Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path, where defenses can be employed often more quickly and efficiently than on end-systems. General Terms Design, Security Categories and Subject Descriptors C2.1 [Computer-Communication Networks]: General-Security and protection