Netapprove
Pillar 03 / SHIELD

Detection is half the job.
Containment is the other.

Netapprove was built around a simple belief: every confident detection should map to an executable action. We ship five active-response adapters out of the box, a full RBAC layer, and a dry-run-by-default safety policy, so the AI can act, and you stay in control.

/defend ยท ACTIVE RESPONSE Active response panel listing five adapters with health and policy actions
The Adapters

Five ways to make a threat go away.

Each adapter speaks a real protocol, not a vendor-specific REST. That means Netapprove plugs into what you already own.

๐Ÿœ‚

edge_fw

Pushes a deny rule to the perimeter firewall via firewalld / generic NETCONF / vendor REST. Auto-expires.

โš‡

switch_acl

ACL or VLAN move on the access switch, quarantine an endpoint without unplugging the cable.

โŠ•

ssc_alert

Posts a structured alert to your SOC channel (Slack / Teams / SIEM) with full context attached.

โŒ

local_rsp

Runs a local response script, tcpdump capture, host triage, evidence preservation.

โš

radius_coa

Change-of-Authorization on RADIUS / 802.1X. Boots a session, drops a port, swaps a VLAN, live.

โŠ˜

dns_sink

Sinkhole a hostile FQDN on your resolver to neutralize C2 without touching endpoints.

Dry-run by default. Promote when ready.

Every new policy lands in dry-run mode. Netapprove logs what would have been blocked so you can audit a week of decisions before flipping a switch. Once you trust it, promote with one click.

  • Side-by-side dry-run vs live action log
  • Per-adapter, per-severity promotion
  • Manual override always available
/defend Defend dry-run mode

A real SOAR, not a webhook.

The SOAR page lets you compose multi-step playbooks, "if a host beacons to a KEV-flagged peer for > 60s, capture pcap, sinkhole the FQDN, and quarantine the host via RADIUS CoA". Conditions, fan-out, and rollback are first-class.

  • Conditional branching on AI confidence + severity
  • Sequential, parallel, and fan-out steps
  • Built-in rollback & expiry per action
/soar SOAR playbook editor

RBAC & an audit log you can defend in court.

Every action, manual or automated, is signed, timestamped, and stored append-only. Three default roles (Administrator, Support, Read-Only) cover most tenants; custom roles are a checkbox grid away.

  • Per-action signed audit log
  • Three-role baseline + custom roles
  • Approval workflow for high-blast-radius actions
/security-score Risk Score dashboard
Audit & Compliance

Built to fit your auditor’s control library.

Netapprove maps every detection, every automated action, and every audit-log entry to internationally recognized control frameworks, used as a technical control library to fill in the engineering detail behind the regulator’s announcement, not to replace it.

Governance

COBIT 2019

ISACA Governance & Management of IT

IT governance, board oversight, control objectives mapped to detection & response evidence.

ISMS

ISO/IEC 27001 · 27002

Information Security Management System

Annex A controls (A.5–A.8) evidenced via continuous monitoring, alerting, and signed audit log.

Risk

ISO/IEC 27005

Information Security Risk Management

Live risk-score posture (A–F) feeds the ISO 27005 risk register with empirically observed exposure.

PIMS

ISO/IEC 27701

Privacy Information Management

Maps to PDPA / GDPR DPIA, surfaces processor and sub-processor traffic patterns for DPO review.

BCM

ISO 22301

Business Continuity Management

RTO/RPO-relevant disruption detection; auto-evidence for BIA & recovery exercises.

Framework

NIST CSF 2.0

Govern · Identify · Protect · Detect · Respond · Recover

Each Netapprove pillar (See / Learn / Shield) is tagged to the corresponding CSF function for one-to-one auditor mapping.

Controls

NIST SP 800-53 / 800-171

Security & Privacy Controls

SI-4 (system monitoring), AU-* (audit), IR-* (incident response) evidenced automatically.

IR

NIST SP 800-61

Computer Security Incident Handling

LLM-generated triage narrative aligns to the Prepare · Detect · Contain · Eradicate · Recover lifecycle.

Baseline

CIS Controls v8

Technical Security Baseline (IG1–IG3)

Implementation Group evidence for CIS 13 (network monitoring) & CIS 17 (incident response).

Payment

PCI DSS v4.0.1

Payment Card Industry Data Security

CDE segmentation evidence, Req. 10 logging, Req. 11 anomaly detection, Req. 12 incident response.

Supplier

ISO/IEC 27036

Supplier / Third-Party Security

Detects unsanctioned third-party traffic, shadow SaaS, and 4th-party data flows for supplier risk reviews.

The control library above is a starting point. Netapprove ships with a customizable mapping engine, auditors can tag any detection rule, baseline, or response action against your local regulator’s announcement (BoT, OIC, SEC, MAS, etc.) so that one signal produces evidence for multiple frameworks at once.

See. Learn. Shield.
Three pillars, one platform.

Ready to put Netapprove on your wire? It takes a SPAN port and an afternoon.