An AI-driven Security Control Plane unifying Zero Trust Access (ZTNA), Endpoint Detection (EDR), and Network Detection (NDR) into a single automated enforcement loop.
This is not another XDR platform. SentinelPrime answers a harder question that traditional security tools avoid:
"Why does this access, host, or network flow exist β and what is safe to block right now without breaking production?"
Most security platforms excel at detection but fail at decisive, contextual enforcement. SentinelPrime introduces a control-plane-first architecture where:
- ZTNA is the primary enforcement surface
- EDR and NDR provide deep runtime context
- An AI correlation engine reconstructs intent and attack chains
- Decisions are enforced automatically across identity, endpoint, and network layers
This creates a closed-loop security system instead of alert sprawl.
ββββββββββββββββ
β Identity β (Keycloak)
ββββββββ¬ββββββββ
β
ββββββββΌββββββββ
β ZTNA β (OpenZiti / Pomerium)
β Enforcement β
ββββββββ¬ββββββββ
β
βββββββββββββββΌβββββββββββββββ
β AI Control Plane β
β (Correlation + Decisions) β
ββββββββ¬ββββββββββββ¬ββββββββββ
β β
ββββββββΌβββββββ ββββΌββββββββββ
β EDR β β NDR β
β (Wazuh / β β (Zeek / β
β osquery) β β Suricata) β
βββββββββββββββ ββββββββββββββ
- Control Plane > Tool Sprawl β Centralized decisions, distributed enforcement
- Intent-Aware Security β Evaluate resources based on why they exist, not just activity
- Pre-Access + Post-Access β Combine Zero Trust access control with continuous runtime evaluation
- Vendor-Agnostic β Every component is replaceable
- Research-First β A reference architecture, not a commercial product
| Layer | Component | Technology |
|---|---|---|
| Identity & ZTNA | Identity Provider | Keycloak (OIDC, SAML) |
| ZTNA Enforcement | OpenZiti or Pomerium | |
| Endpoint Detection | EDR Framework | Wazuh + osquery |
| Network Detection | NDR Framework | Zeek + Suricata |
| AI Control Plane | API Framework | FastAPI (Python) |
| Event Streaming | Kafka / Redpanda | |
| Graph Database | Neo4j | |
| ML Models | scikit-learn, PyTorch | |
| Observability | Logs & Metrics | Elasticsearch, Prometheus, Grafana |
- Access Request: User/service requests access via ZTNA
- Telemetry Collection: Runtime data streams from EDR and NDR
- Context Correlation: AI engine correlates identity + host + network context
- Risk Assessment: Risk score and intent computed in real-time
- Automated Enforcement: Decision enforced automatically:
- Revoke access via ZTNA API
- Isolate host via EDR API
- Block network flow via NDR/firewall
- Dynamic Policy Update: Policies adapt based on threat intelligence
- Detection β Enforcement Latency: Time from threat detection to automated response
- Blast Radius: Number of systems affected before containment
- Alert Accuracy: Real incidents vs. false positives
- Policy Effectiveness: Successful access revocations without business impact
- Docker & Docker Compose v2.0+
- Python 3.11+ (for local development)
- 8GB+ RAM recommended
- macOS/Linux (Windows WSL2 supported)
# Clone the repository
git clone https://github.com/Manoj-engineer/SentinelPrime.git
cd SentinelPrime
# Make scripts executable
chmod +x scripts/*.sh deploy.sh
# Deploy all core services
./deploy.sh
# Check service health
./scripts/status.sh
# Send test events
./scripts/quick-test.sh| Service | URL | Credentials |
|---|---|---|
| Control Plane API | http://localhost:8000/docs | No auth (dev mode) |
| Grafana | http://localhost:3001 | admin / sentinelprime |
| Neo4j Browser | http://localhost:7474 | neo4j / sentinelprime |
| Prometheus | http://localhost:9090 | No auth |
| Kibana | http://localhost:5601 | No auth |
