
USE CASES



Replace silos, keys, and secrets with short-lived X.509 certificates tied to actual human and non-human identities.
Govern everything with a central identity and policy model and prevent manual configuration missteps.
Assign per-action, auto-expiry privileges so all AWS access is task-based, governed, and fully auditable.
Managing access across expanding AWS resources and users is time-consuming and complex.

As AWS infrastructure grows, access complexity across multiple instances can increase your attack surface and operational overhead.
Different teams and roles may require different levels of access — difficult to configure and maintain with native tooling alone.
Visibility and governance over who can access what across your AWS infrastructure is foundational to security and compliance.


With Teleport, organizations reduce friction for engineers, harden security with trusted identities and ephemeral, zero trust access, and streamline compliance, enabling organizations to pass audits with flying colors. Teleport eliminates access complexity, enabling engineers to stay focused on time to market instead of juggling credentials, SSH keys, and a myriad of access paths.
Learn how leading organizations implement zero trust access in their AWS environments.
No more passwords, access silos, or hidden access risks. Teleport delivers on-demand, least privileged infrastructure access to AWS services like AWS Identity Center, EC2, S3, RDS, and EKS.

Unified access control allows discovery and instant access to all layers of your tech stack, including AWS resources. Passwordless authentication grants users ephemeral access to all the resources they need, eliminating the risks and management burden associated with credentials and standing privileges.
Enforce the principle of least privileged access and remove super-privileged accounts. Govern identities with nested access lists, access monitoring and response, access requests and reviews, and attribute-based authentication.
Record sessions, file system changes, data transfers, command executions, and other security events across all environments to a structured audit log — making it easy to see what’s happening and who is responsible.
Define and control who can provision AWS resources and who can access them. Teleport delivers fine-grained, role-based access controls designed to eliminate unauthorized access and prevent the creation of AWS resources without proper permissions.

If a defined role (such as an engineer) needs to provision new AWS resources, Teleport can grant temporary elevated access that automatically expires to eliminate standing privilege risks.
Teleport secures infrastructure access for AWS Management Console and CLI. By integrating directly with AWS Identity Center, Teleport simplifies access control across multiple AWS accounts.
Teleport ensures all AWS Management Console activity is logged in CloudTrail for complete visibility into access and behavior.
Teleport enables you to provide fine-grained, identity-based access across your AWS infrastructure, including resources like Linux and Windows EC2 instances, RDS, Redshift and Aurora databases, EKS clusters, and CI/CD systems — even dashboards like Grafana and Kibana. Teleport runs on AWS, so whether you use our hosted control plane, or self-host on AWS, you get the same integrated experience.

Streamline access for EC2. New instances can be configured to automatically join your Teleport cluster. Supports Linux and Windows.
Get table-level controls for your databases running on AWS and complete visibility into the queries your team are running.
Specify separate permissions for Kubernetes pods running on EKS and those on the underlying EC2 instance.


Delight your engineers. Protect your infrastructure.
Tech Paper
Find out how to use Teleport’s secure infrastructure access platform as the centralized window and the single entry point for consuming AWS internal and external services
Teleport Blog
Discover best practices for addressing cloud challenges like infrastructure sprawl, lack of granular controls, and limited access visibility.
Teleport Academy
Explore the importance of temporary elevated access, its benefits, and how to implement it effectively within your AWS account.