
COMPLIANCE
Teleport helps DoD components, defense contractors, and federal systems integrators meet the DoD Zero Trust Strategy's FY27 Target Level by establishing a unified identity layer across humans, machines, workloads, and AI agents. Cryptographic identities, per-session MFA, device trust, and identity-traceable audit logs map directly to capabilities across the User, Device, Application & Workload, and Visibility & Analytics pillars.

Pillar 1: User Identification and Access Management | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Account Management, Identity Verification | IA-2, AC-02 |
| ||||
Pillar 2: Device Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
System Monitoring, Continuous Monitoring, Device Authentication | SI-4, CA-7, IA-3 |
| ||||
Pillar 3: Network Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Remote Access, Boundary Protection | AC-17, SC-7 |
| ||||
Pillar 4: Application Workload Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Access Enforcement, Least Privilege Enforcement, Software/Information Integrity | AC-3, AC-6, SI-7 |
| ||||
Pillar 5: Data Security | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Mobile Device Access, Control Protection of Data at Rest | AC-19, SC-28 |
| ||||
Pillar 6: Visibility and Analytics | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Audit Events, Audit Review and Analysis | AU-2, AU-6 |
| ||||
Pillar 7: Automation and Orchestration | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Continuous Monitoring, Incident Handling | CA-7, IR-4 |
| ||||
Privileged Access Management (PAM) Modernization | ||||||
|---|---|---|---|---|---|---|
Aligned NIST 800-53 Control(s) | ID | Teleport Capability | ||||
Separation of Duties, Least Privilege | AC-5, AC-6 |
| ||||
Download this white paper to learn how to achieve compliance with the Department of Defense’s (DoD) Zero Trust strategy and the NIST 800-53 controls designed to align organizations with federal requirements.
Discover how Teleport can help secure critical systems, enforce access policies, and support continuous monitoring and reporting to simplify Zero Trust.
