Severity : High
Description : Canary access keys can be created with limited permissions and then used to detect when a potential breach occurs.
Remediation Steps : Create a canary access token and provide its user to CloudSploit. If CloudSploit detects that the account is in use, it will trigger a failure.