- β Control Plane API - FastAPI service with health checks, metrics endpoints
- β Event Ingestion - REST API endpoints for EDR/NDR/ZTNA telemetry
- β Event Streaming - Kafka/Redpanda for real-time event processing
- β Graph Database - Neo4j for attack chain visualization and queries
- β ML Anomaly Detection - Isolation Forest with 10-feature behavioral analysis
- β Risk Scoring Engine - Multi-factor risk calculation (0-1 scale)
- β Correlation Engine - 3 pre-configured rules
- β Metrics Collection - Prometheus with Grafana dashboards
- β Event Storage - Elasticsearch for historical analysis
- β Docker Deployment - Needs to be tested
- β Wazuh adapter code complete
- β osquery adapter code complete
- β Installation guides
- β No actual agents deployed
- β Zeek scripts complete
- β Suricata rules complete
- β Adapter code for event normalization
- β No actual sensors deployed
- β OpenZiti adapter complete
- β Pomerium adapter complete
- β Policy templates
- β No ZTNA service running
- Deploy EDR Agents
- Deploy NDR Sensors
- Deploy ZTNA Service
- ML Model Training
- Enforcement Integration
SentinelPrime/
βββ control-plane/ # AI correlation & decision engine
βββ edr/ # Endpoint Detection & Response
βββ ndr/ # Network Detection & Response
βββ ztna/ # Zero Trust Network Access
βββ orchestration/ # Enforcement engine and playbooks
βββ experiments/ # Attack simulations
βββ scripts/ # Deployment and testing utilities
βββ monitoring/ # Prometheus and Grafana configs
βββ docs/ # Architecture and research notes
βββ docker-compose.yml # Full stack deployment
βββ deploy.sh # One-command deployment
# Test all layers (EDR, NDR, ZTNA event ingestion)
./scripts/test-all-layers.sh
# Send sample events and verify processing
./scripts/quick-test.sh
# Check Neo4j graph data
docker exec -it sentinel-neo4j cypher-shell -u neo4j -p sentinelprime
> MATCH (n)-[r]->(m) RETURN n, r, m LIMIT 25;# Run lateral movement simulation
cd experiments
python lateral_movement.py
# View detected attack chain in Neo4j Browser
# http://localhost:7474This project is an academic/research proof-of-concept that:
- Feasibility of AI-driven security control planes
- Cross-domain correlation (identity + endpoint + network)
- Automated enforcement without human approval
- Vendor-agnostic architecture patterns
- Reproducible experiments and datasets
- Replace enterprise XDR/SIEM products
- Provide production-ready security agents
- Include proprietary threat intelligence
- Offer commercial support or SLAs
- Guarantee security effectiveness
Use for research, experimentation, and learning only.
- QUICKSTART.md - Fast deployment guide
- SETUP_GUIDE.md - Detailed installation instructions
- CREDENTIALS.md - Default passwords and access info
- PROJECT_OVERVIEW.md - Technical deep dive
- ARCHITECTURE.md - System design details
Contributions are welcome! See CONTRIBUTING.md for guidelines.
Areas of Interest:
- New correlation rules and ML models
- Additional EDR/NDR/ZTNA integrations
- Attack simulations and test datasets
- Performance optimizations
- Documentation improvements
Apache License 2.0 - See LICENSE for details.
SentinelPrime builds upon excellent open-source projects:
- Wazuh - HIDS/SIEM platform
- osquery - SQL-based endpoint visibility
- Zeek - Network security monitoring
- Suricata - IDS/IPS engine
- OpenZiti - Zero Trust networking
- Neo4j - Graph database
- FastAPI - Modern Python web framework
For questions, feedback, or collaboration:
- GitHub Issues: Report bugs or request features
- Discussions: Join the conversation
SentinelPrime: An experiment in what security looks like when decisions matter more than dashboards.