docs/documentation/platform/honey-tokens/aws/usage.mdx


- **Environment** — choose the target environment.
<Note>
The secret path is automatically determined based on which secret path you are currently in while creating the honey token.
</Note>

- **Access Key ID** — secret name for the AWS access key ID (for example: `AWS_ACCESS_KEY_ID`).
- **Secret Access Key** — secret name for the AWS secret access key (for example: `AWS_SECRET_ACCESS_KEY`).

- **Name** — a slug-friendly identifier (must be unique within the selected folder).
- **Description** (optional) — context for this honey token.
Click **Create**. Infisical provisions the decoy credentials in your AWS account and stores them as secrets in the selected environment and path.

The honey token is now Active. The decoy secrets appear alongside your real secrets and are included in any secret syncs or integrations.
When someone uses a honey token's credentials to make any AWS API call, Infisical detects the activity, marks the honey token as Triggered, and sends an email alert to all organization admins with:
GetUser, ListBuckets)Open a honey token's detail page to see a chronological log of all trigger events since the last reset. Each event shows the AWS API call, source IP, region, and timestamp.
If a honey token is in Triggered status and you've addressed the incident, click Reset to return it to Active status. This hides previous events from the event log view (events are still stored in the database) and re-enables email notifications.
To permanently deactivate a honey token, click Revoke. This will:
Revocation is irreversible.