CRITICAL
Source
CloudSploit
ID
canary-keys-used

Canary Keys Used

Detects when a special canary-token access key has been used

Canary access keys can be created with limited permissions and then used to detect when a potential breach occurs.

Create a canary access token and provide its user to CloudSploit. If CloudSploit detects that the account is in use, it will trigger a failure.