The 2026 Infrastructure Identity Survey: State of AI Adoption
Read Survey
Teleport logoGet a Demo
Background image

TELEPORT & AWS

AWS Zero Trust for Human & AI Access

Unify fragmented identities across AWS and multi-cloud. Replace IAM keys, VPNs, and secrets with cryptographic identity, just-in-time (JIT) access, and full audit trails. Enforce least privileged access across every engineer, workload, and AI agent.

Trusted by Market Leaders

One identity model for all AWS users and automation
 

Complexity and fragmented identity fuel breaches. Teleport unifies governance across every human, machine, and AI action in your infrastructure,  consolidates fragmented identity silos  and replaces a patchwork of manual workflows. 
 

Minimize your attack surface, simplify audits, and accelerate engineering velocity with resilient infrastructure that’s ready to scale alongside your AI investments.
 

Bind actions to real identity


Replace silos, keys, and secrets with short-lived X.509 certificates tied to actual human and non-human identities.

Prevent human and AI errors


Govern everything with a central identity and policy model and prevent manual configuration missteps.

Make just-in-time the default


Assign per-action, auto-expiry privileges so all AWS access is task-based, governed, and fully auditable.

Background image

Secure AI & modern infrastructure at scale

Teleport integrates natively with AWS to establish a certificate-backed identity layer across clouds and infrastructure. Simplify governance, eliminate inconsistencies, and enforce zero trust across AWS, AI, on-prem, and everywhere else you run.

Unified AI governance

Govern all MCP-based or AI-initiated actions by extending the same identity, access, and audit policies used for engineers, CI/CD jobs, and services.

Learn how to secure AI with Teleport & AWS →

Zero standing privileges

Ensure AWS least privileged access at all times with automated task-based access, short-lived authorization, and full identity traceability in-and-out of your AWS ecosystem.

Learn how to accelerate AWS with JIT →

Access with identity, not keys

Get direct, VPN-less access to infrastructure like SSH, EKS, EC2, RDS, and Aurora using IAM role assumptions and ephemeral certificates. Surface and eliminate unmanaged keys and secrets in seconds.

Learn how to access AWS without passwords →

One source of truth

Collect, manage and govern events generated by humans, machines, workloads, and AI identities across all infrastructure to accelerate investigations and simplify audits.

Learn how to simplify AWS compliance →

How It Works

1. Connect

Deploy Teleport in your AWS account to auto‑discover EKS clusters, EC2 instances, and RDS/Aurora databases.

2. Authenticate

Users and services authenticate via SSO. Teleport issues short‑lived certificates via IAM join, Roles Anywhere, or KMS to eliminate passwords and API keys.

3. Audit & scale

All activity is recorded with full identity context and reporting is ready to export to CloudTrail, S3, or your SIEM. Policies extend effortlessly to all new regions, accounts, and workloads.

15hrs saved per week

Average amount of manual time saved per security team member

10x faster provisioning

Reported improvements to access provisioning and deprovisioning

<5 minute response time

Measured response time to access-related threats

  • With Teleport, we were even able to close the Kubernetes API without losing access for our engineers or automation tools. That alone was a huge win.

    Olga Daminova, Infrastructure Security Engineer, Rush Street Interactive

Customer story: Secure human and machine access

Rush Street Interactive uses Teleport to secure human and machine access to EC2 and EKS clusters to earn: 3× faster employee access provisioning, 2× faster access request handling, and Zero open SSH ports or static keys.

Additional Resources

Tech Paper

Implementing Zero Trust Security for AWS Infrastructure

Find out how to use Teleport’s secure infrastructure access platform as the centralized window and the single entry point for consuming AWS internal and external services

Teleport Blog

Simplify and Secure AWS Access to Accelerate Outcomes: 3 Best Practices

Discover best practices for addressing cloud challenges like infrastructure sprawl, lack of granular controls, and limited access visibility.

Teleport Academy

Temporary Elevated Access Management: Secure Your AWS Cloud

Explore the importance of temporary elevated access, its benefits, and how to implement it effectively within your AWS account.

Background image

Ready to get started?

Delight your engineers. Protect your infrastructure.