James Aspinwall — February 2026
The five agents — Compliance Monitor, Regulatory Tracker, API Anomaly Detector, Exposure Monitor, KYC Orchestrator — each solve a specific compliance problem. Individually, they are useful. Together, they are a compliance nervous system.
This article is about the thing that makes them work together: the orchestrator. It routes events, manages tool invocations, aggregates outputs into a unified timeline, and enforces the governance rules that every German regulator demands. It does not make decisions. It makes sure the right agent sees the right data at the right time, and that a human sees the result before anything irreversible happens.
Why an Orchestrator
Five standalone agents would create five dashboards, five alert queues, five audit trails. A compliance officer already drowning in alerts does not need five more inboxes. They need one timeline that tells them: what happened, which domain it affects, how severe it is, and what they need to do next.
The orchestrator provides three things no individual agent can:
Temporal correlation. A regulatory gap flagged at 9:00 AM, a related compliance alert at 9:15 AM, and an exposure limit notification at 9:30 AM tell a story. Individually, they are three items in three queues. In a unified timeline, they are a pattern that demands immediate attention.
Cross-domain escalation. A credential stuffing attack detected by the API Anomaly Detector may enable unauthorized transactions that the Compliance Monitor must evaluate. A connected client discovery by the Exposure Monitor triggers a KYC refresh. A new BaFin circular picked up by the Regulatory Tracker creates gaps in the Compliance Monitor’s rule engine. These interactions are invisible when agents operate in isolation.
Single audit trail. MaRisk AT 6 requires that all risk-relevant processes be documented so a “knowledgeable third party” can understand the decisions made. One orchestrator, one timeline, one trail.
Architecture: Hub and Spoke
The orchestrator follows the supervisor pattern — a central hub that coordinates specialized agents through a shared tool protocol. No agent communicates directly with another agent. All coordination flows through the hub.
┌──────────────────┐
│ Orchestrator │
│ (MCP Server) │
└────────┬─────────┘
│
┌──────────────┼──────────────┐
│ │ │
┌─────────┴──┐ ┌───────┴────┐ ┌──────┴───────┐
│ Compliance │ │ Regulatory │ │ API Anomaly │
│ Monitor │ │ Tracker │ │ Detector │
└────────────┘ └────────────┘ └──────────────┘
│ │
┌─────────┴──┐ ┌───────┴────┐
│ Exposure │ │ KYC │
│ Monitor │ │ Orchestr. │
└────────────┘ └────────────┘
Each agent is a set of MCP tools with its own system prompt context, trigger conditions, and output format. The orchestrator owns the event loop: it receives data (transactions, RSS entries, API telemetry, portfolio changes, KYC applications), routes each event to the appropriate agent, collects outputs, and writes them to the unified timeline.
This is not a microservices architecture. It is a single application with one parallel process per agent domain, one shared timeline, one permission system. The MCP protocol provides the tool interface. The framework infrastructure provides the concurrency.
Deployment: One Instance Per Business
Each customer gets a dedicated instance — complete isolation by design, not by access control.
- Docker containerization — all Elixir code, MCP framework, and agent configurations ship as a single image.
- VPC deployment — each business runs in a dedicated VPC. No shared databases, no shared services, no cross-tenant concerns.
- No tenant IDs — the data model assumes a single-business context throughout. Simple foreign key relationships. Audit trails are per-instance.
- Horizontal scaling — growth means adding instances for new businesses, not adding tenants to shared infrastructure.
This eliminates an entire class of security and compliance concerns. Row-level security, tenant isolation, context switching, business hierarchies — none of these exist because there is nothing to isolate from. Each instance is a self-contained compliance system for one organization.
For customers running multiple business units, each unit gets its own instance. Consolidated billing and shared support management sit at the contract level, not the infrastructure level.
The 25 Tools
Every tool follows the same contract: structured input, structured output, human-readable narrative attached. The orchestrator exposes all 25 tools through a single MCP server.
