Published: Nov 15, 2018

How Teleport Delivers Security Best Practices for Privileged Access Management of Cloud and Edge Infrastructure

by Teleport

While SSH has always been a popular attack vector, the increased adoption of elastic, cloud infrastructure and dynamic, micro-service architecture using containerized application services (aka, “cloud-native” applications), has resulted in the additional complexity of having application services that can migrate across dynamic server infrastructure. This makes managing access to applications and their infrastructure through SSH more complicated and more prone to security threats.

In addition, organizations are increasingly adopting a hybrid infrastructure strategy of using one or more third-party cloud providers, in addition to on-premises or collocated data centers.

All of this results in CSOs and their staff having to deliver on the difficult mandate of securing their company infrastructure while minimizing the disruption to existing developer and DevOps workflows. In this paper, we will go through how Teleport delivers security best practices for modern Privileged Access Management.

Share this page

Try Teleport today

In the cloud, self-hosted, or open source

View developer docs

This site uses cookies to improve service. By using this site, you agree to our use of cookies. More info.