|
2 | 2 | "name": "Vulnerability", |
3 | 3 | "description": "Workflows used for vulnerability scan and remediation", |
4 | 4 | "entries": [ |
| 5 | + { |
| 6 | + "name": "Discover OL advisories", |
| 7 | + "path": "Scans/Discover_OL_Advisories.zip", |
| 8 | + "description": "Workflow to discover OL advisories", |
| 9 | + "integrations": ["IBM", "Common"] |
| 10 | + }, |
5 | 11 | { |
6 | 12 | "name": "Discover Redhat advisories", |
7 | 13 | "path": "Scans/Discover_Redhat_Advisories.zip", |
8 | 14 | "description": "Workflow to discover Redhat advisories", |
9 | 15 | "integrations": ["IBM", "Common"] |
10 | 16 | }, |
| 17 | + { |
| 18 | + "name": "Discover Ubuntu advisories", |
| 19 | + "path": "Scans/Discover_Ubuntu_Advisories.zip", |
| 20 | + "description": "Workflow to discover Ubuntu advisories", |
| 21 | + "integrations": ["IBM", "Common"] |
| 22 | + }, |
11 | 23 | { |
12 | 24 | "name": "Fetch latest Scan files from S3", |
13 | 25 | "path": "Scans/Fetch_latest_Scan_files_from_S3_v2.2.zip", |
|
88 | 100 | }, |
89 | 101 | { |
90 | 102 | "name": "Create Change Request For Remediation Action", |
91 | | - "path": "Remediation/Create_Change_Request_For_Remediation_Action_v2.3.zip", |
| 103 | + "path": "Remediation/Create_Change_Request_For_Remediation_Action.zip", |
92 | 104 | "description": "Workflow to create a new ticket in ServiceNow with the input provided by the user. For Actions of type Pull Request Pull request is raised. Reuse this automation with other platforms to gain the inputs and replace user input. Input Variable maintenance_window is given as example. If an application_name maintenance window is provided then maintenance window will be set as same.", |
93 | 105 | "integrations": ["ServiceNow", "Github", "IBM", "Common"] |
94 | 106 | }, |
|
118 | 130 | }, |
119 | 131 | { |
120 | 132 | "name": "Monitor Remediation Action Status", |
121 | | - "path": "Remediation/Monitor_Remediation_Action_Status_v2.2.zip", |
| 133 | + "path": "Remediation/Monitor_Remediation_Action_Status.zip", |
122 | 134 | "description": "Workflow to monitor remediation action status and schedule.", |
123 | 135 | "integrations": ["ServiceNow", "Github", "IBM", "Pliant", "Common"] |
124 | 136 | }, |
125 | 137 | { |
126 | 138 | "name": "Power Advisory Workflow", |
127 | | - "path": "Remediation/Power_Advisory_Workflow_v2.3.zip", |
| 139 | + "path": "Remediation/Power_Advisory_Workflow.zip", |
128 | 140 | "description": "Workflow to load Advisory(Vulnerability) data to Concert(v2)", |
129 | 141 | "integrations": ["IBM", "Common"] |
130 | 142 | }, |
131 | 143 | { |
132 | 144 | "name": "Power Inventory Workflow", |
133 | | - "path": "Remediation/Power_Inventory_Workflow_v2.3.zip", |
| 145 | + "path": "Remediation/Power_Inventory_Workflow.zip", |
134 | 146 | "description": "Workflow to load IBMPower Inventory to Concert(V2)", |
135 | 147 | "integrations": ["IBM", "Common"] |
136 | 148 | }, |
137 | 149 | { |
138 | 150 | "name": "Remediation_Master", |
139 | | - "path": "Remediation/Remediation_Master_v2.2.zip", |
| 151 | + "path": "Remediation/Remediation_Master.zip", |
140 | 152 | "description": "Master workflow that fetches action details of state approved, then prepare input json data to each patch workflow according to the action sub type, call respective patching subworkflows and update the patch status in db.", |
141 | 153 | "integrations": ["Ansible", "ServiceNow", "IBM", "Common"] |
142 | 154 | }, |
|
223 | 235 | "path": "Container_Security/Container_Security_Flows.zip", |
224 | 236 | "description": "Workflows for comtainer security flows and patch flows", |
225 | 237 | "integrations": ["Github", "IBM", "Common"] |
| 238 | + }, |
| 239 | + { |
| 240 | + "name": "ASG Deployment Rollout", |
| 241 | + "path": "Remediation/ASG_Deployment_Rollout.zip", |
| 242 | + "description": "Workflow applies an approved AMI to Auto Scaling Groups by updating the Launch Template and refreshing instances.", |
| 243 | + "integrations": ["AWS", "IBM", "Common"] |
226 | 244 | } |
227 | 245 | ] |
228 | 246 | } |
0 commit comments