Files
Tomas Kracmar 2b969af2a8 feat: Add sovereign tool stack and integrate ASTRAL/AOC across playbooks
New document: Sovereign Tool Stack — complete capability map for our
open-source consulting arsenal.

Documents updated:
- sovereign-tool-stack.md (new): Maps Prowler, BloodHound, CISO Assistant,
  Purple Knight/Forest Druid, ASTRAL, and AOC to engagement modules and
  antifragile pillars. Identifies 6 gaps with recommended closes:
  Wazuh+Sysmon (EDR), Shuffle (SOAR), TheHive+Cortex (case management),
  Cartography (cloud asset mapping), Syft+Grype+Trivy (containers),
  Zeek+Suricata (network analysis). Includes per-module tool pairing,
  deployment complexity matrix, and integration architecture.
- m365-e3-hardening.md: Added ASTRAL 'configuration immunity' section
  and AOC audit log integration references
- endpoint-management-entry-vector.md: Added ASTRAL for Intune
  configuration backup and drift detection
- modular-engagements.md: Added ASTRAL and AOC to Module 1/2/3
  deliverables; linked sovereign tool stack
- retained-capability.md: Added AOC and Wazuh to detection engineering
  description
- ai-assisted-tvm.md: Added AOC and Prowler to discovery layer table
- blue-purple-team-foundation.md: Added sovereign tool stack reference
  for open-source SOC architecture
- zero-budget-hardening.md: Linked sovereign tool stack
- README.md + index.md: Added sovereign-tool-stack.md to navigation
2026-05-09 17:05:18 +02:00

20 KiB
Raw Permalink Blame History

AI-Assisted Threat and Vulnerability Management Blueprint

"Mythos will scan your entire perimeter in hours, not weeks. But here is the asymmetry: Mythos finds vulnerabilities. AI-assisted TVM finds them first, prioritizes them by exploitability in your specific environment, and generates the remediation code before the adversary writes the exploit."

This blueprint provides a concrete, board-ready program for organizations facing the reality that AI-powered adversaries—whether criminal tools or agentic systems like Mythos—can discover and weaponize vulnerabilities faster than human teams can patch them.

It is designed for CTOs who need to go to the board with something tangible: not just "fix the basics," but an active, modern defensive capability that uses artificial intelligence as a force multiplier against AI-powered offence.


The Problem: AI-Powered Offense Changes the Math

Traditional Vulnerability Management

Step Traditional Timeline Human Effort
Scan for vulnerabilities Weekly or monthly Automated scanner
Prioritize findings Days to weeks Analyst reads CVSS, debates internally
Assess exploitability Weeks Manual research, PoC testing
Create remediation Weeks to months Engineering ticket, backlog queue
Validate fix Months Re-scan, manual verification
Total cycle 3-9 months Heavy human bottlenecks

AI-Powered Offense (Mythos-Class)

Capability Impact
Continuous autonomous scanning Perimeter scanned daily, not monthly
Intelligent vulnerability chaining Identifies kill chains: vuln A + vuln B + misconfiguration C = domain compromise
Automated exploit generation Proof-of-concept code generated in minutes for newly disclosed CVEs
Context-aware targeting Prioritizes vulnerabilities on internet-facing, privileged, or unmonitored assets
Speed What took a human red team weeks takes an AI agent hours

The board conversation the CTO fears:

"We have 12,000 open vulnerabilities. Our patching SLA is 90 days for critical. Mythos—or a criminal group using similar tooling—can scan our entire estate, chain our weaknesses, and have an exploit ready before we have even assigned the ticket."

The traditional consultant response (which is correct but insufficient):

"We need to implement CIS IG1, clean up our attack surface, and get our house in order."

The problem: The board has heard this before. The CTO has heard this before. It sounds like the same plan that has failed for five years, now with an AI-shaped deadline.


The Asymmetric Response: AI-Assisted TVM

AI-assisted TVM does not replace basic hygiene. It accelerates it by an order of magnitude. The goal is not to eliminate all vulnerabilities—that is impossible. The goal is to compress the find-to-fix cycle so dramatically that the adversary's AI advantage is neutralized.

Traditional TVM AI-Assisted TVM Speed Multiplier
Scan → prioritize by CVSS Scan → prioritize by exploitability × asset criticality × active threat intelligence 10x faster prioritization
Manual research: "Is this actually exploitable?" AI predicts exploitability from code patterns, social media chatter, and dark web indicators 100x faster assessment
Manual ticket creation and assignment AI generates remediation code, GPO scripts, or Intune policies with human review 10x faster remediation prep
Monthly re-scan to verify Continuous validation via agent-based monitoring and drift detection Real-time verification
Analyst reads 500-page scan report AI synthesizes top 10 actions that reduce risk most into a one-page brief Board-ready in seconds

The Architecture

Layer 1: Discovery and Inventory

Goal: Know what you have before the adversary does.