Compliance Monitor (4 tools)
| Tool | Trigger | Output |
|---|---|---|
compliance_scan_transactions |
Continuous feed / batch | Flagged transactions with rule citations |
compliance_score_alert |
Per flagged batch | Risk score 0-100, prioritized queue position |
compliance_draft_sar |
Per scored alert | Verdachtsmeldung narrative with GwG sections |
compliance_alert_status |
On-demand | Current alert queue with severity and SLA status |
Regulatory Tracker (4 tools)
| Tool | Trigger | Output |
|---|---|---|
regulatory_check_feeds |
Daily / webhook | New bulletin list with metadata |
regulatory_classify |
Per bulletin | Relevance, topic taxonomy, materiality |
regulatory_map_controls |
Per classified bulletin | Regulation-to-control mapping |
regulatory_gap_analysis |
Per mapped bulletin | Gaps with priority and remediation timeline |
API Anomaly Detector (4 tools)
| Tool | Trigger | Output |
|---|---|---|
api_anomaly_check_health |
Continuous | Latency percentiles, error rates, auth stats |
api_anomaly_detect |
Per telemetry window | Anomaly flags with statistical basis |
api_anomaly_correlate |
Per anomaly set | Incident narrative with MITRE ATT&CK mapping |
api_anomaly_incident_report |
Per correlated incident | DORA-formatted report draft |
Exposure Monitor (5 tools)
| Tool | Trigger | Output |
|---|---|---|
exposure_calculate |
Per position change / daily | Net exposures per counterparty/group |
exposure_check_limits |
Per calculation | Utilization dashboard with threshold status |
exposure_explain |
Per threshold crossing | Audit-trail explanation with recommended actions |
exposure_breach_report |
Per breach | BaFin notification draft |
exposure_pretrade_check |
On-demand | Headroom analysis for proposed trade |
KYC Orchestrator (8 tools)
| Tool | Trigger | Output |
|---|---|---|
kyc_start_onboarding |
Per application | Pipeline initialized, checks queued |
kyc_verify_identity |
Phase 2 | Document verification result |
kyc_screen_sanctions |
Phase 2 (parallel) | Sanctions match/near-match/clear with scores |
kyc_screen_pep |
Phase 2 (parallel) | PEP status with relationship detail |
kyc_calculate_risk |
Phase 3 | Weighted risk score with breakdown |
kyc_decision |
Phase 4 | Approve / review / escalate / decline |
kyc_review_summary |
Phase 5 | Human-readable review narrative |
kyc_pipeline_status |
On-demand | All in-flight onboarding cases |
Cross-Agent Data Flows
The agents do not share state directly. They share events through the timeline. But certain events in one domain have consequences in another, and the orchestrator must route them.
Sanctions: Compliance Monitor ↔ KYC Orchestrator
Both agents screen against the same sanctions lists — EU Consolidated Financial Sanctions List, UN Security Council, OFAC. When the Compliance Monitor flags a transaction involving a customer currently in the KYC pipeline, the orchestrator links the two events. When the KYC Orchestrator identifies grounds for suspicion during onboarding (GwG Section 43), the orchestrator routes to the Compliance Monitor for Verdachtsmeldung assessment.
Regulatory Gaps: Tracker → All Agents
The Regulatory Tracker is the early warning system. A new EBA guideline on ESG risk management creates gaps in the Exposure Monitor’s control framework. A new BaFin circular on AML creates gaps in the Compliance Monitor’s rule engine. A DORA amendment creates gaps in the API Anomaly Detector’s incident reporting procedures. A new AMLR provision on KYC refresh intervals affects the KYC Orchestrator’s pipeline configuration.
When the Tracker identifies a gap, the orchestrator tags it with the affected domain. The responsible agent’s next scheduled review includes the gap in its context.
Security → Fraud: API Anomaly Detector → Compliance Monitor
A credential stuffing campaign detected by the API Anomaly Detector on /api/v1/transfers may result in unauthorized transactions. If the attack succeeds — even partially — the Compliance Monitor must evaluate those transactions for suspicious activity. A single breach event can trigger both a DORA incident report and a Verdachtsmeldung.
Connected Clients: Exposure Monitor → KYC Orchestrator
When the Exposure Monitor discovers that two previously separate counterparties share a common beneficial owner (Scenario 3 in the Exposure article), the combined exposure changes. But so does the KYC picture — the beneficial ownership records need updating, and a KYC refresh may be triggered. The orchestrator routes the reclassification event to both domains.
