Insec
INSEC is a privacy-respectful, enterprise-grade insider-threat detection and response platform. It reduces data exfiltration, account misuse, policy violations, and sabotage by combining endpoint telemetry, UEBA (user & entity behavior analytics), policy controls, and automated response.
Install / Use
/learn @yashab-cyber/InsecREADME
# INSEC: Enterprise Insider-Threat Protection
Tagline: "Stop data walking out the door."
INSEC is a privacy-respectful, enterprise-grade insider-threat detection and response platform. It reduces data exfiltration, account misuse, policy violations, and sabotage by combining endpoint telemetry, UEBA (user & entity behavior analytics), policy controls, and automated response.
🚀 Quick Start
# Clone the repository
git clone https://github.com/yashab-cyber/insec.git
cd insec
# Build all components
./scripts/build.sh
# Start the server
cd server && go run main.go
# Start the UI (in another terminal)
cd ui && npm start
# Build and run the agent
cd agent && cargo build --release
./target/release/insec-agent
🏗️ Architecture
Endpoint Agent (INSEC Agent)
- Cross-platform (Windows/macOS/Linux) using Rust.
- Collects telemetry, enforces policies, runs local detections, performs containment actions.
- Low resource usage: <2% CPU p95 idle, <200MB RAM.
- Auto-update, offline cache/queue, self-protection, signed binaries.
Control Plane (INSEC Cloud/Server)
- Services: AuthN/Z (SAML/OIDC, SCIM), Policy Engine, Analytics/UEBA, Alerting, Orchestrator, API Gateway, Event Ingest, Storage.
- Multi-tenant, horizontally scalable, stateless services with message bus (NATS/Kafka).
- Encrypt data in transit (mTLS) and at rest (AES-256, envelope keys; per-tenant keys).
Data Plane
- Hot path: event ingest → stream processing → rules engine → UEBA scores → alerting.
- Warm path: data lake for historical search, reporting, model training.
Admin UI (INSEC Console)
- Web app (React/TypeScript) with RBAC: Org Admin, SecOps Analyst, Auditor, Read-Only.
- Dashboards, investigations, policy editor, search & analytics.
📁 Project Structure
agent/: Rust project for endpoint agent.server/: Go project for control plane services.ui/: React TypeScript app for console.docs/: Documentation.scripts/: Build and deployment scripts.tests/: Test suites.
🛠️ Getting Started
- Install dependencies: Rust, Go, Node.js.
- For agent:
cd agent && cargo build. - For server:
cd server && go build. - For UI:
cd ui && npm start.
🎯 Core Use Cases
- Data Exfiltration detection.
- Privilege Misuse.
- Account Compromise.
- Policy Violations.
- Lateral Movement & Recon.
- Insider Fraud/Sabotage.
🔒 Compliance & Privacy
- Per-policy masking/redaction.
- No keystrokes/no content by default.
- Configurable data retention.
- Region pinning & tenant KMS integration.
🔍 Detection & Analytics
- Rules Engine with deterministic rules.
- UEBA with baseline modeling.
- Correlation for narratives.
- False-positive controls.
⚡ Response & Orchestration
- Automations/Playbooks.
- Approval gates for high-impact actions.
- Forensics with artifact capture.
🔗 Integrations
- Identity & Device: Okta/Azure AD/Google.
- SIEM/SOAR: Splunk, Elastic, Sentinel.
- Ticketing/ChatOps: Jira/ServiceNow, Slack/Teams.
- Dev/Cloud: GitHub/GitLab, AWS/GCP/Azure.
🛡️ Security & Hardening
- Code-signing and notarization.
- mTLS with cert pinning.
- Agent self-protection.
- Supply chain security.
📊 Performance & Reliability
- <50ms event enqueue latency on-host.
- <5s end-to-end alerting p95.
- Auto-update with staged rollouts.
📦 Packaging & Deployment
- Windows: MSI with signed binaries.
- macOS: Notarized PKG.
- Linux: DEB/RPM + systemd units.
👁️ Observability & QA
- Metrics, tracing, structured logs.
- Unit, integration, load tests.
- Golden datasets for regression.
🌐 APIs
- Ingest:
/v1/events. - Query:
/v1/search,/v1/entities. - Alerts:
/v1/alerts. - Policies:
/v1/policies. - Webhooks with OAuth2.
🤝 Contributing
We welcome contributions! Please see our Contributing Guide for details.
📞 Support & Community
- 📧 Email: yashabalam707@gmail.com
- 💬 Discord: ZehraSec Community Server
- 📱 WhatsApp: Business Channel
💰 Support INSEC Development
Your donations help accelerate the development of advanced insider-threat protection tools. See DONATE.md for donation options and funding goals, or CRYPTO.md for cryptocurrency donations.
