How Teleport Delivers Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure
While SSH has always been a popular attack vector, the increased adoption of elastic, cloud infrastructure and dynamic, micro-service architecture using containerized application services (aka, “cloud-native” applications), has resulted in the additional complexity of having application services that can migrate across dynamic server infrastructure. This makes managing access to applications and their infrastructure through SSH more complicated and more prone to security threats.
In addition, organizations are increasingly adopting a hybrid infrastructure strategy of using one or more third-party cloud providers, in addition to on-premises or collocated data centers.
All of this results in CSOs and their staff having to deliver on the difficult mandate of securing their company infrastructure while minimizing the disruption to existing developer and DevOps workflows. In this paper, we will go through how Teleport delivers security best practices for modern Privileged Access Management.