Privileged Access Management (PAM) for Kubernetes

Kubernetes is being adopted throughout enterprise IT as the de facto container orchestration service. Along with this adoption, companies are struggling with the “day-two” operational tasks such as managing usage, training users and securing clusters. Securing clusters has become a primary concern as unmanaged access to Kubernetes can lead to critical vulnerabilities throughout an organization’s private infrastructure.

Teleport can be used as a proxy to your Kubernetes clusters in order to secure your infrastructure and improve visibility into access and behavior. It also gives you a single control plane to manage both SSH and Kubernetes access, reducing your operational overhead.

Who can Benefit from Teleport's Kubernetes PAM?

Using Teleport instead of individually-managed authorization and authentication methods means companies can now have a single control plane to manage role-based access control (RBAC) for Kubernetes clusters and clusters of SSH servers for their organization but also for third-party teams. This is useful for:

  • Company-wide compliance teams overseeing multiple infrastructure and engineering groups who use both Kubernetes and SSH.
  • Manage service providers (MSPs) that manage Kubernetes and generic server clusters for clients.
  • Remote support teams from software vendors who wish to manage remote on-site Kubernetes clusters.
  • Internet-of-Things (IoT) edge cloud management from a centralized office.

PAM for Kubernetes Highlights

Teleport was built from the ground up to support highly elastic, cloud-native infrastructure being accessed by multiple teams. Teleport integration with Kubernetes extends Teleport benefits to teams who have adopted Kubernetes-based operations:

  • Unified cluster level permissions. Teleport seamlessly integrates with Kubernetes role based access controls ("RBAC") so you can connect permissions set in your identity manager with permissions for your Kubernetes clusters and these permissions are enforced for SSH access as well. This makes it impossible to "bypass" Kubernetes RBAC via SSH or vice versa.
  • Audit log and session recording. Teleport's strong audit and compliance features apply to Kubernetes clusters as well. Interactive sessions or remote commands launched via kubectl are recorded and can be replayed for compliance, knowledge sharing or root-cause analyses.
  • Federate trust across Kubernetes clusters. Teleport's trusted clusters allows you to configure trust across Kubernetes clusters in order to manage permissions across teams and organizations.
  • A bridge from legacy workflows. Using a single tool like Teleport to manage both SSH access to your servers and to Kubernetes API endpoints allows you to seamlessly support both modern and legacy workflows as your organization transitions to cloud-native operations.

Which Teleport offering is right for you?

Teleport is available through our commercial Enterprise offering or the Community open source software.

Teleport Enterprise

Teleport Enterprise is built around the open-source core to secure critical production infrastructure and meet compliance and audit requirements.

Demo Teleport Enterprise

Teleport Community

Teleport Community provides modern SSH best practices out of the box for managing elastic infrastructure. Open-source software anyone can use for free.

Download Teleport Community

Trusted by Leading Organizations

Some of the largest companies in the world use Gravitational solutions.

This site uses cookies to improve service. By using this site, you agree to our use of cookies. More info.