Módulo GRC 2: Automatizador de gestión de riesgos
Este es unSecOps, Multimodal AIflujo de automatización del dominio deautomatización que contiene 12 nodos.Utiliza principalmente nodos como If, Set, Switch, GoogleSheets, ScheduleTrigger. Usar Google Sheets para automatizar las tareas de manejo de riesgos para el cumplimiento GRC
- •Credenciales de API de Google Sheets
Nodos utilizados (12)
{
"id": "g7VN0vAwXSeCYhMj",
"meta": {
"info": "***SANITIZED***"
},
"name": "GRC Module 2: Risk Treatment Automator",
"tags": [
{
"id": "dPs2AtBKKjBbUjMP",
"name": "Auto‑Assign & Escalate",
"createdAt": "2025-08-04T01:32:52.595Z",
"updatedAt": "2025-08-04T01:32:52.595Z"
},
{
"id": "dk5SXW31JVBCdAuz",
"name": "Dynamic Treatment Router",
"createdAt": "2025-08-04T01:32:52.582Z",
"updatedAt": "2025-08-04T01:32:52.582Z"
}
],
"nodes": [
{
"id": "594a4bd7-48b8-4ed4-b67b-7efac5cb95d8",
"name": "Nota adhesiva",
"type": "n8n-nodes-base.stickyNote",
"position": [
-3328,
-48
],
"parameters": {
"content": ""
},
"typeVersion": 1
},
{
"id": "107fcb79-1e86-4ec1-9ba9-d656a647ffae",
"name": "Activador – Asignación Diaria de Riesgos",
"type": "n8n-nodes-base.scheduleTrigger",
"position": [
-2656,
208
],
"parameters": {},
"typeVersion": 1.2
},
{
"id": "4db1006f-71d8-4424-9036-c4203a9aa308",
"name": "Google Sheets",
"type": "n8n-nodes-base.googleSheets",
"position": [
-2448,
208
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "b8daf813-d138-49f0-9c49-c627cf3dc5b4",
"name": "If",
"type": "n8n-nodes-base.if",
"position": [
-2224,
208
],
"parameters": {},
"typeVersion": 2.2
},
{
"id": "1c3457c7-5176-44b3-af38-993666f5da63",
"name": "Switch",
"type": "n8n-nodes-base.switch",
"position": [
-2000,
112
],
"parameters": {},
"typeVersion": 3.2
},
{
"id": "8a29f0fb-0cdc-4bc0-9086-57a09360e8c6",
"name": "Preparar Tarea de Alto Riesgo",
"type": "n8n-nodes-base.set",
"position": [
-1360,
-80
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "5af2c75e-96d8-4d9a-97a8-ad01b6d90821",
"name": "Preparar Tarea de Riesgo Medio",
"type": "n8n-nodes-base.set",
"position": [
-1360,
128
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "a9633711-dd20-4b58-b4f6-2885c761bbc1",
"name": "Preparar Tarea de Bajo Riesgo",
"type": "n8n-nodes-base.set",
"position": [
-1360,
368
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "5a10fc7f-1128-4d0c-8d94-64955fd7e349",
"name": "Nota adhesiva1",
"type": "n8n-nodes-base.stickyNote",
"position": [
-944,
-96
],
"parameters": {
"content": ""
},
"typeVersion": 1
},
{
"id": "dafad726-7ce2-47f4-8d65-27fe92875e22",
"name": "Anexar Tarea de Alto Riesgo",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
-80
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "6cd694b9-1413-4bfe-9296-3024e30e2fff",
"name": "Anexar Tarea de Riesgo Medio",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
128
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "0b53d068-9397-4a15-a6bc-d72535f6863b",
"name": "Anexar Tarea de Bajo Riesgo",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
368
],
"parameters": {},
"typeVersion": 4.6
}
],
"active": false,
"pinData": {},
"settings": {
"executionOrder": "v1"
},
"versionId": "71c49668-742e-4d07-9de9-a3639ef3aa72",
"connections": {
"b8daf813-d138-49f0-9c49-c627cf3dc5b4": {
"main": [
[
{
"node": "1c3457c7-5176-44b3-af38-993666f5da63",
"type": "main",
"index": 0
}
]
]
},
"1c3457c7-5176-44b3-af38-993666f5da63": {
"main": [
[
{
"node": "8a29f0fb-0cdc-4bc0-9086-57a09360e8c6",
"type": "main",
"index": 0
}
],
[
{
"node": "5af2c75e-96d8-4d9a-97a8-ad01b6d90821",
"type": "main",
"index": 0
}
],
[
{
"node": "a9633711-dd20-4b58-b4f6-2885c761bbc1",
"type": "main",
"index": 0
}
]
]
},
"4db1006f-71d8-4424-9036-c4203a9aa308": {
"main": [
[
{
"node": "b8daf813-d138-49f0-9c49-c627cf3dc5b4",
"type": "main",
"index": 0
}
]
]
},
"a9633711-dd20-4b58-b4f6-2885c761bbc1": {
"main": [
[
{
"node": "0b53d068-9397-4a15-a6bc-d72535f6863b",
"type": "main",
"index": 0
}
]
]
},
"8a29f0fb-0cdc-4bc0-9086-57a09360e8c6": {
"main": [
[
{
"node": "dafad726-7ce2-47f4-8d65-27fe92875e22",
"type": "main",
"index": 0
}
]
]
},
"5af2c75e-96d8-4d9a-97a8-ad01b6d90821": {
"main": [
[
{
"node": "6cd694b9-1413-4bfe-9296-3024e30e2fff",
"type": "main",
"index": 0
}
]
]
},
"107fcb79-1e86-4ec1-9ba9-d656a647ffae": {
"main": [
[
{
"node": "4db1006f-71d8-4424-9036-c4203a9aa308",
"type": "main",
"index": 0
}
]
]
}
}
}¿Cómo usar este flujo de trabajo?
Copie el código de configuración JSON de arriba, cree un nuevo flujo de trabajo en su instancia de n8n y seleccione "Importar desde JSON", pegue la configuración y luego modifique la configuración de credenciales según sea necesario.
¿En qué escenarios es adecuado este flujo de trabajo?
Intermedio - Operaciones de seguridad, IA Multimodal
¿Es de pago?
Este flujo de trabajo es completamente gratuito, puede importarlo y usarlo directamente. Sin embargo, tenga en cuenta que los servicios de terceros utilizados en el flujo de trabajo (como la API de OpenAI) pueden requerir un pago por su cuenta.
Flujos de trabajo relacionados recomendados
Adnan Tariq
@adnantariqFounder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47
Compartir este flujo de trabajo