N8N Workflows filtra per SecOps

IAM Compliance Automation: Enforce MFA and Clean Up Access Keys in AWS

Automated AWS IAM Compliance Workflow for MFA Enforcement and Access Key Deactivation This workflow leverages AWS IAM APIs and n8n...

Send Slack Alerts for AWS IAM Access Keys Older Than 365 Days

AWS IAM Access Key Rotation Reminder Automation Workflow Who’s it for DevOps/SRE teams responsible for AWS account security. Security/compliance officers...

Monitor & Alert on Inactive AWS IAM Users with Slack Notifications

AWS IAM Inactive User Automation Alert Workflow Weekly job that finds IAM users with no activity for > 90 days...

Auto-Renew AWS Certificates with Slack Approval Workflow

AWS Certificate Manager (ACM) Auto-Renew with Slack notify & approval Who’s it for SRE/DevOps teams managing many ACM certs. Cloud...

Prevent Prompt Injection Attacks with a GPT-4O Security Defense System

AI Security Pipeline - Prompt Injection Defense System using GPT-4O Protect your AI workflows from prompt injection attacks, XSS attempts,...

Automate Security Questionnaire Responses with GPT-4o and Google Sheets

Description Automates vendor/customer security questionnaire responses. It ingests a questionnaire (Sheet/CSV/XLSX), matches each question to your approved answers and evidence,...

Automated Wazuh Rule Deployment Pipeline with GitHub, XML Validation & Telegram Alerts

🚀 Say Goodbye to Manual Rule Deployments in Wazuh! Just Commit— Let Your Pipeline Auto‑Deploy via GitHub + n8n 🎯...

Automate AI Vulnerability Monitoring with GPT-4 and ServiceNow Incident Creation

This n8n workflow automatically monitors RSS feeds for the latest AI vulnerability news, extracts key threat details, and creates a...

Automate CVE Monitoring with OpenAI Processing for ServiceNow Security Incidents

This n8n workflow automatically fetches the latest CVE data at scheduled intervals, extracts relevant security details, and creates a corresponding...

Triage AWS Security Misconfigurations with GPT-4.1 Mini and Send Alerts to Gmail

What this workflow does Automatically triages risky AWS misconfigurations and alerts your team. Pipeline: Security Hub or AWS Config ->...

AI-Powered Domain & IP Security Check Automation

Description This workflow is designed to automate the security reputation check of domains and IP addresses using multiple APIs such...

Scan URLs for Security Threats with urlscan.io and GPT-4o mini

How it works • Webhook → urlscan.io → GPT-4o mini → Gmail • Payload example: { "url": "https://example.com" } •...

Automate PCI DSS Control Evaluation and Compliance Tracking with Google Sheets

Description Automatically evaluates PCI DSS control responses using logic or AI. Designed to speed up compliance workflows, reduce audit fatigue,...

Cybersecurity Assistant with GPT-4, Telegram Bot & Command Execution

QuantumDefender AI is a next-generation intelligent cybersecurity assistant designed to harness the symbolic strength of quantum computing’s promise alongside cutting-edge...

Auto Remediate Endpoint Infections with Wazuh, ClamAV, and GPT-4

Reduce human delays between malware detection and remediation in MSSP/SOC environments. This workflow automates full endpoint antivirus scanning immediately after...

Filter Cybersecurity News for Your Tech Stack (OpenAI + Pinecone RAG)

What it does: Collects cybersecurity news from trusted RSS feeds and uses OpenAI’s Retrieval-Augmented Generation (RAG) capabilities with Pinecone to...

Automate Wazuh Alert Triage and Reporting with GPT-4o-mini and Telegram

🚨Are alert storms overwhelming your Security Operations workflows? This n8n workflow supercharges your SOC by fully automating triage, analysis, and...

SSL/TLS Certificate Expiry Monitor with Slack Alert

How It Works: The 5-Node Certificate Management Flow 🗓️ This workflow efficiently monitors your domains for certificate expiry. Scheduled Check...

Scan URLs with urlscan.io and Send Results via Gmail

Overview Receive a URL via Webhook, submit it to urlscan.io, wait ~30 seconds for artifacts (e.g., screenshot), then email a...

Monitor Security Logs for Failed Login Attempts with Slack Alerts

How It Works: The 5-Node Anomaly Detection Flow This workflow efficiently processes logs to detect anomalies. Scheduled Check (Cron Node):...