Detects when a special canary-token access key has been used
Canary access keys can be created with limited permissions and then used to detect when a potential breach occurs.
Create a canary access token and provide its user to CloudSploit. If CloudSploit detects that the account is in use, it will trigger a failure.