LAN-only
Core and agents stay inside your perimeter. No surprise egress.
Zero WAN
No exposed webhooks. mTLS only, within your network fabric.
Audit immuable
Append-only log with signed events and monotonic time.
Deny-by-default
Nothing runs without explicit policy. Fast revocation path.
Core / Agent / UI
Roles split to reduce blast radius and keep visibility clean.
Storytelling
Le probleme a traiter en priorite
Les equipes sensibles ont besoin d infrastructures qui restent dans le perimetre LAN. Sentinel Infra reduit l exposition, clarifie l audit et garde la main sur chaque action.
Cloud dependency
Critical services leaving the LAN = extra attack surface and opaque vendor duties.
Expanded attack surface
Internet-facing endpoints, supply chain opacity, API keys scattered everywhere.
Control dilution
Execution decisions offloaded to remote pipelines you do not own.
Unusable logs
Mutable logs, fuzzy timestamps, no reliable correlation for serious audit.
La reponse
Sentinel Infra, position claire
Aucun composant critique ne sort du LAN. Roles separes, collecte immuable, actions par CLI verifiable. La discipline est imposee par design.
LAN-only core
Runs on your metal. No WAN traffic. Nothing exposed without intent.
Zero WAN channels
Agents talk to Core via internal mTLS. No public callbacks, no remote API.
Immutable audit
Append-only journal, monotonic clock, signed exports for forensics.
Separation of duties
Core / Agents / UI separated. Panel is read-only. Actions via controlled CLI only.
Fonctionnalites
Cartes premium, sans surplus
Chaque composant est limite a son role. Pas de dependance cachee, pas de bouton inutile.
Hardened Core
Policy-driven. No egress.
Minimal orchestrator with deny-by-default, short-lived keys, LAN-only supervision.
Controlled Agents
Profiles per role.
Signed agents, locked capabilities, narrow channels, periodic checks with cert rotation.
Deterministic CLI
Trace every action.
Declarative commands, non-interactive runs, timestamps injected into the audit trail.
Read-only Panel
Visibility without risk.
Isolated UI, filtered events, no action buttons. Ideal for SOC dashboards.
LAN Desktop
Ops-grade client.
Native desktop for operators. Local cache, offline-safe notifications, LAN-first sync.
Immutable Audit
Proof by design.
Hash-chained events, append-only pipeline, signed exports for investigations.
Section SOC
Limiter le mouvement lateral, conserver la preuve, rendre chaque action reversible par politique. Sans WAN. Sans shell libre.
Deny-by-default
No implicit trust. Every flow declared, numbered, and revocable.
No WAN exposure
Strict LAN perimeter. Nothing calls out, nothing listens on the public edge.
No shell access
No opportunistic bastion. Actions are declared, recorded, and replayable.
Audit mandatory
Every action writes to append-only storage. No silent paths.
Architecture
Schema interactif, clair et separe
Core, Agents, Desktop, Panel, CLI. Roles isoles pour limiter les degats en cas de panne ou de compromission. Diagramme interactif pour guider le regard.
Hover / focus pour inspecter
Core
Local authority
Orchestrates policy, signs exchanges, maintains the audit clock. No WAN egress. LAN redundancy ready.
Chemins de communication
- Agents -> Core : mTLS LAN, short-lived certs
- CLI -> Core : signed commands, auto audit
- Panel -> Audit : read-only, zero action path
Cas d usage
Pour les environnements exigeants
Sensitive enterprises
Keep critical services off WAN while retaining full auditability.
Cyber labs
Isolate offensive/defensive sandboxes with trustworthy traces.
Hosts & MSPs
Segment client zones, shrink surfaces, audit without intrusion.
Advanced homelab
Harden personal infra without cloud dependencies or exposed APIs.
Audit & training
Hands-on workshops with reproducible, locally proven executions.
Etat du projet
Transparence visuelle
Pas de promesse creuse. Ce qui est stable, en cours ou prevu est visible sur une timeline lisible.
Stable
V1 delivered and running.- Core
- Agent
- CLI
- Panel read-only
In progress
Actively built now.- Desktop App
Planned
Next milestones in the queue.- Additional services
- SFTP
- DB drivers
Call to action
Audit Sentinel Infra. Evaluate the security model.
No cloud. No tracking. Full control.