Source What It Provides AI Enhancement
Defender Exposure Management (E5) Vulnerability inventory, misconfigurations, Secure Score AI prioritizes recommendations by actual exploitability, not just severity
Network scanners (Tenable, Qualys, Rapid7, OpenVAS) Traditional vulnerability scanning AI correlates scan results with threat intel to predict which vulns will be exploited first
Cloud security posture (Defender for Cloud, Prisma, Wiz) Cloud resource misconfigurations AI identifies cloud-specific kill chains (e.g., overly permissive S3 → compromised IAM → lateral movement)
Zero-budget discovery (PowerShell, SSH scripts, Syft/Grype, osquery) Server inventory, SBOMs, package-level CVE correlation AI aggregates script-based findings into unified risk view. See Zero-Budget Vulnerability Discovery
osquery + FleetDM Cross-platform endpoint inventory, real-time process/network data, policy compliance AI queries live endpoint state for prioritization and kill chain simulation. See Osquery: The Sovereign Discovery Platform
AOC (Admin Operations Center) M365 audit log intelligence, anomalous admin behaviour, privilege escalation detection AI enriches insider-threat context with external vulnerability data for complete kill chain picture. See Sovereign Tool Stack
Prowler Multi-cloud security posture (AWS, Azure, GCP) AI correlates cloud misconfigurations with endpoint and identity findings for cross-layer risk scoring. See Sovereign Tool Stack
Attack surface management (Cortex Xpanse, Shodan, Nuclei, Amass) External-facing assets unknown to IT AI maps shadow IT and forgotten assets faster than manual discovery. See Perimeter Scanning Capability
Software bill of materials (SBOM) Known vulnerable components in applications AI monitors SBOMs against real-time CVE disclosure and exploit availability

Layer 2: Intelligent Prioritization

Goal: Stop patching by CVSS. Start patching by probability of exploitation in your environment.

Input AI Processing Output
CVE database + exploit code availability Predictive model: will this be exploited in the wild in the next 7/14/30 days? Risk-ranked vulnerability list
Asset criticality (CMDB + business context) Cross-reference: which vulnerable assets are Tier 0 / Tier 1 / internet-facing? Environment-specific priority
Active threat intelligence (MISP, CISA KEV, vendor advisories) Correlation: are threat actors currently targeting this vulnerability? Threat-informed urgency
Network topology and segmentation Kill chain simulation: can this vulnerability be reached from the internet? From a compromised workstation? Reachability-adjusted risk
Compensating controls Control validation: is the vulnerable host behind WAF? Is EDR monitoring it? Residual risk calculation
External attack surface (perimeter scan findings) Outside-in risk multiplier: internet-facing vulns weighted 10x higher than internal Perimeter-aware priority

The outside-in weighting: A vulnerability on an internet-facing server is 10x more urgent than the same vulnerability on an internal workstation because adversary AI scanners find it first. See Perimeter Scanning Capability.

The result: Instead of 12,000 vulnerabilities sorted by CVSS, the team sees the 50 vulnerabilities that matter this week—ranked by the probability that an AI-powered adversary will exploit them in the client's specific architecture.

Layer 3: Automated Remediation Preparation

Goal: Reduce the time from "identified" to "fix ready" from weeks to hours.

Vulnerability Type AI-Generated Remediation Human Review Required
Missing OS patch PowerShell/Intune update policy + deployment ring recommendation Yes: test and schedule
Misconfigured firewall rule Corrected rule + impact analysis + rollback script Yes: network team validation
Default credential Password randomization script + vault storage + service restart procedure Yes: application owner sign-off
TLS configuration weakness Hardened registry settings / nginx config / Azure Front Door policy Yes: SSL/TLS team validation
Cloud IAM over-permission Least-privilege policy + impact simulation Yes: cloud team review
Container image vulnerability Updated Dockerfile + base image recommendation Yes: CI/CD pipeline test

Key principle: AI generates the draft remediation. Humans validate, test, and deploy. This is not autonomous patching. It is augmented patching—the AI does the research and scripting; the human does the judgment and approval.

Layer 4: Continuous Validation

Goal: Prove that fixes worked and detect drift immediately.

Validation Method AI Enhancement
Re-scan after patch AI correlates patch deployment with scan results; flags failed patches automatically
Configuration drift detection AI baselines "known good"; alerts on deviation within hours, not months
Exploit attempt detection AI monitors EDR/SIEM for exploitation techniques targeting recently disclosed CVEs
Adversarial simulation AI-driven purple team exercises that target the exact vulnerabilities still open

The 30-60-90 Day AI-Assisted TVM Sprint

Phase 1: Baseline and Acceleration (Days 0-30)

Theme: Know your enemy's starting point. Beat them to the first move.

