Aurum
CTRL
CTRL

You Have the Security Tools.
But Do They Really Work?

With ARMO CTRL — a free attack simulation lab, you can safely test how your existing security tools detect, alert, and respond to real-world threats. Request a Free Simulation
Diagnostic

What is CTRL?

ARMO CTRL (Cloud Threat Readiness Lab) is a free tool that helps you test your cloud security tools by deploying a safe, controlled attack lab that mimics real attack behaviors end-to-end. Unlike other attack simulations, CTRL starts with a web exploit and then pivots deeper into your cloud environment to simulate how real attacks move.

CTRL runs curated attack scenarios against deliberately vulnerable sample services that model realistic flaws; for example, command injection, local file inclusion (LFI), server-side request forgery (SSRF), and SQL injection. The goal is not to “find a bug,” but to validate whether your cloud and container controls detect, alert, and prevent as designed.

Curated

What’s included

01 A curated set of practical attack scripts covering common web and container attack paths: command injection, local file inclusion (LFI), server-side request forgery (SSRF), and SQL injection visual 5
02 Ready-to-run Kubernetes manifests for a lab with intentionally vulnerable services visual 5-1
03 Simple, parameterized Bash scripts that exercise the included vulnerable services (not your production apps) visual 7
04 Clear guidance on expected outcomes and what to monitor in your security stack visual 4 - v2
Operational

Who is CTRL for?

Security and detection engineering teams Validating their detections, alerts, and response playbooks.
Blue, red, and purple teams Running realistic exercises and training
Platform/SRE/DevSecOps teams Hardening container platforms and CI/CD guardrails

Start Testing Your Security Tools

CTRL
Thanks for your interest in CTRL by ARMO Simulation! We’ve received your request. Our team will review it and get in touch to confirm your access and next steps. Stay tuned — we’ll contact you soon.
Prepared

Why use CTRL?

01 Validate your defenses Prove that your existing cloud and container security tools actually detect and respond to real-world attacks – not just on paper.
02 Measure and improve coverage Benchmark your detections, policies, and alerts across layers (WAF, Kubernetes, CNAPP, EDR) and track measurable improvements over time.
03 Train and prepare your teams Run safe, realistic attack scenarios to exercise playbooks and strengthen your blue, red, and purple team readiness.
Simulate actual attacks to expose blind spots in your defenses before they’re exploited.
Close

Start Testing Your Security Tools

CTRL
Thanks for your interest in CTRL by ARMO Simulation! We’ve received your request. Our team will review it and get in touch to confirm your access and next steps. Stay tuned — we’ll contact you soon.
slack_logos Continue to Slack

Get the information you need directly from our experts!

new-messageContinue as a guest