Automatically triages inbound security findings (e.g., from AWS Security Hub via EventBridge → SNS → Webhook), classifies them with an LLM, generates a 3-step remediation plan, and emails a compact incident brief.
Pipeline: Webhook → Clean_Finding (normalize) → Classify (LLM) → Plan (LLM) → Gmail (email). You can substitute Microsoft Teams, Slack, etc.
Normalizes the incoming finding JSON (title, description, account, resource id/type, updated_at).
Uses an LLM to assign incident_type , severity (P0--P3) , urgency , short_title , and why (concise rationale).
Produces a 3-step remediation plan with owner_hint and success_criteria ---kept atomic and practical.
Sends a clean HTML email with all details (subject line includes short title, resource, and account).
Category: Security / Cloud / Incident Management
Time to set up: ~10--15 minutes
Difficulty: Beginner--Intermediate
Cost: Mostly free (n8n CE; OpenAI usage + Gmail/SMTP as used)
An n8n instance reachable over HTTP (for the Webhook node).
OpenAI (or compatible) credentials set in n8n.
Gmail OAuth2 credentials (or swap Gmail node for SMTP).
A source that can POST a Security-Hub-style finding to your webhook (EventBridge/SNS, a SIEM, or curl).
Output (Email)
Subject: <short_title> - <resource_id> in <account_id>
Body: HTML summary with Type , Account , Urgency , Why , Next Actions (3 steps) , Owner , Success criteria.


