Security Attack Simulator
Replay realistic attack paths against this student data environment and watch how each AWS control activates in sequence—from network isolation, to IAM, to GuardDuty alerts.
Fully simulated — no real AWS calls are made.
Live Security Posture
0
Attacks Blocked
0
Security Alerts Generated
100%
Detection Rate (Simulated)
0
Data Breaches
Three-Tier VPC Path
🥷
Internet
Untrusted
Gateway
ALB + WAF
App Tier
Private
Database
Isolated
Security Groups
Network ACLs
IAM Policies
KMS Encryption
GuardDuty
Security Event Stream
[--:--:--]
Security monitoring active. Select an attack scenario to begin.
💻 Select an attack to see what the attacker would run.
🔍 When an attack runs, a GuardDuty-style finding will appear here.
🛠️ Incident response steps will appear here.