GRC-Modul 2: Automatischer Risikobehandlungsprozess
Dies ist ein SecOps, Multimodal AI-Bereich Automatisierungsworkflow mit 12 Nodes. Hauptsächlich werden If, Set, Switch, GoogleSheets, ScheduleTrigger und andere Nodes verwendet. Automatisierung von GRC-Konformitäts-Risikobearbeitungsaufgaben mit Google Tabellen
- •Google Sheets API-Anmeldedaten
Verwendete Nodes (12)
Kategorie
{
"id": "g7VN0vAwXSeCYhMj",
"meta": {
"info": "***SANITIZED***"
},
"name": "GRC Module 2: Risk Treatment Automator",
"tags": [
{
"id": "dPs2AtBKKjBbUjMP",
"name": "Auto‑Assign & Escalate",
"createdAt": "2025-08-04T01:32:52.595Z",
"updatedAt": "2025-08-04T01:32:52.595Z"
},
{
"id": "dk5SXW31JVBCdAuz",
"name": "Dynamic Treatment Router",
"createdAt": "2025-08-04T01:32:52.582Z",
"updatedAt": "2025-08-04T01:32:52.582Z"
}
],
"nodes": [
{
"id": "594a4bd7-48b8-4ed4-b67b-7efac5cb95d8",
"name": "Haftnotiz",
"type": "n8n-nodes-base.stickyNote",
"position": [
-3328,
-48
],
"parameters": {
"content": ""
},
"typeVersion": 1
},
{
"id": "107fcb79-1e86-4ec1-9ba9-d656a647ffae",
"name": "Trigger – Tägliche Risikozuweisung",
"type": "n8n-nodes-base.scheduleTrigger",
"position": [
-2656,
208
],
"parameters": {},
"typeVersion": 1.2
},
{
"id": "4db1006f-71d8-4424-9036-c4203a9aa308",
"name": "Google Sheets",
"type": "n8n-nodes-base.googleSheets",
"position": [
-2448,
208
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "b8daf813-d138-49f0-9c49-c627cf3dc5b4",
"name": "If",
"type": "n8n-nodes-base.if",
"position": [
-2224,
208
],
"parameters": {},
"typeVersion": 2.2
},
{
"id": "1c3457c7-5176-44b3-af38-993666f5da63",
"name": "Switch",
"type": "n8n-nodes-base.switch",
"position": [
-2000,
112
],
"parameters": {},
"typeVersion": 3.2
},
{
"id": "8a29f0fb-0cdc-4bc0-9086-57a09360e8c6",
"name": "Hohes Risiko-Aufgabe vorbereiten",
"type": "n8n-nodes-base.set",
"position": [
-1360,
-80
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "5af2c75e-96d8-4d9a-97a8-ad01b6d90821",
"name": "Mittleres Risiko-Aufgabe vorbereiten",
"type": "n8n-nodes-base.set",
"position": [
-1360,
128
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "a9633711-dd20-4b58-b4f6-2885c761bbc1",
"name": "Niedriges Risiko-Aufgabe vorbereiten",
"type": "n8n-nodes-base.set",
"position": [
-1360,
368
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "5a10fc7f-1128-4d0c-8d94-64955fd7e349",
"name": "Haftnotiz1",
"type": "n8n-nodes-base.stickyNote",
"position": [
-944,
-96
],
"parameters": {
"content": ""
},
"typeVersion": 1
},
{
"id": "dafad726-7ce2-47f4-8d65-27fe92875e22",
"name": "Hohes Risiko-Aufgabe anhängen",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
-80
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "6cd694b9-1413-4bfe-9296-3024e30e2fff",
"name": "Mittleres Risiko-Aufgabe anhängen",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
128
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "0b53d068-9397-4a15-a6bc-d72535f6863b",
"name": "Niedriges Risiko-Aufgabe anhängen",
"type": "n8n-nodes-base.googleSheets",
"position": [
-1136,
368
],
"parameters": {},
"typeVersion": 4.6
}
],
"active": false,
"pinData": {},
"settings": {
"executionOrder": "v1"
},
"versionId": "71c49668-742e-4d07-9de9-a3639ef3aa72",
"connections": {
"b8daf813-d138-49f0-9c49-c627cf3dc5b4": {
"main": [
[
{
"node": "1c3457c7-5176-44b3-af38-993666f5da63",
"type": "main",
"index": 0
}
]
]
},
"1c3457c7-5176-44b3-af38-993666f5da63": {
"main": [
[
{
"node": "8a29f0fb-0cdc-4bc0-9086-57a09360e8c6",
"type": "main",
"index": 0
}
],
[
{
"node": "5af2c75e-96d8-4d9a-97a8-ad01b6d90821",
"type": "main",
"index": 0
}
],
[
{
"node": "a9633711-dd20-4b58-b4f6-2885c761bbc1",
"type": "main",
"index": 0
}
]
]
},
"4db1006f-71d8-4424-9036-c4203a9aa308": {
"main": [
[
{
"node": "b8daf813-d138-49f0-9c49-c627cf3dc5b4",
"type": "main",
"index": 0
}
]
]
},
"a9633711-dd20-4b58-b4f6-2885c761bbc1": {
"main": [
[
{
"node": "0b53d068-9397-4a15-a6bc-d72535f6863b",
"type": "main",
"index": 0
}
]
]
},
"8a29f0fb-0cdc-4bc0-9086-57a09360e8c6": {
"main": [
[
{
"node": "dafad726-7ce2-47f4-8d65-27fe92875e22",
"type": "main",
"index": 0
}
]
]
},
"5af2c75e-96d8-4d9a-97a8-ad01b6d90821": {
"main": [
[
{
"node": "6cd694b9-1413-4bfe-9296-3024e30e2fff",
"type": "main",
"index": 0
}
]
]
},
"107fcb79-1e86-4ec1-9ba9-d656a647ffae": {
"main": [
[
{
"node": "4db1006f-71d8-4424-9036-c4203a9aa308",
"type": "main",
"index": 0
}
]
]
}
}
}Wie verwende ich diesen Workflow?
Kopieren Sie den obigen JSON-Code, erstellen Sie einen neuen Workflow in Ihrer n8n-Instanz und wählen Sie "Aus JSON importieren". Fügen Sie die Konfiguration ein und passen Sie die Anmeldedaten nach Bedarf an.
Für welche Szenarien ist dieser Workflow geeignet?
Fortgeschritten - Sicherheitsbetrieb, Multimodales KI
Ist es kostenpflichtig?
Dieser Workflow ist völlig kostenlos. Beachten Sie jedoch, dass Drittanbieterdienste (wie OpenAI API), die im Workflow verwendet werden, möglicherweise kostenpflichtig sind.
Verwandte Workflows
Adnan Tariq
@adnantariqFounder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47
Diesen Workflow teilen