Back to D3FEND Hub
Featured
Deploy fake credentials, API keys, and tokens that alert when accessed by adversaries.
Implementation Guidance
- Plant decoy credentials in likely locations
- Monitor for decoy usage
- Integrate with SIEM alerting
- Rotate decoys regularly
- Track attacker behavior patterns
Tools & Technologies
Thinkst CanaryAttivo NetworksIllusive NetworksHoneytokensCustom scripts
AI Enhancements
- AI-generated realistic decoy credentials
- ML-based optimal decoy placement
- Automated decoy rotation and management
ATT&CK Techniques Countered
This defensive technique helps protect against the following adversary techniques: