Back to D3FEND Hub
D3-DTP

Decoy Token Deployment

Deceive Tactic
Featured

Deploy fake credentials, API keys, and tokens that alert when accessed by adversaries.

Implementation Guidance

  • Plant decoy credentials in likely locations
  • Monitor for decoy usage
  • Integrate with SIEM alerting
  • Rotate decoys regularly
  • Track attacker behavior patterns

Tools & Technologies

Thinkst CanaryAttivo NetworksIllusive NetworksHoneytokensCustom scripts

AI Enhancements

  • AI-generated realistic decoy credentials
  • ML-based optimal decoy placement
  • Automated decoy rotation and management

ATT&CK Techniques Countered

This defensive technique helps protect against the following adversary techniques:

Ready to build a comprehensive defense strategy?