Como, Italy — 5 June 2025 – Intarmour Consulting announces the public release of Obsidian Protocol, an open-source adversary simulation framework designed to help cybersecurity teams validate their multicloud posture using real-world TTPs mapped to MITRE ATT&CK.
Built for enterprise readiness and security research, Obsidian Protocol is now available on GitHub under the MIT license, offering red teams, cloud architects, and security engineers a controlled and extensible platform to simulate attacks across AWS, Azure, GCP, Oracle, and Alibaba environments.
What’s Inside the Obsidian Protocol Framework
25+ atomic TTPs per provider, built in YAML and easy to extend
Scenario orchestration via headless CLI, with full support for structured logging
Real-time SIEM integrations, including prebuilt modules for Splunk and Microsoft Sentinel
Air-gapped support, ensuring sensitive environments are testable with no external dependencies
Dynamic configuration, cross-account support, and auto-templated scenarios using Jinja-style injection
The project includes full execution tracking, JSON/CSV export, and modular expansion through provider-specific modules and scenario directories. Whether testing identity abuse, lateral movement, or cloud misconfiguration detection, users can launch realistic kill chains with minimal setup.
Built for Modern Cloud Security Teams
Obsidian Protocol enables organizations to test assumptions, evaluate detection engineering, and align their posture validation to cloud-native threats—before attackers do.
Use cases include:
Red and purple team exercises across multicloud estates
Continuous validation of IAM and network segmentation
Proactive detection rule testing in SIEM/SOAR platforms
Integration into GitOps or CI pipelines for secure-by-design infrastructure reviews
Where to Get It
Obsidian Protocol is available under the MIT license on GitHub: github.com/Intarmour/Obsidian-Protocol
The repository includes documentation, quick start examples, and integration modules.