Skip to content

panther-labs/stratus-red-team

 
 

Repository files navigation

made-with-Go Tests static analysis Maintainer OpenSSF Scorecard CII Best Practices

Panther-enhanced fork of Stratus Red Team

Stratus Red Team is an open-source adversary emulation tool that lets you validate the security of your cloud environments by replicating offensive attack techniques in a granular and self-contained manner. It can be thought of as Atomic Red Team™ for the cloud.

This repository is a Panther-enhanced fork of Stratus Red Team that adds end-to-end integration testing for detection engineering. Instead of using fabricated test cases that may not match production logs, you can use this fork to generate authentic log data, allowing for better attack simulation and detection validation.

Terminal recording

Why perform end-to-end testing?

Traditional detection testing uses theoretical log samples that may differ from real-world patterns. This approach:

  • Generates authentic logs from actual attack simulations
  • Tests the complete pipeline from log collection to alerting
  • Enables test-driven detection development with real attack patterns
  • Provides confidence that idle detection rules will work when attacks occur

Panther enhancements

Custom prefix support

Use --prefix to avoid "stratus-red-team" detection by AI systems:

stratus detonate aws.persistence.iam-create-admin-user --prefix "security-test"

Additional attack techniques

Enhanced AI/Bedrock security testing:

  • aws.defense-evasion.bedrock-guardrail-delete - Delete AI safety guardrails
  • aws.defense-evasion.bedrock-model-invocation-logging-delete - Disrupt AI activity monitoring
  • aws.impact.bedrock-converse-guardrail-trigger - Test guardrail limits via Converse API
  • aws.impact.bedrock-invoke-model-guardrail-trigger - Test guardrail limits via InvokeModel API
  • aws.persistence.iam-create-admin-user - Customized to print access key ID
  • gcp.privilege-escalation.tag-based-privilege-escalation - Escalate GCP compute privileges via conditional access tags

Detection Workflow

  1. Run attack simulations to generate authentic logs
  2. Export CloudTrail/application logs
  3. Create test fixtures using the logs you exported
  4. Write detections
  5. Re-run attack simulations to validate your pipeline end-to-end

Related projects and talks

Grimoire

Panther also has a fork of Grimoire, which you can use for end-to-end detection testing automation

Talks

Read the announcement blog posts:

Getting Started

Stratus Red Team is a self-contained Go binary.

See the documentation at stratus-red-team.cloud:

Installation

Direct install

Requires Go 1.22+

go install -v github.com/datadog/stratus-red-team/v2/cmd/stratus@latest

Homebrew

brew tap datadog/stratus-red-team https://github.com/DataDog/stratus-red-team
brew install datadog/stratus-red-team/stratus-red-team

Pre-build binaries

For Linux / Windows / Mac OS: download one of the pre-built binaries.

Docker

IMAGE="ghcr.io/datadog/stratus-red-team"
alias stratus="docker run --rm -v $HOME/.stratus-red-team/:/root/.stratus-red-team/ -e AWS_ACCESS_KEY_ID -e AWS_SECRET_ACCESS_KEY -e AWS_SESSION_TOKEN -e AWS_DEFAULT_REGION $IMAGE"

asdf

You can install specific versions (or latest) of stratus-red-team using asdf and this stratus-red-team plugin:

asdf plugin add stratus-red-team https://github.com/asdf-community/asdf-stratus-red-team.git
asdf install stratus-red-team latest

Community

The following section lists posts and projects from the community leveraging Stratus Red Team.

Open-source projects:

Videos:

Blog posts:

Talks:

Papers:

Using Stratus Red Team as a Go Library

See Examples and Programmatic Usage.

Development

Building Locally

make
./bin/stratus --help

Running Locally

go run cmd/stratus/*.go list

Running the Tests

make test

Building the Documentation

For local usage:

pip install mkdocs-material mkdocs-awesome-pages-plugin

make docs
mkdocs serve

Acknowledgments

Maintainer: @christophetd

Similar projects (see how Stratus Red Team compares):

Inspiration and relevant resources:

About

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 78.6%
  • HCL 20.1%
  • Smarty 0.4%
  • Ruby 0.4%
  • Makefile 0.3%
  • Shell 0.1%
  • Dockerfile 0.1%