This workflow template facilitates the assessment and documentation of high-risk integrations discovered by Astrix security monitoring. When a new risky integration is identified, an automated email is sent to the integration owner, requesting a justification for its use. The owner's response is then compiled and cataloged directly onto the integration within Astrix. Additionally, updates are communicated to the relevant security team via Slack, ensuring transparency and accountability in the management of application security operations.
Trigger
Astrix Security
Use Cases
Application Security Operations
Workflow Breakdown
A request for justification is sent via email to the owner of the integration
Once a response is received the message is extracted and decoded
The response is input as a comment on the integration within Astrix
Vendors
Slack, Utils, Gmail, Astrix Security
Workflow Output
The owner's response is input as a comment on the integration within Astrix as well as an update to a configured Slack recipient