Skip to main content

Use Case

Identify security vulnerabilities in network devices and suggest or apply corrections based on Firewall configurations.

Problem

Lack of visibility and automation to identify security risks and correct them.

Solution

This was the process where Centurion orchestrated a multi-agent workflow to identify vulnerabilities and apply corrections via firewall (Fortigate FGT-NM):
Action: Centurion directed the Perseus agent to perform an infrastructure scan, identifying connected devices, operating systems, and exposed services.Result Achieved: Centurion gained a comprehensive blueprint of the network assets and potential security gaps.
Action: Utilizing the collected data, Centurion tasked Perseus with correlating device configurations against known vulnerabilities (CVEs) and internal policy rules.Result Achieved: A strategic risk assessment was produced, prioritizing vulnerabilities for orchestrated remediation.
Action: Centurion formulated a remediation strategy and instructed Hydra to prepare corrections on the Fortigate FGT-NM.Details: Hydra analyzed the strategic plan and prepared specific firewall policy updates, IPS adjustments, and network segmentation rules to mitigate the risks.Result Achieved: An actionable remediation plan, ready for automated application upon approval.
Action: Upon approval, Hydra applied the suggested corrections directly to the Fortigate FGT-NM.Details: This step was executed with caution, ensuring that changes were made according to best practices and with minimal impact on network operation.Result Achieved: Firewall configurations were updated to mitigate the identified vulnerabilities.
Action: The Scribe agent was utilized to compile a detailed document of the entire process, including the vulnerabilities found, correction suggestions, and applied actions.Details: The document included an executive summary, methodology used, analysis results, and implemented firewall configurations.Result Achieved: A professional PDF report was generated, documenting the analysis and corrections performed.

Key Benefits

Device Information

Comprehensive network and vulnerability identification

Intelligent Orchestration

Coordinated multi-agent workflow for complete security assessment

Firewall Integration

Direct integration with Fortigate for automated policy management

Professional Documentation

Complete audit trail and compliance reporting

Technical Requirements

  • Fortigate FGT-NM firewall with SSH access
  • Integration ID: d8d0d5dc-236a-4755-a7e6-a509b0403f89
  • Network Access: Perseus agent needs network scanning capabilities
  • CVE Database: Access to vulnerability databases for analysis
  • Documentation: Scribe agent for report generation
This use case can be extended to other firewall vendors by adapting the Hydra agent integration parameters and firewall-specific commands.