Shrinking Capital: Exposure Monitor → All Agents
A quarterly loss reduces Tier 1 capital. The Exposure Monitor recalculates all utilization ratios against the new, lower denominator. If breaches result, the orchestrator escalates across domains — the CRO needs the exposure analysis, the compliance function needs to assess whether the breach triggers reporting obligations, and the Regulatory Tracker should check whether any pending capital-related regulation affects the response.
The Unified Timeline
Every agent output lands in the same timeline. Each entry contains:
| Field | Purpose |
|---|---|
timestamp |
When the event occurred |
agent |
Which agent generated it |
severity |
Critical / High / Medium / Low |
category |
AML / Prudential / Regulatory / Security / KYC |
summary |
One-line description |
narrative |
Full LLM-generated explanation |
action_required |
What the human needs to do |
action_by |
Role responsible (MLRO, CRO, CISO, analyst) |
sla_deadline |
When the action must be completed |
status |
Open / In Review / Resolved / Escalated |
audit_refs |
Links to full audit trail entries |
The timeline serves three audiences:
Compliance officers see SAR drafts, KYC escalations, regulatory gap assessments. Their view filters by AML and KYC categories, sorted by SLA deadline.
Risk officers (CRO) see exposure gauges, breach notifications, remediation tracking. Their view filters by Prudential category, with the counterparty heatmap front and center.
IT/Security (CISO) see API health snapshots, incident narratives, DORA reporting status. Their view filters by Security category, with the severity matrix driving the sort order.
Every user sees the same underlying data. The filters change. The audit trail does not.
Governance: Three Regulations That Govern Everything
EU AI Act — The August 2026 Deadline
Every agent in this system is classified as high-risk AI under the EU AI Act (Regulation 2024/1689, Annex III). The Compliance Monitor is an AML detection system. The Exposure Monitor is a credit risk assessment system. The KYC Orchestrator is a customer due diligence system. The API Anomaly Detector is an ICT security monitoring system. The Regulatory Tracker is a compliance monitoring system.
All five must comply with Articles 9-15 by August 2, 2026:
| Article | Requirement | How the Orchestrator Addresses It |
|---|---|---|
| Art. 9 | Risk management system | Each agent’s system prompt defines its operating boundaries. The orchestrator logs every tool invocation and output. |
| Art. 10 | Data governance | Synthetic data for the demo. Production deployments specify data lineage per agent. |
| Art. 11 | Technical documentation | The five agent articles plus this orchestrator article constitute the pre-deployment documentation. |
| Art. 12 | Record-keeping | Unified timeline with 5-year retention. Every AI recommendation and human decision logged. |
| Art. 13 | Transparency | Every alert includes the rule or pattern that triggered it, the data that matched, and the confidence level. |
| Art. 14 | Human oversight | No agent takes irreversible action. Every regulatory filing, customer decision, and security response requires human approval. |
| Art. 15 | Accuracy and robustness | Detection accuracy targets defined per agent. Back-testing required before rule changes. |
The orchestrator is the governance layer. It does not just route data — it enforces the audit trail, the human-in-the-loop checkpoints, and the explainability requirements that the AI Act demands.
Penalties: up to EUR 35 million or 7% of worldwide turnover for prohibited practices. Up to EUR 15 million or 3% for other infringements.
DORA — Operational Resilience
DORA (Regulation 2022/2554) has been in force since January 17, 2025. It governs ICT risk management for all EU financial entities. The API Anomaly Detector is the primary DORA agent, but the regulation affects the entire system:
- Article 5-6: The orchestrator itself must be part of the institution’s documented ICT risk management framework.
- Article 11: Response and recovery plans must cover the orchestrator’s failure modes — what happens when the AI system is down.
- Article 17: All five agents contribute to the institution’s ICT incident detection capability.
- Article 28-30: If WorkingAgents is adopted as a third-party service, it may be classified as a critical ICT third-party provider subject to EU-wide oversight.
The orchestrator’s fallback mode: if the LLM is unavailable, the rule engines and threshold checks continue to fire. Alerts generate without narratives. Humans receive raw data instead of AI-drafted summaries. The system degrades gracefully — detection continues, explanation pauses.