Week 1: Threat-Informed Asset Discovery

  • Inventory all vulnerability scanning sources (Defender Exposure Management, Tenable, Qualys, cloud scanners, or zero-budget scripts if no commercial tools exist)
  • Identify gaps: which assets are not scanned? Which scans are stale?
  • Deploy attack surface management scan: discover what the internet sees
  • Deploy Shadow IT discovery: unknown cloud apps, unapproved infrastructure
  • Run zero-budget discovery sweep on servers without EDR/scanner coverage. See Zero-Budget Vulnerability Discovery

Deliverable: Asset and vulnerability inventory with coverage gaps identified

Week 2: AI-Powered Prioritization Engine

  • Integrate vulnerability data with:
    • CISA Known Exploited Vulnerabilities (KEV) catalog
    • ExploitDB / GitHub exploit availability
    • Dark web chatter monitoring (where feasible)
    • Client's CMDB for asset criticality
  • Deploy local AI model (or Azure OpenAI with structured prompting) to:
    • Synthesize scan results into risk-ranked action list
    • Predict which vulnerabilities will be exploited in next 30 days
    • Generate one-page executive brief weekly

Deliverable: AI-prioritized vulnerability list; first executive brief

Week 3: Remediation Acceleration

  • Select top 20 vulnerabilities from AI-prioritized list
  • Use AI to generate remediation scripts/policies for each
  • Human review and validation
  • Deploy fixes in controlled maintenance windows
  • Measure: time from identification to fix ready vs. historical baseline

Deliverable: 20 critical vulnerabilities remediated or in controlled deployment

Week 4: Validation and Board Briefing

  • Re-scan to validate fixes
  • AI generates before/after risk dashboard
  • Board briefing: "We had 12,000 vulnerabilities. AI identified the 50 that mattered. We fixed the top 20 in 30 days. Here is the trend."

Deliverable: Board-ready TVM dashboard; 30-day metrics report


Phase 2: Operationalization (Days 30-60)

Theme: Make AI-assisted TVM the operating rhythm, not a project.

Week 5-6: Integration into SOC Workflow

  • Vulnerability alerts feed into SOC triage queue
  • AI enriches vulnerability alerts with: exploit availability, asset criticality, business impact
  • SOC analysts can escalate high-risk vulnerabilities as incidents
  • Automated containment: vulnerable internet-facing assets temporarily restricted pending patch

Week 7-8: Automated Remediation Pipeline

  • Build CI/CD pipeline for vulnerability remediation:
    • AI generates patch policy → security team reviews → automated deployment to test ring → validation → production deployment
  • Target: 80% of routine patches (OS, browser, standard apps) automated with human approval
  • Exception handling: complex or risky patches remain manual

Week 9-10: Purple Team Targeting Open Vulnerabilities

  • Purple team exercise: red team attempts to exploit vulnerabilities still open from the AI-prioritized list
  • Measures: Did the SOC detect the exploitation attempt? Did the vulnerability allow compromise? How fast was response?
  • Findings feed back into AI prioritization model

Deliverable: Operating rhythm established; automated pipeline operational; first vulnerability-focused purple team complete


Phase 3: Strategic Advantage (Days 60-90)

Theme: Convert vulnerability management from cost centre to competitive advantage.

Week 11-12: Predictive and Proactive

  • AI monitors CVE disclosure streams in real time
  • Within 24 hours of critical CVE disclosure:
    • AI assesses: are we affected? Which assets? What is the exposure?
    • AI generates: risk assessment, remediation script, communication draft
    • Human team validates and deploys in <48 hours
  • Compare: industry average for critical CVE response is 30-60 days. Target: <48 hours for high-confidence remediations.

Ongoing: Continuous Improvement

  • Weekly AI-generated TVM executive brief
  • Monthly purple team exercise targeting open vulnerabilities
  • Quarterly board report: mean time to remediate, AI prediction accuracy, adversarial simulation results

The Board-Ready Demo Script

When the CTO walks into the boardroom with this program, they bring evidence, not promises.

The 10-Minute Demo

Minute 1-2: The Threat

"Last month, an AI-powered scanning tool identified 12,000 vulnerabilities in our environment. Industry average time to patch a critical vulnerability: 60 days. Industry average time for an AI-powered adversary to weaponize a newly disclosed vulnerability: 5 days. The gap is fatal."

Minute 2-4: The Traditional Response

"Our previous approach was to patch by CVSS score. The board has seen this plan before. It requires 20 additional engineers we cannot hire, 9 months we do not have, and produces a false sense of security because CVSS does not predict exploitability."

