How I secure my Server Access with Teleport (for SSH, K8S, and Web)

Subscribers:
252,000
Published on ● Video Link: https://www.youtube.com/watch?v=9__A_nO2pbk



Duration: 19:07
64,972 views
1,364


Let's secure your critical server infrastructure and protect your SSH, Kubernetes, and Web Applications with two-factor Authentication and audit logging! I show you how to use the free and open-source software Teleport and deploy it on your servers, manage users, session recordings, and much more :) #Teleport #Cybersecurity #HomeLab

How to protect Linux from Hackers: https://www.youtube.com/watch?v=Bx_HkLVBz9M

Teleport-*: http://goteleport.com/thedigitallife


Follow me:

TWITTER: https://twitter.com/christianlempa
INSTAGRAM: https://instagram.com/christianlempa
DISCORD: https://discord.gg/christian-lempa-s-tech-community-702179729767268433
GITHUB: https://github.com/christianlempa
PATREON: https://www.patreon.com/christianlempa
MY EQUIPMENT: https://kit.co/christianlempa


Timestamps:

00:00 - Introduction
00:50 - What we're doing in this video...
02:14 - Why I'm using Teleport to access my Servers
06:26 - How to access Teleport from outside
09:48 - Add Linux Servers to Teleport
11:03 - Access Kubernetes Clusters
14:26 - Protect Web Applications

________________
All links with "*" are affiliate links.







Tags:
cloud hosting
google data center
how to secure web server
linux security
linux server security
linux web server
protect from hackers
secure linux server
secure server
secure ssh
secure ubuntu
secure web server
server hardening