Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Severity : High

Description : Canary access keys can be created with limited permissions and then used to detect when a potential breach occurs.

Remediation Steps : Create a canary access token and provide its user to CloudSploit. If CloudSploit detects that the account is in use, it will trigger a failure.