Cloud infrastructure and access management firm Teleport announced that it is adding a new identity governance and security offering to its identity-native infrastructure access management platform, which is designed to protect enterprises from privileged access cyberattacks.\n\nTeleport identity governance and security, the company said, will help reduce attack response times by providing customers a control plane mapped with every access point and identity used in the organization.\n\n\u201cThe launch of Teleport Identity Governance and Security comes as cloud cyberattack patterns are in a state of flux,\u201d said the company in a press statement. Attackers shifting focus to \u201cexploiting cloud users and service credentials has left organizations of all sizes without a unified solution that controls and manages identities across all users, services, and protocols.\u201d\n\nThe new offering is already available as an add-on to the existing \u201centerprise\u201d subscription to the platform.\n\nNew offering auto-provision access\n\nTeleport identity governance and security offering is designed to replace the mix of credentials-based authorization methods organizations heavily use today with password-less and certificate-based access. According to the company, this allows detailed auditing and session recording with fine-grained authorization down to a single container or device.\n\n\u201cWe\u2019ve long known that passwords are an insecure form of authentication. That\u2019s why the industry is rapidly transitioning to passwordless authentication,\u201d said Jack Poller, an analyst at ESG. \u201cWhether biometrics such as facial and fingerprint recognition used by iOS and Android devices and Windows Hello, or FIDO passkeys, or certificate-based, passwordless authentication is generally considered to be phishing-resistant.\u201d\n\nOwing to this capability, the new offering features the ability to auto-provision access for pre-determined time slots. This includes automating access requests for the security teams for various services and integrations like Okta groups, AWS, databases, and Kubernetes clusters.\n\nAccess automatically expiring after a pre-defined time shortens the access window to reduce the risk of a breach, thereby limiting the attack surface area, according to Teleport.\n\nAdd-on aids in incident detection and response\n\nIdentity governance through the new offering will offer central visibility of the entire access plane, enabling teams to chart out potential weak points and address those issues.\n\n\u201cTeleport Identity Governance and Security can help alleviate the risk of shadow identity exploitation by providing the requisite visibility of all identities and access points throughout the environment. With visibility comes control and security,\u201d Poller said.\n\nThe ability further allows teams to take immediate action by locking suspicious or compromised identities and stopping them in their tracks, across the entire organizational infrastructure, Teleport added. \n\nPoller appreciated Teleport\u2019s attempt at password-less access and said it is a necessity in changing times. \u201cTeleport\u2019s use of certificate-based authentication is an important step in improving security and reducing organizational risks of attack via social engineering, password reuse, and other authentication attacks,\u201d he added.