MaRisk — The German Baseline
MaRisk AT 4.4.2 mandates the compliance monitoring function. MaRisk AT 6 mandates the audit trail. MaRisk AT 7.2 mandates model validation. Together, they define the minimum governance requirements:
- Every AI recommendation must be traceable to its inputs (AT 6)
- Every human decision must be documented with rationale (AT 6)
- ML models must be independently validated annually (AT 7.2)
- The compliance function must assess every material regulatory change (AT 4.4.2)
- Escalation procedures must be documented and approved by the board (AT 4.3.2)
The orchestrator enforces these by construction. The timeline is the audit trail. The human approval checkpoints are the four-eyes principle. The Regulatory Tracker is AT 4.4.2 in code.
Human-in-the-Loop: The Architecture
The orchestrator enforces a strict boundary: AI recommends, humans decide. This is not a design preference — it is a legal requirement under GwG, the EU AI Act, and BaFin’s AI Principles.
Actions That Require Human Approval
| Action | Approver | Legal Basis |
|---|---|---|
| Filing a Verdachtsmeldung | MLRO | GwG Section 6 — personal liability |
| Dismissing an AML alert | Compliance analyst | MaRisk AT 6 — documented rationale required |
| Classifying a DORA incident as “major” | CISO | DORA Article 18 — triggers reporting obligations |
| Submitting a DORA notification | CISO + CRO | DORA Article 19 |
| Approving a PEP relationship | Senior management | GwG Section 15 |
| Accepting a high-risk KYC customer | Senior compliance officer | GwG Section 15 |
| Declining a KYC application | Compliance officer | Institution policy |
| Submitting a BaFin large exposure breach notification | CRO | CRR Article 396 |
| Blocking customer accounts | Compliance officer | False positive risk |
| Customer-facing communications | Compliance + Legal | Tipping-off risk (GwG Section 47) |
Actions the Orchestrator Can Automate
| Action | Conditions | Guardrails |
|---|---|---|
| Alert generation and scoring | Always | Logged, auditable |
| Data enrichment and context gathering | Always | Read-only |
| SAR/report narrative drafting | Always | Human reviews before filing |
| Low-risk KYC auto-approval | All checks clean, risk score < 25 | Periodic QA sampling, 5-10% |
| Sanctions false positive auto-clearing | Differentiating data conclusive | Logged with reasoning |
| Rate limiting escalation | Threshold breach | Reversible, reviewed within defined window |
| IP blocking of clearly malicious sources | High confidence | Reversible, logged |
The orchestrator’s role at every decision point: present the evidence, present the recommendation, wait for human action. The timeline entry stays in “Action Required” status until a human resolves it. SLA clocks tick. Escalation rules fire if the clock expires.
From Assistant to Autonomous Platform
Currently, the agents analyze, recommend, and log their proposals, but execution still requires human approval and manual action. The next step: a one-click “Execute Recommendation” button in the dashboard.
What Execute Means Per Agent
| Agent | Recommendation | One-Click Execution |
|---|---|---|
| Compliance Monitor | “File Verdachtsmeldung” | Pre-populate goAML submission form, stage for MLRO final sign-off |
| Exposure Monitor | “Accelerate syndication of EUR 200M tranche” | Initiate syndication workflow, notify portfolio management, draft term sheet |
| Regulatory Tracker | “Create remediation plan for 3 identified gaps” | Generate gap remediation tickets with owners, deadlines, and Jira/ServiceNow integration |
| API Anomaly Detector | “Enable enhanced rate limiting on /transfers” | Push rate limit config change to API gateway, log the change, set auto-revert timer |
| KYC Orchestrator | “Escalate to EDD queue” | Route case to senior compliance officer’s queue with pre-filled EDD checklist |
This transforms the platform from “very helpful assistant” to “autonomous operations platform.” The agent does not just tell you what to do — it can do it for you, with appropriate oversight.
Guardrails for Autonomous Execution
Autonomous does not mean uncontrolled. Every executable action requires:
- Approval workflow: Configurable per action type. Low-risk actions (rate limit changes) can auto-execute with post-hoc review. High-risk actions (SAR filing, customer blocking) require explicit human approval before execution.
- Rollback mechanism: Every executed action must be reversible. Rate limit changes revert automatically after a configurable window. Workflow initiations can be cancelled. Config changes maintain a rollback stack.
- Audit trail: The existing timeline captures not just the recommendation but the execution — who approved it, when it executed, what changed, and whether it was rolled back.
