Sentinel-X

Autonomous Multi-Agent Security Operations Platform


The Problem

Modern Security Operations Centers (SOCs) are overwhelmed by alert fatigue. Every day, analysts receive thousands of low-to-medium severity alerts — SSH brute-force attempts, suspicious login spikes, anomalous IP scans.

Even for small incidents, analysts must:

  • Parse raw telemetry logs
  • Query historical authentication data
  • Validate threat intelligence
  • Create firewall remediation rules
  • Document incidents for compliance (SOC2, NIST, etc.)

This repetitive workflow increases Mean Time To Respond (MTTR) and distracts teams from high-severity investigations.

Sentinel-X is not designed to replace SOC teams. Instead, it reduces their workload by automatically detecting, enforcing, and documenting clearly defined, repetitive security threats.

We don't just detect threats — we enforce action and complete the compliance loop.


The Solution: A Multi-Agent System (MAS)

Sentinel-X is a sequential, state-driven Multi-Agent System built using Elastic Agent Builder and Elasticsearch.

Instead of one general AI model, we use three specialized agents. Each agent has a narrow, deterministic responsibility and specific Elastic tools. Agents pass structured JSON state to the next stage to ensure reliable multi-step execution.


🕵️ S-X.01 — Threat Triage Engine

Role: The Data Hunter

This agent ingests raw logs and performs contextual threat analysis using live Elasticsearch data.

Tools Used:

Tool Description
platform.core.search Searches historical logs for known malicious IPs and anomaly patterns
platform.core.generate_esql Dynamically generates ES\
platform.core.execute_esql Executes ES\
platform.core.index_explorer Identifies relevant data streams such as logs-network-* or logs-auth-*

Functionality:

S-X.01 extracts Indicators of Compromise (IoCs), maps behavior to MITRE ATT&CK techniques (e.g., T1110), calculates a confidence score, and produces a structured decision: BLOCK or MONITOR.

All decisions are validated against real Elasticsearch cluster data — not prompt-based assumptions.


⚡ S-X.02 — Active Enforcer

Role: The Muscle

This agent transforms threat decisions into enforceable remediation actions.

Tools Used:

Tool Description
platform.core.integration_knowledge Accesses Fleet integration docs for firewalls (Palo Alto, Fortinet, Cisco) to generate accurate JSON payloads
platform.core.get_workflow_execution_status Simulates checking SOAR playbook execution status before proceeding

Functionality:

When S-X.01 issues a BLOCK directive, S-X.02 generates a Zero-Trust deny policy and produces a validated firewall API execution log.

This enables automatic enforcement of repetitive, low-severity threats — eliminating the need for analysts to manually craft firewall rules.


📋 S-X.03 — Compliance & Audit Clerk

Role: The Auditor

Security enforcement is incomplete without compliance documentation.

Tools Used:

Tool Description
platform.core.cases Interfaces with Elastic's native incident management system
platform.core.get_document_by_id Retrieves the exact malicious Elasticsearch document for secure audit attachment

Functionality:

S-X.03 maps the incident and remediation to SOC2 and NIST CSF controls, generates a structured JSON audit ledger, and indexes it back into Elasticsearch.

This ensures every enforcement action is automatically documented and audit-ready.


⚙️ Technical Execution

Sentinel-X is built on Elastic Cloud and connects securely to a Kibana endpoint using API key authentication.

The orchestration layer:

  1. Accepts raw telemetry input
  2. Executes agents sequentially
  3. Passes structured JSON state between agents
  4. Uses Elastic tool calls with defined timeouts
  5. Indexes final compliance records back into Elasticsearch

This architecture ensures deterministic multi-step automation, minimizes hallucination, and demonstrates real tool-driven execution — not simple prompt chaining.


🚀 Potential Impact

Security teams spend significant time handling repetitive, low-to-medium severity incidents such as brute-force attempts and suspicious login spikes. Even minor events can take 15–30 minutes to investigate, enforce, and document properly.

Sentinel-X reduces this workflow to under 30 seconds for clearly defined threat patterns by automating detection, enforcement, and compliance logging in a single pipeline.

By automatically enforcing repetitive threats and generating audit-ready records, Sentinel-X:

  • Reduces alert fatigue:
  • Lowers Mean Time To Respond (MTTR)
  • Improves consistency in remediation actions
  • Minimizes manual compliance documentation effort

This allows SOC analysts to focus on complex, high-severity investigations instead of repetitive operational tasks.

Sentinel-X demonstrates how Elastic Agent Builder can power reliable, multi-step AI agents that perform real operational work — not just analysis, but enforcement and documentation.


💡 What We Liked & Challenges Faced

One of the most powerful aspects of Elastic Agent Builder was assigning clearly scoped tools to each agent. Using generate_esql and execute_esql, our agents reason over real Elasticsearch data instead of static prompts. The integration_knowledge tool enabled the Active Enforcer to generate accurate, documentation-grounded firewall payloads.

A key challenge was building reliable multi-step orchestration. Passing structured JSON state between agents was critical to prevent hallucination and ensure deterministic execution. We also carefully managed tool timeouts and formatting to maintain stable, end-to-end workflow behavior while keeping enforcement realistic and responsible.

Built With

  • agent-builder
  • elastic
  • elastic-cluster
  • elasticsearch
  • mas
  • multi-agent-system
Share this project:

Updates