Skip to content

A-SOC is an agentic, cloud-native security platform that autonomously detects, analyzes, and mitigates threats using LLM-powered multi-agent reasoning, with real-time visibility, blast-radius analysis, and human-governed automation.

Notifications You must be signed in to change notification settings

Ismail-2001/Autonomous-Secure-AI-Operations-Center

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

15 Commits
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ›ก๏ธ Autonomous Secure AI Operations Center

A-SOC โ€” Next-Generation Agentic Cybersecurity Platform


Python FastAPI LangGraph Next.js Docker License: MIT


"Most security tools alert you. A-SOC acts."

A-SOC is a cloud-native, AI-native security operations platform that autonomously detects, investigates, and remediates threats using a coordinated fleet of specialized LLM-powered agents โ€” with human governance built in.

๐Ÿš€ Quick Start ยท ๐Ÿ—๏ธ Architecture ยท ๐ŸŽฎ Demo ยท ๐Ÿšข Deploy


๐Ÿ“Œ The Problem

Traditional Security Operations Centers (SOCs) are drowning in alerts. Analysts face:

  • Thousands of low-fidelity alerts daily, leading to alert fatigue
  • Static, rule-based SIEMs that miss novel, zero-day attack patterns
  • Slow mean-time-to-respond (MTTR) due to manual investigation workflows
  • Compliance documentation that is tedious, inconsistent, and error-prone

A-SOC solves all of this with a coordinated fleet of AI agents.


๐Ÿš€ Key Features

Feature Description
๐Ÿ•ต๏ธ Multi-Agent Architecture Specialized agents (Telemetry, Detection, Forensics, Response, Compliance) operate as a coordinated team
๐Ÿง  LLM-Powered Analysis LLMs contextualize alerts, dramatically reducing false positives vs. static rules
โšก Real-Time Threat Streaming WebSocket-based live feed pushes events to the dashboard as they happen
๐Ÿ›‘ Human-in-the-Loop Governance High-risk actions (IAM revocation, firewall changes) require explicit human authorization
๐Ÿ•ธ๏ธ Blast Radius Visualization Interactive attack graph shows which resources are affected and how far the threat can spread
๐Ÿ“œ Immutable Audit Trail Every action and LLM decision is cryptographically logged for SOC2/ISO 27001 compliance
๐Ÿ‘ฎ Policy-as-Code Open Policy Agent (OPA) enforces corporate policy on every proposed remediation action
๐ŸŽจ Premium Dashboard Cinematic, glassmorphism UI built with Next.js 14, providing a state-of-the-art operator experience

๐Ÿ› ๏ธ Tech Stack

Layer Technology Purpose
Backend FastAPI High-performance async REST API & WebSocket server
LangGraph Agent state machine & multi-agent orchestration
LangChain LLM abstraction layer (OpenAI / Anthropic / DeepSeek)
Open Policy Agent (OPA) Policy-as-Code engine with Rego for governance
PostgreSQL + Redis Persistent state storage & real-time caching
Docker Compose Containerized local and production deployment
Frontend Next.js 14 React framework with App Router for the operator dashboard
Tailwind CSS Utility-first styling & glassmorphism design system
React Flow / Custom SVG Interactive blast radius attack graph visualization
WebSockets Real-time bidirectional event streaming to the UI

๐Ÿ—๏ธ Architecture

A-SOC operates on a Hub-and-Spoke multi-agent model, orchestrated by a central Supervisor agent that enforces corporate policy on every decision and routes tasks to the appropriate specialist.

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                       A-SOC Agent Platform                      โ”‚
โ”‚                                                                 โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚
โ”‚  โ”‚  Log Sources โ”‚    โ”‚            Agent Fleet                  โ”‚  โ”‚
โ”‚  โ”‚โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”‚    โ”‚                                        โ”‚  โ”‚
โ”‚  โ”‚ CloudTrail  โ”‚โ”€โ”€โ”€โ–ถโ”‚  โ‘  TELEMETRY AGENT                     โ”‚  โ”‚
โ”‚  โ”‚ VPC Flow    โ”‚    โ”‚     Ingests & normalizes raw log data   โ”‚  โ”‚
โ”‚  โ”‚ K8s Audit   โ”‚    โ”‚              โ”‚                         โ”‚  โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚              โ–ผ                         โ”‚  โ”‚
โ”‚                     โ”‚  โ‘ก DETECTION AGENT                     โ”‚  โ”‚
โ”‚                     โ”‚     Analyzes anomalies                  โ”‚  โ”‚
โ”‚                     โ”‚     Assigns Risk Score (0โ€“100)          โ”‚  โ”‚
โ”‚                     โ”‚              โ”‚                         โ”‚  โ”‚
โ”‚                     โ”‚              โ–ผ                         โ”‚  โ”‚
โ”‚                     โ”‚  โ‘ข SUPERVISOR AGENT  โ—€โ”€โ”€ OPA Policy    โ”‚  โ”‚
โ”‚                     โ”‚     โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”             โ”‚  โ”‚
โ”‚                     โ”‚     โ”‚ Risk < 70?          โ”‚             โ”‚  โ”‚
โ”‚                     โ”‚     โ”‚ YES โ†’ Auto-remediateโ”‚             โ”‚  โ”‚
โ”‚                     โ”‚     โ”‚ NO  โ†’ Human Approvalโ”‚             โ”‚  โ”‚
โ”‚                     โ”‚     โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜             โ”‚  โ”‚
โ”‚                     โ”‚          โ”‚           โ”‚                 โ”‚  โ”‚
โ”‚                     โ”‚          โ–ผ           โ–ผ                 โ”‚  โ”‚
โ”‚                     โ”‚  โ‘ฃ FORENSICS   Human Dashboard         โ”‚  โ”‚
โ”‚                     โ”‚     AGENT      (Blast Radius +         โ”‚  โ”‚
โ”‚                     โ”‚     (Attack     Authorize Modal)        โ”‚  โ”‚
โ”‚                     โ”‚      Graph)         โ”‚                  โ”‚  โ”‚
โ”‚                     โ”‚          โ”‚          โ”‚                  โ”‚  โ”‚
โ”‚                     โ”‚          โ””โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”˜                  โ”‚  โ”‚
โ”‚                     โ”‚               โ–ผ                        โ”‚  โ”‚
โ”‚                     โ”‚  โ‘ค RESPONSE AGENT                     โ”‚  โ”‚
โ”‚                     โ”‚     Executes remediation               โ”‚  โ”‚
โ”‚                     โ”‚     (Block IP, Revoke Keys, etc.)      โ”‚  โ”‚
โ”‚                     โ”‚               โ”‚                        โ”‚  โ”‚
โ”‚                     โ”‚               โ–ผ                        โ”‚  โ”‚
โ”‚                     โ”‚  โ‘ฅ COMPLIANCE AGENT                   โ”‚  โ”‚
โ”‚                     โ”‚     Maps incident โ†’ SOC2 / ISO 27001  โ”‚  โ”‚
โ”‚                     โ”‚     Logs cryptographic evidence        โ”‚  โ”‚
โ”‚                     โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Agent Responsibilities

Agent Role
โ‘  Telemetry Agent Ingests and normalizes logs from CloudTrail, VPC Flow Logs, and Kubernetes Audit logs into a unified event schema.
โ‘ก Detection Agent Applies LLM-powered reasoning to identify anomalies, correlate events, and assign a continuous Risk Score (0โ€“100).
โ‘ข Supervisor Agent The orchestrator. Evaluates every detection against OPA policies and routes: score < 70 โ†’ auto-remediate, score โ‰ฅ 70 โ†’ escalate to human.
โ‘ฃ Forensics Agent Constructs the Blast Radius โ€” a real-time graph of which resources have been touched, compromised, or are at risk.
โ‘ค Response Agent Executes the approved remediation playbook. Actions include IP blocking, credential revocation, and quarantine.
โ‘ฅ Compliance Agent Automatically maps every incident and action to compliance frameworks (SOC2, ISO 27001) and writes immutable, signed audit records.

๐Ÿ” Security Design Principles

A-SOC is designed with a defense-in-depth philosophy applied to the platform itself:

  • Principle of Least Privilege: Each agent only has the tool-access it needs. The Compliance Agent cannot execute remediations.
  • Immutable Audit Log: All LLM reasoning chains and tool invocations are stored with cryptographic signatures, making them tamper-evident.
  • Human-in-the-Loop for High-Stakes Actions: No IAM key revocation, firewall rule change, or instance termination can happen without explicit operator authorization. The system is designed to make humans the last line of defense, not the bottleneck.
  • Policy-as-Code via OPA: Governance is not hardcoded in Python. It lives in versioned, reviewable Rego policy files, making it auditable and easy to update.
  • Zero Trust Agent Communication: Inter-agent communication is mediated by the LangGraph state machine, with no direct side-channel communication between agents.

โš™๏ธ Installation & Setup

Prerequisites

Ensure the following are installed on your machine:

  • Python 3.10+
  • Node.js 18+
  • Docker & Docker Compose (optional, but recommended)
  • An API key for OpenAI or Anthropic

Option A: Docker Compose (Recommended)

The fastest way to get the full A-SOC stack running locally.

# 1. Clone the repository
git clone https://github.com/Ismail-2001/Autonomous-Secure-AI-Operations-Center.git
cd Autonomous-Secure-AI-Operations-Center/a-soc

# 2. Configure your environment
cp .env.example .env
# Open .env and add your OPENAI_API_KEY (or ANTHROPIC_API_KEY)

# 3. Launch the entire stack (API + Dashboard + PostgreSQL + Redis)
docker-compose up -d

# 4. Verify all services are healthy
docker-compose ps

โœ… Dashboard is live at http://localhost:3000 โœ… API is live at http://localhost:9001/docs


Option B: Manual Setup

Step 1 โ€” Clone the Repository

git clone https://github.com/Ismail-2001/Autonomous-Secure-AI-Operations-Center.git
cd Autonomous-Secure-AI-Operations-Center/a-soc

Step 2 โ€” Backend Setup

# Create and activate a virtual environment
python -m venv venv
source venv/bin/activate       # macOS/Linux
# venv\Scripts\activate        # Windows

# Install backend dependencies
pip install -r requirements.txt

# Configure environment variables
cp .env.example .env
# Edit .env โ€” at minimum, set OPENAI_API_KEY

# Start the API server on port 9001
python -m uvicorn api:app --host 0.0.0.0 --port 9001 --reload

Step 3 โ€” Frontend Setup

# From the project root, navigate to the dashboard
cd dashboard

# Install frontend dependencies
npm install

# Start the development server (port 3000)
npm run dev

Step 4 โ€” Configure Environment Variables

Copy .env.example to .env and populate the following:

# --- LLM Provider (choose one) ---
OPENAI_API_KEY=sk-...
# ANTHROPIC_API_KEY=sk-ant-...

# --- Database ---
DATABASE_URL=postgresql://user:password@localhost:5432/asoc
REDIS_URL=redis://localhost:6379

# --- Security ---
SECRET_KEY=your-super-secret-key-here

# --- OPA Policy Engine ---
OPA_URL=http://localhost:8181

๐ŸŽฎ Usage

Once both backend and frontend are running:

  1. Open the Dashboard โ†’ Navigate to http://localhost:3000
  2. Start a Simulation โ†’ Click the "Start Simulation" button in the top right corner
  3. Watch the Agent Fleet โ†’ Observe the real-time log stream as each agent processes incoming threat telemetry
  4. Review Detections โ†’ See risk scores assigned and watch the Blast Radius graph build dynamically
  5. Authorize a High-Risk Action โ†’ When the "High Risk Action Proposed" modal appears, review the full context and Blast Radius, then click "Authorize" to execute the remediation

๐Ÿšข Deployment

Production Deployment

For production environments, see the detailed DEPLOYMENT.md guide which covers:

  • AWS ECS (Fargate): Scalable serverless container deployment
  • Kubernetes: Full Helm chart manifests in k8s/
  • Vercel: Frontend-only serverless deployment
  • Monitoring: Prometheus + Grafana stack integration
  • Security Hardening: TLS, secrets management, WAF configuration

Cloud Platform Summary

Platform Backend Frontend Guide
AWS ECS Fargate โœ… Supported โœ… S3 + CloudFront DEPLOYMENT.md#aws
Kubernetes โœ… Any cluster โœ… Ingress k8s/
Docker Compose โœ… Self-hosted โœ… Included docker-compose up -d
Vercel โŒ โœ… Serverless DEPLOYMENT.md#vercel

๐Ÿ—บ๏ธ Roadmap

v1.0 โ€” Core Platform (Complete โœ…)

  • Multi-Agent orchestration via LangGraph
  • Real-time WebSocket event streaming
  • Human-in-the-Loop approval workflow
  • Interactive Blast Radius visualization
  • OPA Policy-as-Code integration
  • Immutable, cryptographically-signed audit trail

v1.5 โ€” Cloud Integration (In Progress ๐Ÿ”จ)

  • Live AWS account integration via Boto3 (CloudTrail, GuardDuty, SecurityHub)
  • Slack / Microsoft Teams notification integration
  • JIRA ticket auto-creation for approved incidents

v2.0 โ€” Advanced Intelligence (Planned ๐Ÿ“‹)

  • Fine-tuned local LLM support (Llama 3) for air-gapped deployments
  • Advanced Threat Hunting interface with natural language queries
  • MITRE ATT&CK framework automatic tactic/technique mapping
  • Multi-cloud support (GCP, Azure)

๐Ÿค Contributing

Contributions are welcome! This project is designed to be extended:

  1. Fork the repository
  2. Create your feature branch:
    git checkout -b feature/your-amazing-feature
  3. Commit your changes:
    git commit -m 'feat: add amazing feature'
  4. Push to your branch:
    git push origin feature/your-amazing-feature
  5. Open a Pull Request against main

Please follow Conventional Commits for your commit messages and add tests for any new agent logic.


๐Ÿ“„ License

Distributed under the MIT License. See LICENSE for full details.


Built with obsession for security, AI, and clean architecture.

If A-SOC helped you or inspired your work, consider starring โญ the repository.

GitHub Stars

About

A-SOC is an agentic, cloud-native security platform that autonomously detects, analyzes, and mitigates threats using LLM-powered multi-agent reasoning, with real-time visibility, blast-radius analysis, and human-governed automation.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published