If an Application becomes aware of compromised credentials, which could be application level or user level credentials, the application should terminate any connection using the compromised credentials. The compromised credential may be determined via a GDS or other global service or they may be detected by some out of band process.