The 3 Biggest Cloud Workload Threats (and Why Teams Miss Them)
Introduction — Moving to the Cloud Changed Everything (Even If the Cloud Didn’t) In this...
Nov 20, 2025
If you are dealing with securing cloud infrastructure, containers and applications, you probably have several security tools in place including cloud posture (CSPM/CNAPP), container security and runtime security. Tool coverage might look good on paper, but how can you know they work against real attacks?
ARMO CTRL (Cloud Threat Readiness Lab) helps you test your cloud security tools by deploying a safe, controlled attack lab that mimics real attack behaviors end‑to‑end. Unlike other attack simulations, CTRL starts with a web exploit before pivoting deeper into your cloud environment to simulate what real attacks look like.
ARMO CTRL runs curated attack scenarios against deliberately vulnerable sample services that model realistic flaws (e.g., command injection, LFI, SSRF, SQLi) that we expect to see attackers targeting. The goal is not to “find a bug,” but to validate whether your cloud and container controls detect, alert, and prevent as designed.
With ARMO CTRL, security and platform teams can:
Scenarios are narrowly scoped to produce meaningful artifacts—logs, process starts, network egress, query anomalies—without destructive side effects. Everything runs in a lab you control, so you can tune policies, test rule updates, and compare outcomes consistently.
Each attack lives in its own directory with a focused attack.sh. You deploy the lab and run the scripts against the included services. The payloads are designed to be realistic yet contained, producing artifacts your tools should detect (logs, process starts, network calls, query anomalies).
Example invocation:
cd command-injection export TARGET_URL=http://localhost:8081 ./attack.sh
You can also enable additional variants via environment flags (see the repository README.md).
The command injection scenario targets apps that forward user input to shell commands without proper validation.
What the script does:
How to run it against the sample lab:
# After deploying the Kubernetes lab (see Installation Guide), port-forward the Ping App: kubectl port-forward -n attack-suite service/ping-app 8081:80 & # Run the attack cd command-injection TARGET_URL=http://localhost:8081 ./attack.sh
What to monitor while it runs:
Expected outcome signals:
Run the suite in a lab that simulates a cloud environment:
See the repository README.md and INSTALLATION.md for step-by-step instructions.
This project is for authorized, educational, and testing use only. Always run in isolated environments you control, with explicit permission. The suite aims to produce realistic telemetry without causing destructive side effects, but you are responsible for where and how you run it. It is not intended to test your own application code; its purpose is to validate detection and protection mechanisms in cloud environments using deliberately vulnerable applications.
Effective security isn’t just about having tools—it’s about proving they work. Use CTRL to continuously validate your defenses, tighten your detections, and train your teams with confidence.
Introduction — Moving to the Cloud Changed Everything (Even If the Cloud Didn’t) In this...
Within 24 hours, three new high-severity vulnerabilities were disclosed in runc, the low-level runtime that...
Hi there,We’ve just dropped a fresh batch of updates to help you cut through the...