Feature
Phishing Simulations
Launch simulated phishing campaigns, measure behavior (opens/clicks/reports), assign follow-up training, and export metrics you can share with buyers and auditors.
Run phishing tests and publish defensible metrics.
- Completion records hold up:Assignments, attestations, and timestamps stay easy to verify later.
- Exercises produce a record:Scenarios, injects, and after-action notes stay tied to the session.
- Progress is measurable:Track cohorts, overdue work, and readiness trends without manual rollups.
- Follow-ups stay owned:Gaps turn into named work with dates, history, and proof of closure.
Sample output
Phish metrics report
Governed report
Simulation And Session Workspace

Scenario timeline
Follow-up actions
How Teams Run Simulations And Capture The Outcome
01
Plan the scenario and participants
Set the session scope, roles, and objectives before the exercise starts.
02
Run injects and capture decisions
Keep the timeline, participant actions, and decision points on the record as the exercise unfolds.
03
Record the timeline and evidence
Preserve what happened, when, and why it mattered in a way the team can revisit later.
04
Assign follow-up work
Turn identified gaps into owned tasks instead of leaving them in after-action notes.
05
Package the after-action record
Share a clear readiness record with buyers, insurers, or auditors when they ask for exercise proof.
What This Adds To Exercise Readiness

Designed for
SOC 2 • Incidents
Artifacts reviewers recognize, plus sample previews of structure.
Scroll for artifact previews
Connect The Tools Around Each Exercise
Questions Buyers Ask
Bring The Training Or Exercise Record A Reviewer Will Ask For.
We’ll show how Aurora captures completion, participation, follow-ups, and the proof trail behind them.
Bring one live request and we will show the path to phish metrics report without losing approvals, ownership, or reviewer context.