| CPC H04L 63/1425 (2013.01) [G06F 21/554 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01)] | 20 Claims |

|
1. A method comprising:
receiving a key retrieval request;
determining that an anomaly score of the key retrieval request exceeds a suspicion threshold;
adding the key retrieval request to a pool of suspicious key retrieval requests;
returning a key in response to determining that the anomaly score of the key retrieval request exceeds the suspicion threshold, wherein the key enables access to a plurality of cloud resources;
receiving a request to create an executable cloud resource, wherein the request to create the executable cloud resource includes the key;
determining that the request to create the executable cloud resource correlates with one of the pool of suspicious key retrieval requests; and
suspending the request to create the executable cloud resource.
|