Skip to main content
Monk follows a bring-your-own-infrastructure model. Everything runs on your cloud accounts — Monk provisions and manages resources on your behalf, but you own the infrastructure and control the credentials. Credentials are encrypted at rest in your IDE’s secret storage and on your Monk cluster using your cloud provider’s KMS — so your infrastructure can manage itself autonomously. They are never sent to Monk servers and never exposed to the LLM. See Security for the full details.

Pick Your Cloud

Monk asks for credentials automatically when you deploy, but you can also set them up ahead of time. Pick your cloud to get started:

AWS

IAM access key and secret key

Google Cloud

Service account JSON key

Microsoft Azure

Service principal with client secret

DigitalOcean

Personal access token
Coming soon: Hetzner support. Upvote it on our roadmap.

Service Providers

Monk also integrates with service providers for databases, hosting, authentication, CI/CD, and monitoring. Credentials for these are requested automatically the first time you use them.
ServiceWhat you needHow it works
NetlifyNothingOAuth — Monk opens a browser for authorization
VercelPersonal access tokenSettings → Tokens
MongoDB AtlasOrg name + API key pairAccess Manager → API Keys
Redis CloudAccount key + user keyAccount Settings → API Keys
Auth0Domain + M2M client credentialsApplications → Create M2M app
CloudflareAPI tokenMy Profile → API Tokens
GitHubFine-grained PATDeveloper Settings → Fine-grained tokens
SlackIncoming webhook URLApps → Incoming Webhooks → Add to Slack
You do not need to configure these in advance. When you ask Monk to use a service — for example, deploy frontend to Netlify with Monk — it will request the credentials it needs at that point.

Managing Credentials

You can check, update, or remove credentials at any time through your agent or Monk directly:
ask Monk what credentials I have configured
ask Monk to update my AWS credentials
ask Monk to delete my Azure credentials

Security Best Practices

Use service accounts, not personal credentials. Create a dedicated IAM user (AWS), service account (GCP), or service principal (Azure) for Monk. Service accounts can be rotated without affecting your personal access. Grant minimal permissions. Each cloud guide above lists the exact permissions Monk needs. Do not use admin or root credentials. Rotate regularly. Every 90 days for production credentials, immediately if potentially exposed, and whenever team members leave. Enable MFA on all provider accounts that manage the service accounts Monk uses.

First deployment

Credentials ready? Deploy your first app