🌐 Connect with Us
Official Channels:
- 🌐 Website: www.zehrasec.com
- 📸 Instagram: @_zehrasec
- 📘 Facebook: ZehraSec Official
- 🐦 X (Twitter): @zehrasec
- 💼 LinkedIn: ZehraSec Company
👨💻 Connect with Yashab Alam
- 💻 GitHub: @yashab-cyber
- 📸 Instagram: @yashab.alam
- 💼 LinkedIn: Yashab Alam
📄 License
This project is licensed under the Apache License 2.0 - see the LICENSE file for details.
Made with ❤️ by Yashab Alam and the ZehraSec team
*Repository: github.com/yashab-cyber/insec*NSEC: Enterprise Insider-Threat Protection
Tagline: “Stop data walking out the door.”
INSEC is a privacy-respectful, enterprise-grade insider-threat detection and response platform. It reduces data exfiltration, account misuse, policy violations, and sabotage by combining endpoint telemetry, UEBA (user & entity behavior analytics), policy controls, and automated response.
Architecture
Endpoint Agent (INSEC Agent)
- Cross-platform (Windows/macOS/Linux) using Rust.
- Collects telemetry, enforces policies, runs local detections, performs containment actions.
- Low resource usage: <2% CPU p95 idle, <200MB RAM.
- Auto-update, offline cache/queue, self-protection, signed binaries.
Control Plane (INSEC Cloud/Server)
- Services: AuthN/Z (SAML/OIDC, SCIM), Policy Engine, Analytics/UEBA, Alerting, Orchestrator, API Gateway, Event Ingest, Storage.
- Multi-tenant, horizontally scalable, stateless services with message bus (NATS/Kafka).
- Encrypt data in transit (mTLS) and at rest (AES-256, envelope keys; per-tenant keys).
Data Plane
- Hot path: event ingest → stream processing → rules engine → UEBA scores → alerting.
- Warm path: data lake for historical search, reporting, model training.
Admin UI (INSEC Console)
- Web app (React/TypeScript) with RBAC: Org Admin, SecOps Analyst, Auditor, Read-Only.
- Dashboards, investigations, policy editor, search & analytics.
Project Structure
agent/: Rust project for endpoint agent.server/: Go project for control plane services.ui/: React TypeScript app for console.docs/: Documentation.scripts/: Build and deployment scripts.tests/: Test suites.
Getting Started
- Install dependencies: Rust, Go, Node.js.
- For agent:
cd agent && cargo build. - For server:
cd server && go build. - For UI:
cd ui && npm start.
Core Use Cases
- Data Exfiltration detection.
- Privilege Misuse.
- Account Compromise.
- Policy Violations.
- Lateral Movement & Recon.
- Insider Fraud/Sabotage.
Compliance & Privacy
- Per-policy masking/redaction.
- No keystrokes/no content by default.
- Configurable data retention.
- Region pinning & tenant KMS integration.
Detection & Analytics
- Rules Engine with deterministic rules.
- UEBA with baseline modeling.
- Correlation for narratives.
- False-positive controls.
Response & Orchestration
- Automations/Playbooks.
- Approval gates for high-impact actions.
- Forensics with artifact capture.
Integrations
- Identity & Device: Okta/Azure AD/Google.
- SIEM/SOAR: Splunk, Elastic, Sentinel.
- Ticketing/ChatOps: Jira/ServiceNow, Slack/Teams.
- Dev/Cloud: GitHub/GitLab, AWS/GCP/Azure.
Security & Hardening
- Code-signing and notarization.
- mTLS with cert pinning.
- Agent self-protection.
- Supply chain security.
Performance & Reliability
- <50ms event enqueue latency on-host.
- <5s end-to-end alerting p95.
- Auto-update with staged rollouts.
Packaging & Deployment
- Windows: MSI with signed binaries.
- macOS: Notarized PKG.
- Linux: DEB/RPM + systemd units.
Observability & QA
- Metrics, tracing, structured logs.
- Unit, integration, load tests.
- Golden datasets for regression.
APIs
- Ingest:
/v1/events. - Query:
/v1/search,/v1/entities. - Alerts:
/v1/alerts. - Policies:
/v1/policies. - Webhooks with OAuth2.
Acceptance Criteria for v1
- Agents enroll and stream events with mTLS.
- Policies deploy in <5 minutes.
- Detect and alert on key scenarios.
- Automated responses: host isolation, USB block, ticket creation.
- RBAC in Console; audit log.
- SIEM integration.
- Performance targets met.
- Privacy controls implemented.
