Skip to main content

Welcome to AuroraSOC

AuroraSOC is an AI-powered Security Operations Center platform designed to help teams detect, investigate, and respond to security events faster while keeping humans in control of high-risk decisions.

It combines:

  • A FastAPI backend and Next.js dashboard
  • A multi-agent investigation system (1 orchestrator + 13 specialist agents)
  • Domain tools through MCP (SIEM, SOAR, EDR, threat intel, CPS/IoT, and more)
  • Event-driven processing with Redis Streams, NATS, and MQTT
  • Security-by-design features such as role-based access and human approval gates

Start Here in 60 Seconds

If this is your first time, follow this order:

  1. Read Learning Paths and pick your role.
  2. Complete Quick Start.
  3. If you want the real agent mesh, continue with AI Agent Fleet Deployment.
  4. Open Dashboard Overview.
  5. Run one end-to-end workflow from Common Workflows.

If you are already running AuroraSOC, jump directly to the topic you need in the sidebar.

Mental Model (Beginner-Friendly)

Think of AuroraSOC as a coordinated SOC team:

  • The orchestrator receives a task.
  • It delegates sub-tasks to specialist agents.
  • Specialists call domain tools to gather evidence.
  • Results are correlated and returned to API/UI.
  • Human approval is required for high-impact actions.

What AuroraSOC Solves

ProblemTraditional SOC PainAuroraSOC Approach
Alert overloadAnalysts manually triage high volumeAI-assisted triage, enrichment, and prioritization
Slow investigationsContext scattered across toolsMulti-agent evidence gathering + unified case flow
Inconsistent response qualityDepends on analyst experienceStandardized playbooks and guardrails
CPS/IoT visibility gapsOT/IoT data not correlated with cyberPhysical-cyber correlation and attestation workflows
Poor auditabilityDifficult to reconstruct decisionsStructured logs, traces, and investigation timeline

Key Concepts You Should Know

TermMeaning
OrchestratorThe coordinator agent that routes work to specialists
Specialist AgentDomain-focused agent (e.g., Threat Hunter, Malware Analyst, CPS Security)
MCP ToolA capability exposed through a tool server (search logs, isolate endpoint, run playbook, etc.)
A2AAgent-to-agent communication protocol between orchestrator and specialists
InvestigationA structured execution path for an alert/case from triage to resolution
Approval GateHuman decision point required before high-risk actions

Learn by Role

SOC Analyst / Operator

Start with:

SOC Lead / Manager

Start with:

Security Engineer / Platform Engineer

Start with:

First Real Workflow (10-15 Minutes)

  1. Launch the stack from Quick Start.
  2. Log in and open the alerts queue.
  3. Pick one high-severity alert.
  4. Trigger investigation.
  5. Review generated findings and timeline.
  6. Move alert to a case and apply a playbook in dry-run mode.
  7. Complete or close with notes.

After this flow, you will understand the core AuroraSOC operating model.

Frequently Asked Questions

Is AuroraSOC fully autonomous?

No. AuroraSOC automates analysis and recommendations, but high-impact operations can require human approval.

Do I need to understand all 14 agents before I can use the platform?

No. Start with dashboard workflows first. You can learn agent internals incrementally.

Where should developers start?

Use Developer Architecture Overview, then Settings System, then API Reference.

Where can I find complete setup paths by role?

See Learning Paths.