- Escalation on failure: If an executed action fails (API gateway rejects the config change, goAML submission returns an error), the orchestrator escalates immediately with the failure context.
The Consulting Differentiator
This is the key positioning for the consulting pitch: “AI that not only tells you what to do, but can do it for you — with appropriate oversight.”
Generic AI can draft text. Industry-specific compliance and reporting is where generic AI falls flat on its face. BaFin reporting, SOX compliance, healthcare HIPAA logs, financial audit trails — these are not “write a report” tasks. They require domain-specific templates, regulatory knowledge, and integration with industry-standard submission systems like goAML, Bundesbank ExtraNet, and COREP filing platforms.
The agents become adapters. We are not selling generic AI — we are selling “AI that speaks BaFin” or “AI that understands your compliance framework.” Each industry vertical becomes a specialized offering with pre-built regulatory integrations. This makes the service stickier, harder to replace, and justifies premium pricing. Companies will pay handsomely for AI that already knows their regulatory language.
The Solaris Pitch
Solaris SE is under intensified BaFin supervision. A special representative has been monitoring the bank since 2022. In June 2025, BaFin fined Solaris EUR 500,000 for repeatedly exceeding CRR large exposure limits between January 2022 and March 2024. Since early 2023, Solaris may only accept new corporate clients with BaFin’s prior approval. BaFin has warned of further fines if AML control improvements are not completed on schedule.
Every agent in this demo addresses a documented failure:
| Agent | Solaris Problem | What the Agent Does |
|---|---|---|
| Exposure Monitor | Fined for repeated CRR limit breaches | Detects breaches intraday, not next quarter |
| KYC Orchestrator | Restricted from accepting new clients without BaFin approval | Automates pipeline with full audit trail |
| Compliance Monitor | Under special monitoring for AML controls | Scans every transaction, drafts SARs in minutes |
| Regulatory Tracker | 200-400 regulatory changes per year to assess | Flags gaps within minutes of publication |
| API Anomaly Detector | DORA compliance now mandatory | Detects and reports ICT incidents per DORA Articles 17-19 |
The pitch is not “replace your compliance team.” The pitch is: “Your compliance team is doing this work manually, slowly, and incompletely. These agents do the first pass in minutes. Your team still reviews, still decides, still signs off. But they start with a draft SAR, a gap analysis, an exposure calculation, an incident narrative — not a blank page.”
Building It: The Implementation Path
Phase 1 — Synthetic Data Generator
A reusable data generator that produces:
- 10,000 transactions with 50-100 seeded suspicious patterns
- 20-30 KYC applicants with varying risk profiles
- 10-20 counterparties with 3-4 connected client groups
- 5,000-10,000 API log entries with 3 injected anomaly scenarios
- Portfolio with EUR 10 billion own funds for clean exposure math
This feeds all five agents. Build once, reuse across every demo.
Phase 2 — Compliance Monitor
The flagship agent. Full detection pipeline: sanctions screening → rule engine → ML scoring → LLM narrative. This establishes the template — ingest, detect, narrate, present — that the other four agents follow.
Phase 3 — Exposure Monitor
The simplest agent. Pure arithmetic plus LLM explanation. Sum positions, check against 25% limit, generate narrative when thresholds cross. Half-day build if the data generator is done.
Phase 4 — Regulatory Tracker
The most impressive agent for a live demo. Real BaFin RSS data — not synthetic. Scrape, classify, map to controls, detect gaps. The audience sees a real regulatory bulletin processed in real-time.
Phase 5 — API Anomaly Detector + KYC Orchestrator
The remaining two agents. The API Anomaly Detector is statistical baselines plus correlation logic. The KYC Orchestrator is a pipeline with parallel verification checks managed by the orchestrator. Both can be simplified for the demo — hardcoded thresholds instead of adaptive baselines, mock verification services instead of real API calls.
Phase 6 — Instance Provisioning
Infrastructure-as-code for customer deployment:
-
Docker image build and deployment pipeline — single
docker buildproduces the complete instance - VPC setup automation — Terraform/Pulumi scripts for one-click infrastructure provisioning
- Instance management dashboard — deploy, monitor, update, and backup customer instances
- Backup and recovery per instance — automated daily snapshots, point-in-time recovery
- Instance migration tools — relocate a customer instance between regions if needed
Phase 7 — Unified Dashboard
Single-page application showing the timeline. Color-coded severity. Agent source tags. Drill-down to full narrative. Role-based filtering. This is the presentation layer that ties everything together.
