Content: 00808.zip (28.48 KB)
Uploaded: 22.12.2025

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

$7.55
This automation streamlines the initial processing of cyber threat intelligence — vulnerabilities (CVE) and indicators of compromise (IOC). It enables security teams to rapidly detect critical threats, assess their severity using AI logic, and trigger response actions including alerts and system isolation.

## Who it´s for
- Cybersecurity teams in small and midsize businesses
- SOC analysts automating primary threat triage
- Compliance officers managing ACSC, ISM, NIST, and ISO/IEC 27001 requirements
- Business owners seeking automated threat detection

## What the automation does
- Ingests new CVE and IOC data daily from public sources via GitHub Gist
- Merges and enriches data using JavaScript code and HTTP API calls
- Applies AI-based logic to score risks and classify threats by severity
- Triggers device isolation via EDR API when high-risk threats are detected
- Logs all events to Google Sheets for audit and compliance reporting
- Sends email alerts to security teams via SMTP

## What´s included
- Ready-to-use n8n workflow
- Predefined triggers and handler logic based on cron schedule
- Integrations with GitHub Gist, Google Sheets, SMTP Email, and EDR API
- Basic setup and adaptation guide

## Requirements for setup
- n8n instance with workflow execution access
- Access to external data sources (e.g., GitHub Gist)
- Google account with editing permissions for target Sheets
- Configured SMTP server for alert delivery
- EDR API access with required permissions for isolation commands

## Benefits and outcomes
- Reduced time-to-respond to emerging threats
- Automated incident classification by risk level
- Support for compliance with ACSC Essential Eight, ISM, NIST, and ISO/IEC 27001
- Centralized event logging in Google Sheets
- Minimized human error in initial threat analysis
- Simplified regulatory reporting

## Important: template only
Important: you are purchasing a ready-made automation workflow template only. Rollout into your infrastructure, connecting specific accounts and services, 1:1 setup help, custom adjustments for non-standard stacks and any consulting support are provided as a separate paid service at an individual rate. To discuss custom work or 1:1 help, contact via Telegram: @gleb923.
CVE vulnerability monitoring
IOC threat analysis
cybersecurity automation
AI risk scoring
threat classification
automated threat alerts
EDR isolation via API
Google Sheets logging
daily threat feed ingestion
incident response automation
ACSC Essential Eight compliance
NIST compliance support
automated threat detection
IOC data processing
vulnerability triage
SME security automation
No feedback yet