AWS DDoS Testing

Make sure your AWS deployment is secure with
simulated DDoS attacks in a controlled environment.

Tailored Attack Simulations

As an authorized AWS Partner, we help AWS customers verify their DDoS protection by simulating controlled attacks, providing detailed analysis, and making specific recommendations for improvement.

Our DDoS testing service, available to AWS Shield Advanced customers, is customized to match your AWS deployment architecture. So, whether you use EC2, ALB, ELB, Lamda, API Gateway or CloudFront – we’ll simulate the attack vectors that maximize value for your operational security.

Realistic DDoS Attacks

Our testing service simulates deep multi-vector DDoS attacks:

  • Volumetric attacks. Generating multi-gigabit attack traffic from multiple global locations, we test your ability to withstand extreme and sustained attacks with massive traffic, such as requests from a botnet.
  • Protocol (network-layer) attacks. By generating protocol attacks such as SYN floods, UDP floods, and others, we evaluate how your network equipment (like routers, firewalls, and load balancers) can withstand attempts to over-consume resources.
  • Application-layer attacks. We overwhelm your web server tier with excessive HTTP/S GET or POST requests that test your resistance to the more difficult-to-detect, layer 7 attacks, which target an edge server that executes a web application.

A Structured, Controlled Process

Using a “white-box” test methodology, we analyze your specific AWS deployment architecture and decide on the most relevant attack vectors to test.

Planning Session

  • Understand your network architecture
  • Define clear goals, attack vectors

Controlled Attack

  • Execute tests with 6 attack vectors
  • Cover the relevant attack categories (volumetric, application-layer, low-and-slow)

Report & Analysis

  • Deliver test results
  • Specify vulnerabilities and recommendations

Get Actionable

Following the DDoS Test, you receive a detailed report containing a full gap analysis outlining the main weaknesses, their severity, and how they should be fixed. See a sample test report.


Why do I need testing if AWS provides protection?

There are several reasons. First of all, every digital environment must be tested to ensure full protection. DDoS protection without DDoS testing is like software without QA. Furthermore, while AWS assumes responsibility regarding network or infrastructure attacks, application attacks largely remain your responsibility. There are configurations and actions only you can perform, such as setting rate limits, scanner and probe protection, auto-scaling, and more. And all these application-level measures must, of course, be tested.

Do I need to update AWS before the test?

No. Red Button can carry out DDoS tests without notifying the AWS team. This makes the process simpler in many cases, such as, for example, last-minute testing.

Do you also test application level (Layer 7) DDoS attacks?

Yes. Red Button tests all DDoS attacks: network level, application level, low-and-slow, etc.

How long does DDoS testing take?

Testing typically takes 3 hours. A more complicated test can take 6 hours.

Does your testing service include configuration recommendations?

Yes. Following the DDoS penetration tests, we provide you with recommendations specifically tailored for the AWS platform. You can then decide to implement the recommendations as you see fit.

Can you help us implement the recommendations?

Yes. As a separate service, Red Button also provides support and guidance for implementing our DDoS mitigation recommendations.