M2 - Motor de Enriquecimiento de Activos
Este es unSecOpsflujo de automatización del dominio deautomatización que contiene 10 nodos.Utiliza principalmente nodos como Cron, Merge, Function, EmailSend, GoogleSheets. Coincidir amenazas CVE con activos internos usando Google Sheets y recordatorios por correo
- •Credenciales de API de Google Sheets
Nodos utilizados (10)
Categoría
{
"id": "FulCIypj42nIklCO",
"meta": {
"instanceId": "6feff41aadeb8409737e26476f9d0a45f95eec6a9c16afff8ef87a662455b6df"
},
"name": "M2 - Asset Enrichment Engine",
"tags": [],
"nodes": [
{
"id": "14a7268a-be41-4a5a-a5cb-9727b1f6d814",
"name": "Merge",
"type": "n8n-nodes-base.merge",
"position": [
100,
240
],
"parameters": {},
"typeVersion": 3.1
},
{
"id": "5baea5d2-c41f-4eb1-868a-2307e2b931c2",
"name": "🔁 Activador Diario",
"type": "n8n-nodes-base.cron",
"position": [
-420,
240
],
"parameters": {},
"typeVersion": 1
},
{
"id": "dabf2c97-d177-4cda-9103-df589a0f3e66",
"name": "🧠Relacionar Amenazas con Activos",
"type": "n8n-nodes-base.function",
"position": [
320,
240
],
"parameters": {},
"executeOnce": true,
"typeVersion": 1,
"alwaysOutputData": true
},
{
"id": "e370d6aa-be47-47a3-8a58-186dc5db4d6c",
"name": "📊 Añadir Nueva Amenaza",
"type": "n8n-nodes-base.googleSheets",
"position": [
560,
240
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "a1e771b7-6f18-4b7e-a1bb-49139dee5c75",
"name": "📊 Eliminar Fila",
"type": "n8n-nodes-base.googleSheets",
"position": [
560,
420
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "621cf885-f05e-4fc3-9189-bfffe9a4f547",
"name": "📬Enviar Correo Resumen",
"type": "n8n-nodes-base.emailSend",
"position": [
560,
80
],
"parameters": {},
"typeVersion": 1
},
{
"id": "700a7223-bfde-4a69-bbb4-e94999bcf444",
"name": "🗃️ Amenazas_Archivadas",
"type": "n8n-nodes-base.googleSheets",
"position": [
740,
240
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "a468d0cf-47c8-4604-8500-3ee66620f218",
"name": "📊Hojas de Amenazas",
"type": "n8n-nodes-base.googleSheets",
"position": [
-200,
160
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "fbe3a884-9151-44ca-92d4-7e44593f6c48",
"name": "📊Cargar Base de Activos",
"type": "n8n-nodes-base.googleSheets",
"position": [
-200,
360
],
"parameters": {},
"typeVersion": 1
},
{
"id": "a585c636-aec5-4b50-8f1c-68ad28b67ffa",
"name": "Sticky Note",
"type": "n8n-nodes-base.stickyNote",
"position": [
0,
0
],
"parameters": {
"content": ""
},
"typeVersion": 1
}
],
"active": false,
"pinData": {},
"settings": {
"executionOrder": "v1"
},
"versionId": "1b243f06-2e22-46c7-a269-65b35fe3cbd4",
"connections": {
"14a7268a-be41-4a5a-a5cb-9727b1f6d814": {
"main": [
[
{
"node": "dabf2c97-d177-4cda-9103-df589a0f3e66",
"type": "main",
"index": 0
}
]
]
},
"fbe3a884-9151-44ca-92d4-7e44593f6c48": {
"main": [
[
{
"node": "14a7268a-be41-4a5a-a5cb-9727b1f6d814",
"type": "main",
"index": 1
}
]
]
},
"a468d0cf-47c8-4604-8500-3ee66620f218": {
"main": [
[
{
"node": "fbe3a884-9151-44ca-92d4-7e44593f6c48",
"type": "main",
"index": 0
},
{
"node": "14a7268a-be41-4a5a-a5cb-9727b1f6d814",
"type": "main",
"index": 0
}
]
]
},
"5baea5d2-c41f-4eb1-868a-2307e2b931c2": {
"main": [
[
{
"node": "a468d0cf-47c8-4604-8500-3ee66620f218",
"type": "main",
"index": 0
}
]
]
},
"e370d6aa-be47-47a3-8a58-186dc5db4d6c": {
"main": [
[
{
"node": "700a7223-bfde-4a69-bbb4-e94999bcf444",
"type": "main",
"index": 0
}
]
]
},
"dabf2c97-d177-4cda-9103-df589a0f3e66": {
"main": [
[
{
"node": "621cf885-f05e-4fc3-9189-bfffe9a4f547",
"type": "main",
"index": 0
},
{
"node": "e370d6aa-be47-47a3-8a58-186dc5db4d6c",
"type": "main",
"index": 0
},
{
"node": "a1e771b7-6f18-4b7e-a1bb-49139dee5c75",
"type": "main",
"index": 0
}
]
]
}
}
}¿Cómo usar este flujo de trabajo?
Copie el código de configuración JSON de arriba, cree un nuevo flujo de trabajo en su instancia de n8n y seleccione "Importar desde JSON", pegue la configuración y luego modifique la configuración de credenciales según sea necesario.
¿En qué escenarios es adecuado este flujo de trabajo?
Intermedio - Operaciones de seguridad
¿Es de pago?
Este flujo de trabajo es completamente gratuito, puede importarlo y usarlo directamente. Sin embargo, tenga en cuenta que los servicios de terceros utilizados en el flujo de trabajo (como la API de OpenAI) pueden requerir un pago por su cuenta.
Flujos de trabajo relacionados recomendados
Adnan Tariq
@adnantariqFounder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47
Compartir este flujo de trabajo