Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best Practices for Secretless Engineering Automation

A CI/CD pipeline deploying to production. A nightly database backup job. An AI agent performing maintenance tasks. New opportunities for engineering automation emerge every day. However, many of these workflows depend on stored secrets like hardcoded credentials, API keys, and long-lived tokens for privileged access.

Teleport Updates its Release Process

We are reducing the number of supported major versions of Teleport from three to two. We are extending the support for each major version to 24 months. New major versions will come out once per year in August. The most recent major version of Teleport, referred to as the Current Version, is the only major version of Teleport that will receive new features. The previous major version, referred to as the Stable Version, will only receive bug fixes and security patches.

Investigate Amazon EKS Audit Logs with Teleport Identity Security

In Teleport 18, we’ve added official support to import Amazon EKS Audit Logs into Teleport Identity Security. This capability allows teams to have visibility into actions performed on Amazon EKS clusters when those actions were not executed via Teleport. Amazon EKS Audit Logs in Teleport Identity Security will be generally available in Teleport 18.3, coming November 2025. Your browser does not support the video tag.