Hands-On Exercises
Build two real cybersecurity workflow agents using Deloitte's use cases. Each exercise takes ~45 minutes and includes step-by-step instructions.
Exercise A — Firewall Rule Optimizer
Duration: 45 minutes | Type: Workflow Agent
Scenario
Your organization's network security team exports firewall rule reports periodically. These reports contain hundreds of rules accumulated over years — many are outdated, overly permissive, or redundant. Manual review is time-consuming and error-prone.
You'll build a Kindo Workflow Agent that:
- Ingests a firewall rule report
- Analyzes each rule against security best practices
- Categorizes rules into four cleanup categories
- Outputs a structured report with confidence levels and metadata
Output Categories
| Category | Description | Risk Level |
|---|---|---|
| Risky rules | Rules that expose the network to known threats (e.g., allow inbound from any source to sensitive ports) | 🔴 High |
| Over-permissive rules | Rules broader than necessary (e.g., allow all protocols when only TCP/443 is needed) | 🟡 Medium |
| Unused rules | Rules with zero or near-zero hit counts over the analysis period | 🟢 Low |
| Redundant rules | Rules that duplicate or are fully covered by other rules | 🟢 Low |
Step-by-Step Guide
Step 1 — Create the Agent (5 min)
- Sign in to your Kindo instance
- Navigate to the Agents tab
- Click Create an Agent
- Select Workflow Agent
- Configure:
- Name:
Firewall Rule Optimizer - Description:
Analyzes firewall rule reports and categorizes rules for cleanup — identifies risky, over-permissive, unused, and redundant rules with confidence levels.
- Name:
Step 2 — Set Up the Knowledge Store (5 min)
- In the Agent Configuration panel, click Add Knowledge Store
- Upload the sample firewall rule report (CSV or text format)
- Optionally, upload a reference document with your organization's firewall policy standards
💡 Tip: The Knowledge Store gives your agent context. The more specific and structured the reference material, the better the agent's analysis will be.
Step 3 — Write the Analysis Prompt (LLM Step) (10 min)
- Click + to add a step → Select LLM Step
- Name the step:
Analyze and Categorize Rules - Enter the prompt (see full guide for detailed prompt template)
Prompt Engineering Tips:
- Be specific about the role — "senior network security engineer" sets the right context
- Define output format explicitly — the model follows table structures well
- Include edge case handling — "if a rule could belong to multiple categories..."
- Add confidence levels — makes the output actionable (high confidence = auto-fix, low = manual review)
Step 4 — Add the Report Formatting Step (10 min)
- Click + to add another step → Select LLM Step
- Name the step:
Format Cleanup Report - Enter the formatting prompt (executive summary + immediate action items + category details + recommendations)
Step 5 — Run and Review (15 min)
- Click Generate / Run to execute the agent
- Review the output: Are the categorizations accurate? Do the confidence levels make sense?
- Iterate: Try adjusting the prompt to improve accuracy or change the output format
Discussion Points
- Accuracy: How well did the agent categorize the sample rules? Where did it struggle?
- Prompt refinement: What prompt changes improved the output most?
- Production readiness: What would you need before using this in production? (integration with firewall management system, automated ticketing)
- Extensions: Add a Trigger Agent, connect to CrowdStrike for threat intel, auto-create Jira tickets, add scheduled runs
View full exercise guide on GitHub →
Exercise B — Pathfinder: NIST CSF Compliance Mapper
Duration: 45 minutes | Type: Workflow Agent
Scenario
Your organization needs to demonstrate compliance with the NIST Cybersecurity Framework (CSF). Compliance teams collect evidence — policies, standards documents, configuration screenshots, audit reports — and manually map each to the relevant NIST CSF controls. This is labor-intensive, error-prone, and must be repeated for each audit cycle.
You'll build a Kindo Workflow Agent ("Pathfinder") that:
- Ingests evidence documents (policies, standards, configuration data)
- Maps each document to relevant NIST CSF controls
- Evaluates compliance status per control
- Produces a structured compliance report
NIST CSF Functions (for reference)
| Function | ID | Description |
|---|---|---|
| Govern | GV | Establish and monitor cybersecurity risk management strategy and policy |
| Identify | ID | Understand organizational context, assets, risks, and supply chain |
| Protect | PR | Implement safeguards to ensure delivery of critical services |
| Detect | DE | Identify cybersecurity events in a timely manner |
| Respond | RS | Take action regarding a detected cybersecurity incident |
| Recover | RC | Restore capabilities impaired by a cybersecurity incident |
Step-by-Step Guide
Step 1 — Create the Agent (5 min)
- Sign in to your Kindo instance
- Navigate to the Agents tab
- Click Create an Agent
- Select Workflow Agent
- Configure:
- Name:
Pathfinder — NIST CSF Compliance Mapper - Description:
Reviews evidence and supporting documents, maps them to NIST CSF controls, and evaluates compliance status. Produces a structured compliance report.
- Name:
Step 2 — Set Up the Knowledge Store (10 min)
This agent needs two types of reference material:
- NIST CSF Framework Reference — Upload a NIST CSF control catalog (provided by facilitator)
- Evidence Documents — Upload sample policies, standards, and/or configuration screenshots
💡 Tip: For best results, upload the NIST CSF reference as a structured document (markdown or CSV with control IDs, names, and descriptions).
Step 3 — Write the Mapping Prompt (LLM Step) (10 min)
- Click + to add a step → Select LLM Step
- Name the step:
Map Evidence to NIST CSF Controls - Enter the mapping prompt with these key elements:
- Define mapping guidelines (single document may map to multiple controls)
- Specify output format: Document Name | Control ID | Control Name | Function | Mapping Rationale | Coverage Level
- Define coverage levels: FULL, PARTIAL, REFERENCE, NONE
- Request gap identification (controls with no evidence)
Step 4 — Write the Compliance Assessment Prompt (LLM Step) (10 min)
- Click + to add another step → Select LLM Step
- Name the step:
Evaluate Compliance Status - Enter the assessment prompt:
- Assessment criteria: COMPLIANT, PARTIALLY COMPLIANT, NON-COMPLIANT, INSUFFICIENT EVIDENCE
- Output sections: Compliance Scorecard | Detailed Assessment | Priority Remediation | Gaps Analysis
Step 5 — Run and Review (10 min)
- Click Generate / Run to execute the agent
- Review: Does the evidence-to-control mapping make sense? Are the compliance assessments defensible? Are the gaps identified accurately?
- Iterate: Upload additional evidence documents and re-run, or adapt to a different framework (ISO 27001, SOC 2)
Discussion Points
- Accuracy: How well did the agent map evidence to controls? Were there false positives?
- Coverage vs. compliance: What's the difference between "we have evidence" and "we're actually compliant"?
- Scalability: How would this work with 500+ evidence artifacts? (chunking strategies, batch processing)
- Framework portability: Could the same agent be adapted for ISO 27001, SOC 2, PCI DSS, or CMMC?
- Extensions: Add a Trigger Agent for new evidence uploads, connect to Jira for remediation tickets, build a Canvas dashboard, add a chatbot companion