Sekoia XDR Integration
Forward Noxys AI interaction events to Sekoia XDR for centralized European threat detection and incident response.
Overview
This integration enables:
- Real-time event streaming to Sekoia via webhook
- Automated threat detection on AI platform usage
- Incident correlation combining AI and endpoint data
- EU data residency — All data stays in Europe
- Compliance reporting for GDPR and EU AI Act
Data Flow:
Noxys Event → Webhook → Sekoia API → Event correlation → Incidents & Alerts
Why Sekoia for European Organizations?
- EU headquarters in Paris
- Data residency — All data stored in EU
- GDPR compliant — No US cloud dependency
- Specialized in European threats (APTs targeting EU)
- Supports EU AI Act compliance
Prerequisites
- Sekoia account with XDR module enabled
- Sekoia API key (space-level)
- Noxys admin role
- HTTPS connectivity
Step 1: Get Sekoia API Credentials
Create API key in Sekoia for Noxys access.
- Sekoia Intelligence Center → Settings → API
- Click Create New API Key
- Configure:
- Name:
Noxys AI Firewall - Type:
API Key - Space: Your workspace
- Name:
- Select Scopes:
- ✓
events_write— Create events - ✓
alerts_write— Create alerts - ✓
cases_write— Create cases (optional)
- ✓
- Click Generate
- Copy the API Key (shown once)
Step 2: Configure Webhook in Noxys
Set up event forwarding to Sekoia.
- Noxys Admin Panel → Integrations → Webhooks
- Click Create Webhook
- Configure:
| Field | Value |
|---|---|
| URL | https://api.sekoia.io/api/v1/events |
| Events | Select: interaction.policy_violated, interaction.high_risk, alert.severity_critical, alert.severity_high |
| Headers | Add: Authorization: Bearer <api-key-from-step-1> |
| Description | "Sekoia XDR Integration" |
- Click Create
- Click Test to verify
Step 3: Verify Events in Sekoia
Confirm events are being received.
- Sekoia Intelligence Center → Events
- Filter:
source="noxys" - Should see recent events:
- Platform: chatgpt, claude, gemini, etc.
- Risk score and classifications
- Policy decisions (Block, Coach, Log)
Step 4: Create Detection Rules
Build threat detection rules in Sekoia.
Rule 1: Block PII on Unvetted Platform
- Sekoia XDR → Detection & Response → Rules
- Click Create Rule
- Configure:
Name: "Policy violation on unvetted AI platform"
Logic:
event_type == "interaction.policy_violated"
AND platform_id NOT IN ["chatgpt", "claude", "gemini"]
AND classification_count > 0
Severity: High
Action:
- Create alert
- Notify SOC team
- (Optional) Create case in SOAR
- Save & Activate
Rule 2: Repeated High-Risk Interactions
event_type == "interaction.high_risk"
| stats count by user_id
| where count > 5 in last 1 hour
→ Severity: Medium
→ Create alert
Rule 3: Financial Data Exposure
event_type == "interaction.high_risk"
AND classification_type IN ["CREDIT_CARD", "IBAN"]
AND risk_score > 0.9
→ Severity: Critical
→ Create case in SOAR for immediate investigation
Step 5: Create Incident Response Playbook
Automate responses to detected threats.
- Sekoia SOAR → Playbooks → Create Playbook
- Configure:
Trigger: Alert from Noxys (Rule 1 above)
Steps:
-
Extract user_id and platform_id from event
-
Query user's recent activity
-
Check if user has security awareness training
-
Create incident case
-
Notify user's manager
-
Schedule security review meeting
-
Enable Playbook
Step 6: Build Dashboard
Create visibility dashboard in Sekoia.
- Sekoia Intelligence Center → Dashboards → Create
- Add widgets:
Widget 1: AI Interaction Volume
Count of events where source="noxys"
Group by platform_id, time
Widget 2: Policy Violations
Count of events where event_type="interaction.policy_violated"
Group by policy_name
Widget 3: High-Risk Interactions
Count of events where risk_score > 0.8
Sparkline showing trend
Widget 4: Top Users with Violations
Count of events by user_id
Top 10 users
Step 7: Integration with Sekoia Cases (SOAR)
Automatically create cases for incident response.
-
Create webhook that triggers case creation:
- Trigger:
alert.severity_criticalevent - Action: Create case in Sekoia SOAR
- Case template: "AI Platform Violation"
- Trigger:
-
Case automatically includes:
- Event details
- User information
- Policy violation context
- Recommended response actions
-
Assign case to SOC analyst for investigation
Step 8: Verify Integration
Confirm end-to-end integration is working.
- In Noxys:
- Create test interaction with high PII count
- Trigger a policy violation
- In Sekoia:
- Check events appear in 1-2 seconds
- Verify detection rules trigger
- Confirm alerts are created
- Test notification flow:
- Check email/Slack notification received
- Verify case created (if applicable)
Advanced: Threat Intelligence Integration
Connect Sekoia's threat intelligence to Noxys policies.
-
In Sekoia: Extract IOCs (Indicators of Compromise)
- Malicious AI platforms
- Known phishing domains using AI
- Suspicious URLs
-
In Noxys: Create policy blocking these IOCs
platform_id in [malicious_iocs]- Action: Block
-
Automatically update blocklist when new IOCs discovered
Compliance & Audit
Sekoia provides compliance reporting:
- Sekoia Intelligence Center → Compliance → Reports
- Generate reports for:
- GDPR compliance
- EU AI Act mapping
- Data processing audit
- Export for internal audit
Cost Considerations
Sekoia pricing:
- XDR module: €500-2000/month (depends on events/month)
- SOAR module: Add €1000+/month (for automation)
- Threat Intelligence: Included
Event volume estimation:
- 100 events/day from Noxys
- Typical XDR cost: €800-1500/month
Troubleshooting
Events Not Appearing in Sekoia
- Verify webhook is active
- Noxys: Integrations → Webhooks → Status
- Check API key is correct
- Regenerate if needed
- Verify webhook URL is exactly:
https://api.sekoia.io/api/v1/events
- Test webhook:
- Click Test button
- Check response status
- Review Sekoia API logs:
- Settings → API Activity
Alerts Not Creating
- Verify detection rules are Enabled
- Check rule logic with test event
- Verify rule severity matches your alert threshold
- Review Sekoia logs for rule evaluation errors
Cases Not Being Created
- Verify SOAR module is enabled
- Check playbook is Active
- Test playbook manually with sample event
- Review SOAR logs for execution errors
Best Practices
-
Start with critical events only:
- Send
policy_violatedandalert.severity_critical+ - Skip routine
interaction.createdevents - Reduces noise, improves signal-to-noise ratio
- Send
-
Create targeted rules:
- One rule per threat type
- Test with 1-week historical data first
- Monitor for false positive rate
-
Use playbooks for automation:
- Automate routine triage
- Create cases for high-severity incidents
- Reduce MTTR
-
Regular rule review:
- Monthly: Review rule effectiveness
- Quarterly: Update rules based on new threats
- Remove rules causing too many false positives
-
Monitor integration health:
- Weekly: Check event volume
- Check for delivery failures
- Verify detection rules are firing
EU AI Act Compliance
Sekoia helps with EU AI Act compliance:
- Track AI usage through Noxys events
- Document classifications using Sekoia storage
- Report audit trails for regulatory reviews
- Maintain records for 3+ years (EU requirement)
All data stays in EU data centers, meeting sovereignty requirements.
Disabling Integration
To disable Sekoia integration:
- Integrations → Webhooks → Delete webhook
- No more events are sent to Sekoia
- Existing events remain in Sekoia
- Detection rules can be disabled or deleted
To re-enable:
- Follow configuration steps again
- Events resume flowing to Sekoia
Support & Resources
- Sekoia Docs: https://sekoia.io/en/services/soar-platform/
- API Documentation: https://docs.sekoia.io/
- Community: https://community.sekoia.io/
- Noxys Support: support@noxys.eu
Related Integrations
- Microsoft Sentinel — Microsoft SIEM
- Splunk — Enterprise SIEM
- HarfangLab — European EDR
- Webhooks API — Custom webhook configuration