Demo Flow: Five Minutes, Five Agents
The demo runs live. Real-time. No slides.
Minute 1 — The Stream. Normal transaction data scrolling in the timeline. Salary deposits, utility bills, retail purchases. The dashboard is green. All five agents are running — their health indicators show active in the header.
Minute 2 — Compliance Monitor Fires. Eight transfers from the same sender, each EUR 9,750, within 36 hours. The structuring rule triggers. Risk score: 87/100. The LLM drafts a Verdachtsmeldung narrative citing GwG Section 43 and FATF structuring typology. The timeline entry appears in red: “Action Required — MLRO Review.” The SLA clock starts: 24 hours.
Minute 3 — Exposure Monitor Fires. A EUR 120 million drawdown on a revolving credit facility pushes EuroAuto AG from 74% to 87% of the CRR large exposure limit. The gauge on the dashboard slides from green to orange. The LLM explains: what happened, how much headroom remains, three recommended actions (freeze new approvals, accelerate syndication, evaluate CDS protection). “Action Required — CRO Review.”
Minute 4 — Regulatory Tracker Fires. A new BaFin bulletin appears on the real RSS feed. The agent classifies it: HIGH relevance, affects risk management and lending. Maps to existing controls. Finds 3 gaps — no control for ESG risk in market risk management, no social risk assessment framework, no ESG data governance policy. Remediation timeline auto-generated. “Action Required — Compliance Officer Review.”
Minute 5 — The Correlation. The audience sees the timeline: three events from three agents in four minutes. The orchestrator has tagged them with severity, category, responsible role. The compliance officer’s view shows the SAR draft and the gap assessment. The CRO’s view shows the exposure warning. The CISO’s view shows all five agents healthy, no security incidents.
Then, if time permits: the API Anomaly Detector fires on a credential stuffing scenario. 847 unique IPs, headless browser User-Agents, auth failures spiking 400%. The LLM generates the incident narrative with MITRE ATT&CK mapping. The KYC Orchestrator runs a clean applicant through the pipeline in 47 seconds, then hits a PEP match that escalates to the EDD queue.
Five agents. One timeline. Every alert explained. Every action requiring human approval. Every decision logged.
What This Proves
The demo does not prove that AI can replace compliance teams. It proves something more useful: AI can do the first pass — the reading, the screening, the calculating, the correlating, the drafting — so that compliance professionals start their work with evidence and analysis instead of raw data.
A compliance analyst manually processing a standard KYC application takes 30-60 minutes. The orchestrator does it in under a minute for clean passes. A regulatory change assessment takes 2-3 days. The orchestrator does the initial classification and gap detection in minutes. An exposure limit breach from an overnight FX movement gets caught next morning at best. The orchestrator catches it intraday.
The speed matters. But the completeness matters more. Every sanctions list was checked. Every threshold was calculated. Every gap was identified. Every alert comes with an explanation — not just “flag,” but “here is what happened, here is why it matters, here is what you should do, and here is the regulation that requires it.”
The orchestrator is the connective tissue. It turns five useful agents into a compliance nervous system. And when a BaFin examiner asks “how do you monitor this?” — the answer is a unified timeline with a complete audit trail, not a spreadsheet and a prayer.
What We Do Not Know Yet
We are missing critical operational data about Solaris itself. The architecture has monitoring agents, incident responders, compliance trackers — but we do not know if Solaris handles 10 incidents per day or 1,000.
To build a proper cost-reduction model and size the engagement correctly, we need a baseline:
- What does Solaris actually do day-to-day? Infrastructure scale, incident volume, service scope, number of BaaS partners, transaction throughput.
- How many people currently handle these tasks? Compliance analysts, risk officers, IT security staff, KYC reviewers. Headcount per function.
- What is the incident/alert volume per month? AML alerts, API incidents, exposure limit approaches, KYC applications processed, regulatory changes assessed.
- Current operational headcount and rough salary bands? Needed to calculate cost displacement and ROI for the pitch.
Without this baseline, we cannot credibly say “this saves you X headcount” or “this reduces alert review time by Y%.” The demo proves the technology works. The business case requires their numbers.