Skip to content

Commit 9995621

Browse files
authored
Merge pull request #226423 from AbdullahBell/ddos-redwolf-testing
DDoS Protection: simulation partners
2 parents 4369322 + 8bf355d commit 9995621

File tree

1 file changed

+18
-4
lines changed

1 file changed

+18
-4
lines changed

articles/ddos-protection/test-through-simulations.md

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99
ms.tgt_pltfrm: na
1010
ms.custom: ignite-2022
1111
ms.workload: infrastructure-services
12-
ms.date: 10/12/2022
12+
ms.date: 02/06/2023
1313
ms.author: abell
1414
---
1515

@@ -24,11 +24,14 @@ Simulations help you:
2424
- Train your network security teams.
2525

2626
## Azure DDoS simulation testing policy
27+
2728
You may only simulate attacks using our approved testing partners:
2829
- [BreakingPoint Cloud](https://www.ixiacom.com/products/breakingpoint-cloud): a self-service traffic generator where your customers can generate traffic against DDoS Protection-enabled public endpoints for simulations.
2930
- [Red Button](https://www.red-button.net/): work with a dedicated team of experts to simulate real-world DDoS attack scenarios in a controlled environment.
31+
- [RedWolf](https://www.redwolfsecurity.com/services/#cloud-ddos) a self-service or guided DDoS testing provider with real-time control.
32+
33+
Our testing partners' simulation environments are built within Azure. You can only simulate against Azure-hosted public IP addresses that belong to an Azure subscription of your own, which will be validated by our partners before testing. Additionally, these target public IP addresses must be protected under Azure DDoS Protection. Simulation testing allows you to assess your current state of readiness, identify gaps in your incident response procedures, and guide you in developing a proper [DDoS response strategy](ddos-response-strategy.md).
3034

31-
Our testing partners' simulation environments are built within Azure. You can only simulate against Azure-hosted public IP addresses that belong to an Azure subscription of your own, which will be validated by Azure Active Directory (Azure AD) before testing. Additionally, these target public IP addresses must be protected under Azure DDoS Protection.
3235

3336

3437
> [!NOTE]
@@ -76,15 +79,26 @@ This [API script](https://aka.ms/ddosbreakingpoint) can be used to automate DDoS
7679
Red Button’s [DDoS Testing](https://www.red-button.net/ddos-testing/) service suite includes three stages:
7780

7881
1. **Planning session**: Red Button experts meet with your team to understand your network architecture, assemble technical details, and define clear goals and testing schedules. This includes planning the DDoS test scope and targets, attack vectors, and attack rates. The joint planning effort is detailed in a test plan document.
79-
2. **Controlled DDoS attack**: Based on the defined goals, the Red Button team launches a combination of multi-vector DDoS attacks. The test typically lasts between three to six hours. Attacks are securely executed using dedicated servers and are controlled and monitored using Red Button’s management console.
80-
3. **Summary and recommendations**: The Red Button team provides you with a written DDoS Test Report outlining the effectiveness of DDoS mitigation. The report includes an executive summary of the test results, a complete log of the simulation, a list of vulnerabilities within your infrastructure, and recommendations on how to correct them.
82+
1. **Controlled DDoS attack**: Based on the defined goals, the Red Button team launches a combination of multi-vector DDoS attacks. The test typically lasts between three to six hours. Attacks are securely executed using dedicated servers and are controlled and monitored using Red Button’s management console.
83+
1. **Summary and recommendations**: The Red Button team provides you with a written DDoS Test Report outlining the effectiveness of DDoS mitigation. The report includes an executive summary of the test results, a complete log of the simulation, a list of vulnerabilities within your infrastructure, and recommendations on how to correct them.
8184

8285
Here's an example of a [DDoS Test Report](https://www.red-button.net/wp-content/uploads/2021/06/DDoS-Test-Report-Example-with-Analysis.pdf) from Red Button:
8386

8487
![DDoS Test Report Example](./media/ddos-attack-simulation/red-button-test-report-example.png)
8588

8689
In addition, Red Button offers two other service suites, [DDoS 360](https://www.red-button.net/prevent-ddos-attacks-with-ddos360/) and [DDoS Incident Response](https://www.red-button.net/ddos-incident-response/), that can complement the DDoS Testing service suite.
8790

91+
## RedWolf
92+
93+
RedWolf offers an easy-to-use testing system that is either self-serve or guided by RedWolf experts. RedWolf testing system allows customers to set up attack vectors. Customers can specify attack sizes with real-time control on settings to simulate real-world DDoS attack scenarios in a controlled environment.
94+
95+
RedWolf's [DDoS Testing](https://www.redwolfsecurity.com/services/) service suite includes:
96+
97+
- **Attack Vectors**: Unique cloud attacks designed by RedWolf.
98+
- **Guided and self service**: Leverage RedWolf's team or run tests yourself.
99+
100+
101+
88102
## Next steps
89103

90104
- Learn how to [view and configure DDoS protection telemetry](telemetry.md).

0 commit comments

Comments
 (0)