ControlMonkey has extended its configuration disaster recovery capabilities to include cloud network vendors, thereby addressing the often overlooked area of network configuration resilience. This expansion introduces support for critical services such as Cloudflare, Akamai, Fastly, and F5, enhancing recovery strategies that many enterprises do not manage under their infrastructure-as-code practices.
The startup had previously launched its Cloud Configuration Disaster Recovery in 2025 to target major cloud platforms like AWS, Azure, and GCP. With this recent development, ControlMonkey now aims to secure configurations related to CDN setups, firewall rules, DNS records, and routing policies that are crucial for maintaining production uptime.
Aharon Twizer, CEO and co-founder of ControlMonkey, emphasized the necessity of backing up network configurations just as organizations routinely back up their data. He noted that many companies lack a method for backing up these configurations, especially for third-party providers, as most do not utilize infrastructure-as-code tools like Terraform for their CDN and firewall management.
ControlMonkey employs Terraform Infrastructure-as-Code technology to define environments. The platform engages with each supported vendor to reverse engineer live configurations into Terraform HCL code, subsequently creating versioned snapshots of these configurations daily. The recovery process is straightforward, enabling a one-click restore functionality, where the last known-good configuration can be provisioned through Terraform automation when incidents occur.
However, it is essential to clarify that ControlMonkey focuses on configuration recovery rather than vendor availability monitoring. The primary intention is to tackle scenarios such as ransomware attacks that corrupt network configurations while leaving data intact, making applications unreachable.
Looking ahead, ControlMonkey plans to expand its service offerings beyond just networking configurations. The feedback from customers is driving the need for broader support that encompasses various third-party services vital for enterprise operations. Compliance considerations, such as SOC 2 and ISO 27001, further underline the importance of configuration recovery as part of comprehensive disaster recovery and business continuity planning.
Twizer asserted that modern cyber resilience involves safeguarding data, infrastructure, and network control planes, and achieving comprehensive resilience requires addressing all three aspects.