Professional Plan & Above

Cloud Credential Tokens

Real AWS, GCP, and Azure credentials that have no permissions but report to us when used. When an attacker steals and uses them — anywhere in the world — you get an instant alert.

Supported Cloud Providers

Create credential tokens for all major cloud platforms. All providers included in Professional plan.

AWS

IAM user credentials that alert when any AWS API is called. Detect credential theft across all regions.

  • Access Key ID + Secret Access Key
  • CloudTrail integration
  • Global region coverage

Google Cloud

Service account keys that report usage to Cloud Audit Logs. Full API coverage.

  • Service account JSON key
  • Cloud Audit Logs monitoring
  • All GCP services covered

Microsoft Azure

Service principal credentials with Azure Monitor integration for instant detection.

  • App registration credentials
  • Azure AD sign-in logs
  • Cross-tenant detection

How It Works

Real cloud credentials that can't do anything — except tell you when they're used.

1

We Provision

We create real credentials in our cloud accounts — IAM users, service accounts, app registrations.

2

You Plant

Add them to config files, code repos, password managers, or anywhere credentials might be found.

3

Attacker Uses

When stolen credentials are used anywhere — any region, any API — the cloud provider logs it.

4

You Know

We monitor logs in real-time and alert you instantly with source IP, action attempted, and timing.

Why This Matters

Unlike honeypots that require attackers to connect to your infrastructure, credential tokens work globally.

Global Detection

Credentials work worldwide. If an attacker in Russia uses your stolen AWS key, you know instantly.

Zero Permissions

The credentials have no actual permissions. Attackers can't do any damage — only reveal themselves.

Proof of Theft

You now have evidence that credentials were stolen and used — critical for incident response.

Alert: AWS Credential Token Used
Token Name
prod-db-backup
Time
2025-01-13 14:23:41 UTC
API Action
sts:GetCallerIdentity
Region
us-east-1
Source IP
185.234.xx.xx
Location
St. Petersburg, Russia
User Agent
aws-cli/2.13.0 Python/3.11.4 Linux/5.15.0

Where to Plant Credentials

Code Repositories

  • .env.example files
  • Config templates
  • Old commit history
  • Private repos (if leaked)

Infrastructure

  • CI/CD pipeline configs
  • Container images
  • Kubernetes secrets
  • Terraform state files

Credential Stores

  • Password managers
  • Secrets vaults
  • SSM Parameter Store
  • Documentation wikis

Know When Your Cloud Keys Are Stolen

Cloud credential tokens are available in Business plan at £199/month.