docs/documentation/platform/honey-tokens/overview.mdx
Honey tokens are decoy credentials that act as tripwires. When an attacker gains access to your secrets and attempts to use a honey token, Infisical detects the activity and immediately alerts you and your team.
Each honey token is planted alongside your real secrets so it appears genuine. Any attempt to use these credentials triggers an alert and notifies organization admins.
At this time, we only support AWS IAM credentials as honey tokens, but we're planning to support more providers in the near future.
Honey tokens use two levels of permissions: organization-level permissions for the one-time setup, and project-level permissions for day-to-day usage.
| Action | Description |
|---|---|
| Setup | Configure honey token settings in Organization Settings (AWS connection, CloudFormation stack, etc.) |
Only organization Admins have the Setup permission by default. This is required to connect, manage, and verify the honey token configuration.
| Action | Description | Admin | Member | Viewer |
|---|---|---|---|---|
| Read | View honey tokens, their status, and trigger events | Yes | Yes | Yes |
| Read Credentials | View the actual decoy credential values (e.g., AWS access keys) | Yes | No | No |
| Create | Create new honey tokens and plant decoy secrets | Yes | No | No |
| Edit | Update honey token name, description, or secret mappings | Yes | No | No |
| Reset | Reset a triggered honey token back to active status | Yes | No | No |
| Revoke | Permanently deactivate and remove a honey token | Yes | No | No |
Follow the [Setup Guide](/documentation/platform/honey-tokens/aws/setup) to get started with honey tokens.
Follow the [Usage Guide](/documentation/platform/honey-tokens/aws/usage) to get started with using honey tokens.