Overview
CastleClone is an on-demand, secure software-as-a-service cyber platform that enables cyber security missions with capabilities for creating “digital twins”, performing adversary emulation, forensics, penetration tests, skill-based assessments, and testing AI agents. Leidos collaborated with AWS to ensure that CastleClone was risk-free for our customers. Each environment is sandboxed from the internet, with no way to communicate out. Additionally, with a focus on ease of use, we made CastleClone completely interactive from the browser. Customers can deploy and interact with entire networks all from their browser and don’t need a powerful computer. Inside of these environments a variety of cybersecurity roles can be performed. Some examples include:
- Security operations center analysts can deploy a detection lab to see how well their latest defensive signatures do against specific MITRE ATT&CK technique IDs.
- Malware analysts can perform static and dynamic malware analysis in a risk-free environment. Red and blue teams can do team exercises.
- Penetration testers can practice against target virtual machines. Exploit developers can create new exploits and test them.
- Machine learning engineers and data scientists can create custom cyber datasets to train new models on by collecting all the network traffic and host data from attack simulations.
CastleClone helps provide organizations with cyber confidence.
CastleClone's capabilities include:
- Creation of “Digital Twins” - Import your workstations, servers, network configurations and deploy your organizations digital twin. This enables threat emulation, threat analysis and helps to ensure an organization is cyber ready.
- Emulation of Adversary threats - Simulate cyber-attacks mapped to the MITRE ATT&CK Framework. DNC hack to see how well your security posture holds up.
- Analyze Threats - Using the threat emulation capabilities of CastleClone, analysts can use the data captured from the simulation that they uploaded to their bucket to create custom detections, signatures, queries, YARA rules, and additional analytics that are then passed to incident responders.
- Evaluate Products - Evaluate new products, infrastructure, and applications in a risk-free environment to ensure risk compliance. secure vulnerability analysis.
- Build Cyber Datasets - Export captured network or host-based data to form your own custom datasets so that your organizations data scientists and machine learning engineers can create tailored analytics and detections.
- Perform Team Assessments - Train your analysts, operators, and engineers in your organizations digital twin in a risk-free environment, where they are free to make mistakes and learn.
Highlights
- Secure, risk-free, customizable environments: Each environment provides a sandbox for automatically standing up containers and virtual machines. Each environment has its own VPC, so virtual machines in one environment can’t talk to virtual machines in another environment. The environments are also air gapped, meaning they can’t communicate with the internet. Environments do have permissions through secure communications to upload to and download from buckets.
- Container and Task Templates: Templates allow you to define parameterized configuration definitions for containers and tasks. A user can define them through a form or a raw YAML file, where they will specify what virtual machines to be included in a container. There are also task templates which enable users to schedule a task to run and then evaluate the output once the task is complete.
- Jupyter Notebooks: Data scientists, data analysts, machine learning engineers can immediately make use of data in their buckets and start training on Jupyter Notebooks with all popular data science packages already installed.
Details
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
Leidos is an end-to-end solutions provider with a relentless focus on helping customers adapt to the cloud. With CastleClone our team will work with you to determine your needs and create a custom plan tailored to you. Other products in the cyber market can also do advanced simulations, and cyber training / evaluations, but they do not create digital twin environments. We continuously optimize the platform with the latest technology and cost savings, so you can achieve your objectives at the lowest possible price and the best experience. To learn how Leidos’ CastleClone solution can provide you with an on-demand, scalable, and secure “digital twin” of your computing environment enabling cost-effective threat injection, data collection, testing of threat mitigations, and training without endangering your production environments contact us today to speak with one of our CastleClone experts.
CastleClone leverages the following AWS services to function:
- AWS CDK
- AWS Lambda
- AWS EKS
- AWS ECR
- AWS API Gateway
- AWS DynamoDB
- AWS S3
- AWS EC2
- AWS Fargate
- AWS Cognito
- AWS Route 53
- AWS Step Functions
Email: LeidosCloud@Leidos.com Website: