Module GRC 2 : Automatisateur de gestion des risques
Ceci est unSecOps, Multimodal AIworkflow d'automatisation du domainecontenant 12 nœuds.Utilise principalement des nœuds comme If, Set, Switch, GoogleSheets, ScheduleTrigger. Automatisation des tâches de gestion des risques pour la conformité GRC avec Google Sheets
- •Informations d'identification Google Sheets API
Nœuds utilisés (12)
Catégorie
{
"id": "g7VN0vAwXSeCYhMj",
"meta": {
"info": "***SANITIZED***"
},
"name": "GRC Module 2: Risk Treatment Automator",
"tags": [
{
"id": "dPs2AtBKKjBbUjMP",
"name": "Auto‑Assign & Escalate",
"createdAt": "2025-08-04T01:32:52.595Z",
"updatedAt": "2025-08-04T01:32:52.595Z"
},
{
"id": "dk5SXW31JVBCdAuz",
"name": "Dynamic Treatment Router",
"createdAt": "2025-08-04T01:32:52.582Z",
"updatedAt": "2025-08-04T01:32:52.582Z"
}
],
"nodes": [
{
"id": "594a4bd7-48b8-4ed4-b67b-7efac5cb95d8",
"name": "Note adhésive",
"type": "n8n-nodes-base.stickyNote",
"position": [
-3328,
-48
],
"parameters": {
"content": ""
},
"typeVersion": 1
},
{
"id": "107fcb79-1e86-4ec1-9ba9-d656a647ffae",
"name": "Déclencheur – Attribution Quotidienne des Risques",
"type": "n8n-nodes-base.scheduleTrigger",
"position": [
-2656,
208
],
"parameters": {},
"typeVersion": 1.2
},
{
"id": "4db1006f-71d8-4424-9036-c4203a9aa308",
"name": "Google Sheets",
"type": "n8n-nodes-base.googleSheets",
"position": [
-2448,
208
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "b8daf813-d138-49f0-9c49-c627cf3dc5b4",
"name": "If",
"type": "n8n-nodes-base.if",
"position": [
-2224,
208
],
"parameters": {},
"typeVersion": 2.2
},
{
"id": "1c3457c7-5176-44b3-af38-993666f5da63",
"name": "Switch",
"type": "n8n-nodes-base.switch",
"position": [
-2000,
112
],
"parameters": {},
"typeVersion": 3.2
},
{
"id": "8a29f0fb-0cdc-4bc0-9086-57a09360e8c6",
"name": "Préparer Tâche à Risque Élevé",
"type": "n8n-nodes-base.set",
"position": [
-1360,
-80
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "5af2c75e-96d8-4d9a-97a8-ad01b6d90821",
"name": "Préparer Tâche à Risque Moyen",
"type": "n8n-nodes-base.set",
"position": [
-1360,
128
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "a9633711-dd20-4b58-b4f6-2885c761bbc1",
"name": "Préparer Tâche à Risque Faible",
"type": "n8n-nodes-base.set",
"position": [
-1360,
368
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "5a10fc7f-1128-4d0c-8d94-64955fd7e349",
"name": "Note adhésive1",
"type": "n8n-nodes-base.stickyNote",
"position": [
-944,
-96
],
"parameters": {
"content": ""
},
"typeVersion": 1
},
{
"id": "dafad726-7ce2-47f4-8d65-27fe92875e22",
"name": "Ajouter Tâche à Risque Élevé",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
-80
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "6cd694b9-1413-4bfe-9296-3024e30e2fff",
"name": "Ajouter Tâche à Risque Moyen",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
128
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "0b53d068-9397-4a15-a6bc-d72535f6863b",
"name": "Ajouter Tâche à Risque Faible",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
368
],
"parameters": {},
"typeVersion": 4.6
}
],
"active": false,
"pinData": {},
"settings": {
"executionOrder": "v1"
},
"versionId": "71c49668-742e-4d07-9de9-a3639ef3aa72",
"connections": {
"b8daf813-d138-49f0-9c49-c627cf3dc5b4": {
"main": [
[
{
"node": "1c3457c7-5176-44b3-af38-993666f5da63",
"type": "main",
"index": 0
}
]
]
},
"1c3457c7-5176-44b3-af38-993666f5da63": {
"main": [
[
{
"node": "8a29f0fb-0cdc-4bc0-9086-57a09360e8c6",
"type": "main",
"index": 0
}
],
[
{
"node": "5af2c75e-96d8-4d9a-97a8-ad01b6d90821",
"type": "main",
"index": 0
}
],
[
{
"node": "a9633711-dd20-4b58-b4f6-2885c761bbc1",
"type": "main",
"index": 0
}
]
]
},
"4db1006f-71d8-4424-9036-c4203a9aa308": {
"main": [
[
{
"node": "b8daf813-d138-49f0-9c49-c627cf3dc5b4",
"type": "main",
"index": 0
}
]
]
},
"a9633711-dd20-4b58-b4f6-2885c761bbc1": {
"main": [
[
{
"node": "0b53d068-9397-4a15-a6bc-d72535f6863b",
"type": "main",
"index": 0
}
]
]
},
"8a29f0fb-0cdc-4bc0-9086-57a09360e8c6": {
"main": [
[
{
"node": "dafad726-7ce2-47f4-8d65-27fe92875e22",
"type": "main",
"index": 0
}
]
]
},
"5af2c75e-96d8-4d9a-97a8-ad01b6d90821": {
"main": [
[
{
"node": "6cd694b9-1413-4bfe-9296-3024e30e2fff",
"type": "main",
"index": 0
}
]
]
},
"107fcb79-1e86-4ec1-9ba9-d656a647ffae": {
"main": [
[
{
"node": "4db1006f-71d8-4424-9036-c4203a9aa308",
"type": "main",
"index": 0
}
]
]
}
}
}Comment utiliser ce workflow ?
Copiez le code de configuration JSON ci-dessus, créez un nouveau workflow dans votre instance n8n et sélectionnez "Importer depuis le JSON", collez la configuration et modifiez les paramètres d'authentification selon vos besoins.
Dans quelles scénarios ce workflow est-il adapté ?
Intermédiaire - Opérations de sécurité, IA Multimodale
Est-ce payant ?
Ce workflow est entièrement gratuit et peut être utilisé directement. Veuillez noter que les services tiers utilisés dans le workflow (comme l'API OpenAI) peuvent nécessiter un paiement de votre part.
Workflows recommandés
Adnan Tariq
@adnantariqFounder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47
Partager ce workflow