Minute 4-7: The AI-Assisted Alternative

[Show the dashboard live]

*"This is our AI-assisted TVM platform. It does not show us 12,000 vulnerabilities. It shows us the 47 vulnerabilities that an adversary is likely to exploit in our specific environment this month, ranked by probability."

[Click on top vulnerability]

*"This vulnerability—CVE-2024-XXXX—is on three of our internet-facing web servers. CVSS score: 7.5. But the AI has cross-referenced exploit availability, our network topology, and active threat intelligence. It predicts 85% probability of exploitation within 14 days. It has already generated the remediation script. We are deploying it tonight."

[Show before/after]

"In 30 days, we reduced our exploitable attack surface by 40%. We did not hire 20 engineers. We used AI to prioritize, generate fixes, and validate. Our mean time to remediate a critical vulnerability dropped from 60 days to 4 days."

Minute 7-10: The Ask

"We are not asking for a three-year transformation. We are asking for a 90-day sprint to operationalize AI-assisted vulnerability management. The investment is less than one senior engineer's annual salary. The return is closing the 55-day gap between adversary weaponization and our remediation."


Tool Stack Recommendations

Microsoft-Centric (Most Common for Our Clients)

Layer Microsoft Tool AI Enhancement
Discovery Defender Exposure Management + Defender for Cloud AI prioritizes exposure recommendations by exploitability
Prioritization Azure OpenAI / local LLM + CISA KEV feed + MISP Predictive exploitability scoring
Remediation Intune + Azure Policy + PowerShell + Azure Automation AI-generated remediation scripts and policies
Validation Defender for Endpoint + Sentinel AI-driven drift detection and adversarial simulation validation
Reporting Power BI + Azure OpenAI synthesis Natural language executive briefs generated automatically

Open-Source and Hybrid

Layer Tool Role
Discovery Wazuh + OpenVAS + osquery/FleetDM + Cloud-native scanners Vulnerability, configuration, and real-time endpoint discovery
Prioritization Local LLM (Llama 3, Mistral) + exploit prediction models On-premise AI for sensitive environments
Remediation Ansible + Puppet + custom scripts Infrastructure-as-code remediation
Validation VulnHub + Atomic Red Team + Caldera Continuous adversarial validation
Reporting Grafana + custom dashboards + LLM synthesis Real-time metrics and executive summaries

The Honest Limitations

AI-assisted TVM is powerful but not magic. Be honest with the board:

What AI TVM Does Well What AI TVM Cannot Do
Prioritizes faster and smarter than humans Cannot patch systems without human approval and testing
Generates remediation scripts and policies Cannot fix architectural debt or design flaws
Predicts which vulnerabilities will be exploited Cannot predict zero-days before disclosure
Validates fixes continuously Cannot replace basic hygiene (CIS IG1 is still mandatory)
Reduces analyst workload by 70% Cannot operate without skilled human oversight

The framing:

"AI-assisted TVM does not replace our need to implement CIS IG1, harden our endpoints, and govern our identities. What it does is compress the vulnerability management cycle from months to days—giving us a fighting chance against adversaries who operate at machine speed. It is the accelerator. Basic hygiene is still the foundation."


Integration With Existing Frameworks

Document Integration Point
Rapid Modernisation Plan AI TVM maps to Phase 1 (Hygiene: visibility), Phase 2 (Control: prioritized remediation), and Phase 4 (Antifragility: continuous learning)
Modular Engagements AI TVM can be delivered as a standalone 90-day module or embedded in Module 3 (M365 Security Hardening) and Module 12 (Blue/Purple Team)
Zero-Budget Hardening AI TVM leverages existing Microsoft tooling (Defender Exposure Management, Intune) before recommending new purchases
Osquery: The Sovereign Discovery Platform osquery provides the owned, queryable data layer for AI prioritization; FleetDM enables continuous endpoint monitoring
Azure OpenAI Sovereignty Bridge Azure OpenAI can power the prioritization and synthesis layers; local AI can power air-gapped environments
Antifragile Risk Register AI TVM directly addresses vulnerability-related risks with convex payoff: small AI investment prevents catastrophic exploitation

Metrics and KPIs

Metric Before 30-Day Target 90-Day Target
Mean time to prioritize critical vuln 14 days 24 hours 4 hours
Mean time to remediate critical vuln 60 days 14 days 4 days
Vulnerabilities with known exploits (open) Unknown Measured <10
% of estate with current scan coverage 60% 90% 98%
AI prediction accuracy (exploited vs. not) N/A 70% 85%
Time to generate remediation script 2 days 2 hours 30 minutes
Executive brief generation time 8 hours 30 minutes 5 minutes (automated)
Purple team detection rate (open vulns) Unknown 50% 80%

For the AI operations inevitability argument, see AI Operations Inevitability. For the business case template, see Business Case Template. For board conversation guidance, see C-Suite Conversation Guide.