best practices for the cloud and AWS - certificate authorities, are so important, and how to create a more secure infrastructure access process for the cloud.

SSH Access - Industry Best Practices

WEBINAR

SSH Access - Industry Best Practices

How to level up your SSH Access game — keys to certificates, funneling your access through a bastion server, setting up 2-factor authentication.

Secure Developer Access at Decisv

WEBINAR

Secure Developer Access at Decisv

Learn how Decisiv provides secure access and deals with compliance hurdles from DevSecOps Manager Hunter Madison.

Security Access Workflows for SSH using Slack

TUTORIAL

Security Access Workflows for SSH using Slack

Configure Slack with the Access Workflow - requesting access roles; setup integration between Teleport and Slack to provide RBAC requests.

Industry Best Practices for SSH Access

WEBINAR

Industry Best Practices for SSH Access

SSH Access Best Practices discussion and demo with Ev Kontsevoy, joined by Jack Naglieri CEO Panther labs and Gus Luxton from the Teleport team.

GitHub as an SSO provider for SSH and Kubernetes

TUTORIAL

GitHub as an SSO provider for SSH and Kubernetes

This video explains how to configure Github to be a single sign-on (SSO) provider for SSH and Kubernetes access.

Best Practices in Kubernetes Audit Logging

WEBINAR

Best Practices in Kubernetes Audit Logging

Ev Kontsevoy and Andrew Lytvynov discuss Kubernetes audit logs, what they look like in Sumo Logic and benefits using secure access tools - Teleport.

How-to Guide to FedRAMP Compliance for Software-as-a-Service (SaaS) Providers

TECH PAPER

How-to Guide to FedRAMP Compliance for Software-as-a-Service (SaaS) Providers

Growing your SaaS business means bringing on new verticals and selling more to existing customers...

Zero Trust - Separating out Fact from Fiction

WEBINAR

Zero Trust - Separating out Fact from Fiction

DevOps.com discussion on separating the Zero Trust marketing fluff from the practical aspects of Zero Trust and how it impacts your organization.

Teleport 4.3 | Demo and Presentation

WEBINAR

Teleport 4.3 | Demo and Presentation

Watch Gus Luxton discuss Teleport 4.3 showcasing the new UI, API driven approach, and expanded audit capabilities.

Teleport | 5 minute demo

WEBINAR

Teleport | 5 minute demo

Official demo of Teleport, an open-source Linux service for setting up infrastructure access via SSH or Kubernetes.

A Practical Guide to Secure SSH Access

TECH PAPER

A Practical Guide to Secure SSH Access

There’s no denying that Secure Shell Protocol (SSH) is the de facto tool for Linux server adminis...

How Teleport Delivers Security Best Practices for Privileged Access Management

TECH PAPER

How Teleport Delivers Security Best Practices for Privileged Access Management

An overview of how Teleport delivers security best practices necessary for providing secure privi...

Teleport's Guide to Access and Security Trade-Offs

TECH PAPER

Teleport's Guide to Access and Security Trade-Offs

Engineering teams building cloud software are always under pressure to deliver new features, fix ...

Secure Infrastructure Access

TECH PAPER

Secure Infrastructure Access

Technologies build on other technologies to compound growth. It’s no coincidence that of the comp...

Teleport Security Audit 2019

AUDIT REPORT

Teleport Security Audit 2019

Teleport engaged Doyensec to perform a security assessment of Teleport 4.0. This report documents their findings.

Tech Paper: Teleport vs AWS Session Manager

TECH PAPER

Tech Paper: Teleport vs AWS Session Manager

In this paper, we provide a brief description of the AWS SSM Session Manager and how it compares ...

Zero Trust Access Management Best Practices

TECH PAPER

Zero Trust Access Management Best Practices

Tech Paper - Basics of SSH access management and discuss the best practices for managing access to...

Teleport for Privileged Access Management

WEBINAR

Teleport for Privileged Access Management

Demo of Teleport, a privileged access management solution for securing on-premises and multi-cloud environments.

Open Core vs Proprietary SaaS

WEBINAR

Open Core vs Proprietary SaaS

2019 Open Core Summit, comparing Commercial Open Source Software (COSS aka, Open Core Software) to Proprietary SaaS.

Best Practices for Access Control with SSH & Kubernetes

WEBINAR

Best Practices for Access Control with SSH & Kubernetes

In this webinar, we ran through an overview of Teleport, walked through a live demonstration of popular features such as certificate authentication, RBAC, session recording, and Kubernetes access management.

Kubernetes Support Demo

WEBINAR

Kubernetes Support Demo

In this video, we demo Teleport 3.0 and its new support for acting as a privileged access management gateway for Kubernetes.

Docker 101 Workshop

WEBINAR

Docker 101 Workshop

Teleport CTO, Sasha Klizhentas, gives an introduction of Docker and goes through the basic concepts.

Security for Startups

WEBINAR

Security for Startups

Teleport CTO, Sasha Klizhentas, interviews Latacora Principal, LVH, to discuss general infosec advice for startups.

Teleport Security Audit 2018

AUDIT REPORT

Teleport Security Audit 2018

Teleport engaged Cure53 to perform a security assessment of Teleport 2.6. This linked report documents their findings.

Teleport Security Audit 2017

AUDIT REPORT

Teleport Security Audit 2017

Teleport engaged Cure53 to perform the first independent security assessment of Teleport 2.2. This report documents their findings.

Video Overview

WEBINAR

Video Overview

This is a high level overview of Teleport, privileged access management for cloud native infrastructure that doesn't get in the way.

Trusted Clusters in Teleport

WEBINAR

Trusted Clusters in Teleport

In this is a quick 2 minute demo of how to use Teleport to access servers behind firewalls through its Trusted Clusters feature.

Introduction to Teleconsole

WEBINAR

Introduction to Teleconsole

Share your terminal in seconds! A brief overview of how Teleconsole works.

Try Teleport today

In the cloud, self-hosted, or open source
Get StartedView developer docs