Tracebit deploys canary resources and credentials across AWS infrastructure to detect breaches. It operates across control plane and compute, providing high-fidelity alerts when attackers interact with canaries.
Features
Canary resources in AWS control plane
Decoy storage, databases, secrets, and config
AWS credentials injected into pods
Use Cases
Detecting breaches in AWS environments
Early detection of lateral movement and exfiltration