TL;DR: No. It’s not worth the hassle since I simply don’t have or need the infrastructure involved for such a thing.
PREPARE
Identities:
Resources:
Workflows:
owning hackers coming to honeypot/ctf
Implementing a Zero Trust Architecture
https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture