"Most security tools alert you. A-SOC acts."
A-SOC is a cloud-native, AI-native security operations platform that autonomously detects, investigates, and remediates threats using a coordinated fleet of specialized LLM-powered agents โ with human governance built in.
๐ Quick Start ยท ๐๏ธ Architecture ยท ๐ฎ Demo ยท ๐ข Deploy
Traditional Security Operations Centers (SOCs) are drowning in alerts. Analysts face:
- Thousands of low-fidelity alerts daily, leading to alert fatigue
- Static, rule-based SIEMs that miss novel, zero-day attack patterns
- Slow mean-time-to-respond (MTTR) due to manual investigation workflows
- Compliance documentation that is tedious, inconsistent, and error-prone
A-SOC solves all of this with a coordinated fleet of AI agents.
| Feature | Description |
|---|---|
| ๐ต๏ธ Multi-Agent Architecture | Specialized agents (Telemetry, Detection, Forensics, Response, Compliance) operate as a coordinated team |
| ๐ง LLM-Powered Analysis | LLMs contextualize alerts, dramatically reducing false positives vs. static rules |
| โก Real-Time Threat Streaming | WebSocket-based live feed pushes events to the dashboard as they happen |
| ๐ Human-in-the-Loop Governance | High-risk actions (IAM revocation, firewall changes) require explicit human authorization |
| ๐ธ๏ธ Blast Radius Visualization | Interactive attack graph shows which resources are affected and how far the threat can spread |
| ๐ Immutable Audit Trail | Every action and LLM decision is cryptographically logged for SOC2/ISO 27001 compliance |
| ๐ฎ Policy-as-Code | Open Policy Agent (OPA) enforces corporate policy on every proposed remediation action |
| ๐จ Premium Dashboard | Cinematic, glassmorphism UI built with Next.js 14, providing a state-of-the-art operator experience |
| Layer | Technology | Purpose |
|---|---|---|
| Backend | FastAPI |
High-performance async REST API & WebSocket server |
LangGraph |
Agent state machine & multi-agent orchestration | |
LangChain |
LLM abstraction layer (OpenAI / Anthropic / DeepSeek) | |
Open Policy Agent (OPA) |
Policy-as-Code engine with Rego for governance | |
PostgreSQL + Redis |
Persistent state storage & real-time caching | |
Docker Compose |
Containerized local and production deployment | |
| Frontend | Next.js 14 |
React framework with App Router for the operator dashboard |
Tailwind CSS |
Utility-first styling & glassmorphism design system | |
React Flow / Custom SVG |
Interactive blast radius attack graph visualization | |
WebSockets |
Real-time bidirectional event streaming to the UI |
A-SOC operates on a Hub-and-Spoke multi-agent model, orchestrated by a central Supervisor agent that enforces corporate policy on every decision and routes tasks to the appropriate specialist.
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ A-SOC Agent Platform โ
โ โ
โ โโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ Log Sources โ โ Agent Fleet โ โ
โ โโโโโโโโโโโโโโโ โ โ โ
โ โ CloudTrail โโโโโถโ โ TELEMETRY AGENT โ โ
โ โ VPC Flow โ โ Ingests & normalizes raw log data โ โ
โ โ K8s Audit โ โ โ โ โ
โ โโโโโโโโโโโโโโโ โ โผ โ โ
โ โ โก DETECTION AGENT โ โ
โ โ Analyzes anomalies โ โ
โ โ Assigns Risk Score (0โ100) โ โ
โ โ โ โ โ
โ โ โผ โ โ
โ โ โข SUPERVISOR AGENT โโโ OPA Policy โ โ
โ โ โโโโโโโโโโโโโโโโโโโโโโ โ โ
โ โ โ Risk < 70? โ โ โ
โ โ โ YES โ Auto-remediateโ โ โ
โ โ โ NO โ Human Approvalโ โ โ
โ โ โโโโโโโโโโโโโโโโโโโโโโ โ โ
โ โ โ โ โ โ
โ โ โผ โผ โ โ
โ โ โฃ FORENSICS Human Dashboard โ โ
โ โ AGENT (Blast Radius + โ โ
โ โ (Attack Authorize Modal) โ โ
โ โ Graph) โ โ โ
โ โ โ โ โ โ
โ โ โโโโโโฌโโโโโโ โ โ
โ โ โผ โ โ
โ โ โค RESPONSE AGENT โ โ
โ โ Executes remediation โ โ
โ โ (Block IP, Revoke Keys, etc.) โ โ
โ โ โ โ โ
โ โ โผ โ โ
โ โ โฅ COMPLIANCE AGENT โ โ
โ โ Maps incident โ SOC2 / ISO 27001 โ โ
โ โ Logs cryptographic evidence โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
| Agent | Role |
|---|---|
| โ Telemetry Agent | Ingests and normalizes logs from CloudTrail, VPC Flow Logs, and Kubernetes Audit logs into a unified event schema. |
| โก Detection Agent | Applies LLM-powered reasoning to identify anomalies, correlate events, and assign a continuous Risk Score (0โ100). |
| โข Supervisor Agent | The orchestrator. Evaluates every detection against OPA policies and routes: score < 70 โ auto-remediate, score โฅ 70 โ escalate to human. |
| โฃ Forensics Agent | Constructs the Blast Radius โ a real-time graph of which resources have been touched, compromised, or are at risk. |
| โค Response Agent | Executes the approved remediation playbook. Actions include IP blocking, credential revocation, and quarantine. |
| โฅ Compliance Agent | Automatically maps every incident and action to compliance frameworks (SOC2, ISO 27001) and writes immutable, signed audit records. |
A-SOC is designed with a defense-in-depth philosophy applied to the platform itself:
- Principle of Least Privilege: Each agent only has the tool-access it needs. The Compliance Agent cannot execute remediations.
- Immutable Audit Log: All LLM reasoning chains and tool invocations are stored with cryptographic signatures, making them tamper-evident.
- Human-in-the-Loop for High-Stakes Actions: No IAM key revocation, firewall rule change, or instance termination can happen without explicit operator authorization. The system is designed to make humans the last line of defense, not the bottleneck.
- Policy-as-Code via OPA: Governance is not hardcoded in Python. It lives in versioned, reviewable Rego policy files, making it auditable and easy to update.
- Zero Trust Agent Communication: Inter-agent communication is mediated by the LangGraph state machine, with no direct side-channel communication between agents.
Ensure the following are installed on your machine:
- Python
3.10+ - Node.js
18+ - Docker & Docker Compose (optional, but recommended)
- An API key for OpenAI or Anthropic
The fastest way to get the full A-SOC stack running locally.
# 1. Clone the repository
git clone https://github.com/Ismail-2001/Autonomous-Secure-AI-Operations-Center.git
cd Autonomous-Secure-AI-Operations-Center/a-soc
# 2. Configure your environment
cp .env.example .env
# Open .env and add your OPENAI_API_KEY (or ANTHROPIC_API_KEY)
# 3. Launch the entire stack (API + Dashboard + PostgreSQL + Redis)
docker-compose up -d
# 4. Verify all services are healthy
docker-compose psโ
Dashboard is live at http://localhost:3000
โ
API is live at http://localhost:9001/docs
git clone https://github.com/Ismail-2001/Autonomous-Secure-AI-Operations-Center.git
cd Autonomous-Secure-AI-Operations-Center/a-soc# Create and activate a virtual environment
python -m venv venv
source venv/bin/activate # macOS/Linux
# venv\Scripts\activate # Windows
# Install backend dependencies
pip install -r requirements.txt
# Configure environment variables
cp .env.example .env
# Edit .env โ at minimum, set OPENAI_API_KEY
# Start the API server on port 9001
python -m uvicorn api:app --host 0.0.0.0 --port 9001 --reload# From the project root, navigate to the dashboard
cd dashboard
# Install frontend dependencies
npm install
# Start the development server (port 3000)
npm run devCopy .env.example to .env and populate the following:
# --- LLM Provider (choose one) ---
OPENAI_API_KEY=sk-...
# ANTHROPIC_API_KEY=sk-ant-...
# --- Database ---
DATABASE_URL=postgresql://user:password@localhost:5432/asoc
REDIS_URL=redis://localhost:6379
# --- Security ---
SECRET_KEY=your-super-secret-key-here
# --- OPA Policy Engine ---
OPA_URL=http://localhost:8181Once both backend and frontend are running:
- Open the Dashboard โ Navigate to
http://localhost:3000 - Start a Simulation โ Click the "Start Simulation" button in the top right corner
- Watch the Agent Fleet โ Observe the real-time log stream as each agent processes incoming threat telemetry
- Review Detections โ See risk scores assigned and watch the Blast Radius graph build dynamically
- Authorize a High-Risk Action โ When the "High Risk Action Proposed" modal appears, review the full context and Blast Radius, then click "Authorize" to execute the remediation
For production environments, see the detailed DEPLOYMENT.md guide which covers:
- AWS ECS (Fargate): Scalable serverless container deployment
- Kubernetes: Full Helm chart manifests in
k8s/ - Vercel: Frontend-only serverless deployment
- Monitoring: Prometheus + Grafana stack integration
- Security Hardening: TLS, secrets management, WAF configuration
| Platform | Backend | Frontend | Guide |
|---|---|---|---|
| AWS ECS Fargate | โ Supported | โ S3 + CloudFront | DEPLOYMENT.md#aws |
| Kubernetes | โ Any cluster | โ Ingress | k8s/ |
| Docker Compose | โ Self-hosted | โ Included | docker-compose up -d |
| Vercel | โ | โ Serverless | DEPLOYMENT.md#vercel |
v1.0 โ Core Platform (Complete โ )
- Multi-Agent orchestration via LangGraph
- Real-time WebSocket event streaming
- Human-in-the-Loop approval workflow
- Interactive Blast Radius visualization
- OPA Policy-as-Code integration
- Immutable, cryptographically-signed audit trail
v1.5 โ Cloud Integration (In Progress ๐จ)
- Live AWS account integration via Boto3 (CloudTrail, GuardDuty, SecurityHub)
- Slack / Microsoft Teams notification integration
- JIRA ticket auto-creation for approved incidents
v2.0 โ Advanced Intelligence (Planned ๐)
- Fine-tuned local LLM support (Llama 3) for air-gapped deployments
- Advanced Threat Hunting interface with natural language queries
- MITRE ATT&CK framework automatic tactic/technique mapping
- Multi-cloud support (GCP, Azure)
Contributions are welcome! This project is designed to be extended:
- Fork the repository
- Create your feature branch:
git checkout -b feature/your-amazing-feature
- Commit your changes:
git commit -m 'feat: add amazing feature' - Push to your branch:
git push origin feature/your-amazing-feature
- Open a Pull Request against
main
Please follow Conventional Commits for your commit messages and add tests for any new agent logic.
Distributed under the MIT License. See LICENSE for full details.