This n8n workflow automates a comprehensive cybersecurity vulnerability assessment process. It schedules regular scans via Nessus, discovers network assets, evaluates vulnerabilities with AI and risk scoring metrics like LEV, and automatically alerts security teams for critical findings. The workflow also generates detailed reports, logs results in Google Sheets, and includes robust error handling. Designed for continuous security monitoring, it helps organizations promptly identify, prioritize, and respond to active threats, ensuring compliance with standards like NIST CSF and federal mandates such as BOD 22-01.
Automated Vulnerability Scan & Reporting Workflow
Node Count | >20 Nodes |
---|---|
Nodes Used | code, emailSend, errorTrigger, function, googleSheets, httpRequest, if, scheduleTrigger, set, splitOut, stickyNote |
Reviews
There are no reviews yet.