Announcement

Simulate and test AWS SCPs

Test preventive policies against real activity data, visualize blast radius, and iterate safely before deploying controls to production.

Turbot Team
6 min. read - Dec 17, 2025
Test preventive policies against real activity data, visualize blast radius, and iterate safely before deploying controls to production.

Teams hesitate to deploy preventive policies because they don't know the impact. Will it block legitimate workflows? Will production deployments fail? The fear of breaking things keeps policies stuck in draft mode.

Turbot Guardrails provides an interactive policy simulator that lets you test policies before deploying them to production. Work with your existing policies or create new ones. Duplicate policies to test modifications. Change where they're attached in your organizational hierarchy. Test how they perform by creating mock events or uploading real CloudTrail data from your environment. Security teams can iterate through variations and validate behavior in a safe environment without any production risk.

Visualize Your Organization and Policies

The simulator loads your cloud organization structure and displays it as an interactive graph. In this example, we see an AWS Organization with its Organizational Units, accounts, and Service Control Policies attached at each level. The inheritance hierarchy shows how policies flow down through OUs to accounts.

Interactive organization view with policies attached at different levels

Expand and collapse OUs, search for specific accounts or policies, and see where each policy is attached. The visual layout makes it clear which accounts inherit which policies and what the blast radius is for any change.

Test Events Against Your Policies

Create a mock event to test how your policies evaluate it. Select "EC2 RunInstances" as the action, eu-west-1 as the region, and goliath-commbank-fintech as the target account. Run the evaluation.

Edit mock events to simulate how your SCPs perform

The simulator shows the event passes through several SCPs in the path but gets blocked by two different Service Control Policies. This overlap is helpful to see. You have duplicate region restriction policies enforcing the same control at different levels. The evaluation detail shows exactly which statements in each policy caused the denial.

The event passes through some SCPs but gets blocked by two different policies

Compare Multiple Scenarios

Duplicate the event to test another region, eu-west-2.

Quickly duplicate and modify events to test different scenarios

Now you have two events to compare. Flip between them and run evaluations. Both are blocked by the same two SCPs.

Quickly test variations by duplicating and modifying events

This quick comparison shows how to test multiple scenarios without recreating events from scratch. You see immediately that both European regions are being blocked.

Modify Policies to Test Changes

To test how you can adjust the SCPs to allow eu-west-1 while keeping other regions restricted, duplicate one of the existing SCPs. Add eu-west-1 to the allowed regions list in your modified SCP version. Run the evaluation again.

Duplicate and modify an SCP to test the impact of changes

The evaluation shows your modified SCP now allows the event, but it's still blocked by the other existing SCP. You see exactly where the remaining restriction comes from. This shows the value of testing modifications before deploying them. You thought changing one policy would fix it, but the overlap means you need to address both.

Your modified SCP allows the action, but the other policy still blocks it

Disable Policies for What-If Testing

Disable the two SCPs that are blocking the event. Run the evaluation for the eu-west-1 event. It now passes completely through all policies.

With the blocking SCPs disabled, the event is fully allowed

Click back to the eu-west-2 event and run it. Still blocked. Your modified SCP allowing eu-west-1 doesn't affect eu-west-2. You understand exactly what each policy variation permits and what it blocks. Every test happens in simulation without affecting your live environment.

Quickly test another event to prove it's still blocking the other region

Change Policy Positioning

Take your modified SCP and change its attachment point from an OU to the Organization Root. The visualization updates to show all accounts now inherit this policy.

Attaching to Root expands the policy's scope across all accounts

Test events across different accounts to validate the broader scope works as intended. You see the blast radius of your change before deploying it. When you're confident the policy behaves correctly, you can deploy it to production starting with test accounts and expanding gradually.

See it in action

Watch this demo to see how to test preventive policies against activity data before deployment.

Deploy with Confidence

The simulator transforms policy deployment from guesswork into informed decision-making. You can test events, modify policies, disable controls, and change attachment points to see exactly what happens before deploying to production. Every test is safe. You iterate through variations, discover overlaps, and understand blast radius without any risk to live environments.

The simulator is included in Turbot Guardrails PSPM platform. Interested in running this in your environment? Connect with us to get your free preventive security posture assessment and start simulating changes to your organization's policies.