The 2026 Infrastructure Identity Survey: State of AI Adoption
Read Survey
Teleport logoGet a Demo
Background image

USE CASES

Simplify & Secure Access to AWS Infrastructure

Improve visibility and control over who can provision and access your critical AWS resources.
Hero section image

Trusted by Market Leaders

Bind actions to real identity


Replace silos, keys, and secrets with short-lived X.509 certificates tied to actual human and non-human identities.

Prevent human and AI errors


Govern everything with a central identity and policy model and prevent manual configuration missteps.

Make just-in-time the default


Assign per-action, auto-expiry privileges so all AWS access is task-based, governed, and fully auditable.

Unique challenges faced by AWS customers

Managing access across expanding AWS resources and users is time-consuming and complex.

Infrastructure sprawl

As AWS infrastructure grows, access complexity across multiple instances can increase your attack surface and operational overhead.

Granular access control

Different teams and roles may require different levels of access — difficult to configure and maintain with native tooling alone.

Visibility and compliance

Visibility and governance over who can access what across your AWS infrastructure is foundational to security and compliance.

Background image
Background image

Why AWS customers trust Teleport

With Teleport, organizations reduce friction for engineers, harden security with trusted identities and ephemeral, zero trust access, and streamline compliance, enabling organizations to pass audits with flying colors. Teleport eliminates access complexity, enabling engineers to stay focused on time to market instead of juggling credentials, SSH keys, and a myriad of access paths.

Learn how leading organizations implement zero trust access in their AWS environments.

Modernize AWS infrastructure access

No more passwords, access silos, or hidden access risks. Teleport delivers on-demand, least privileged infrastructure access to AWS services like AWS Identity Center, EC2, S3, RDS, and EKS.

Improve engineer productivity

Unified access control allows discovery and instant access to all layers of your tech stack, including AWS resources. Passwordless authentication grants users ephemeral access to all the resources they need, eliminating the risks and management burden associated with credentials and standing privileges.

Protect against identity-based attacks

Enforce the principle of least privileged access and remove super-privileged accounts. Govern identities with nested access lists, access monitoring and response, access requests and reviews, and attribute-based authentication.

Streamline compliance

Record sessions, file system changes, data transfers, command executions, and other security events across all environments to a structured audit log — making it easy to see what’s happening and who is responsible.

Easily control AWS access and provisioning

Define and control who can provision AWS resources and who can access them. Teleport delivers fine-grained, role-based access controls designed to eliminate unauthorized access and prevent the creation of AWS resources without proper permissions.

Just-in-time elevated access

If a defined role (such as an engineer) needs to provision new AWS resources, Teleport can grant temporary elevated access that automatically expires to eliminate standing privilege risks.

Simplified AWS control

Teleport secures infrastructure access for AWS Management Console and CLI. By integrating directly with AWS Identity Center, Teleport simplifies access control across multiple AWS accounts.

Complete audit trails

Teleport ensures all AWS Management Console activity is logged in CloudTrail for complete visibility into access and behavior.

Benefit from deep AWS integrations

Teleport enables you to provide fine-grained, identity-based access across your AWS infrastructure, including resources like Linux and Windows EC2 instances, RDS, Redshift and Aurora databases, EKS clusters, and CI/CD systems — even dashboards like Grafana and Kibana. Teleport runs on AWS, so whether you use our hosted control plane, or self-host on AWS, you get the same integrated experience.

Amazon EC2

Streamline access for EC2. New instances can be configured to automatically join your Teleport cluster. Supports Linux and Windows.

Amazon RDS, Redshift, and Aurora

Get table-level controls for your databases running on AWS and complete visibility into the queries your team are running.

Amazon EKS

Specify separate permissions for Kubernetes pods running on EKS and those on the underlying EC2 instance.

Zero trust security across AWS infrastructure

Scale infrastructure access security from on-premises to the cloud

Download this tech paper to learn more about Teleport’s tight integration with AWS, and how it simplifies the implementation of zero trust in the cloud. Discover how Teleport’s secure infrastructure access platform can become the centralized window and the single entry point for consuming AWS internal and external services.
Hero section image
Background image

Ready to get started?

Delight your engineers. Protect your infrastructure.

Additional Resources

Tech Paper

Implementing Zero Trust Security for AWS Infrastructure

Find out how to use Teleport’s secure infrastructure access platform as the centralized window and the single entry point for consuming AWS internal and external services

Teleport Blog

Simplify and Secure AWS Access to Accelerate Outcomes: 3 Best Practices

Discover best practices for addressing cloud challenges like infrastructure sprawl, lack of granular controls, and limited access visibility.

Teleport Academy

Temporary Elevated Access Management: Secure Your AWS Cloud

Explore the importance of temporary elevated access, its benefits, and how to implement it effectively within your AWS account.