Automate security responses with Metomic's Asset-Based Workflows. Enforce policies instantly when risky assets are created or updated.

Automate security responses with Metomic's Asset-Based Workflows. Enforce policies instantly when risky assets are created or updated.

Security teams are constantly playing catch-up. By the time you discover a misconfigured file, review it manually, contact the owner, and wait for them to fix it, the damage may already be done. Sensitive data could be exposed, shared externally, or downloaded by unauthorized users.
Manual security processes don't scale and they leave critical gaps. You need automation that acts the moment risk appears, without waiting for human intervention.
Metomic's Asset-Based Workflows let you define security policies once and enforce them automatically across every asset in your environment. When an asset is created or updated and meets your conditions, Metomic takes action immediately, from notifying owners, to alerting your security team, or even revoking access before exposure becomes a breach.

Metomic offers two types of automated workflows, each designed for different scenarios:
Event-Based Workflows trigger when something happens to an asset, like a file being downloaded, shared externally, or accessed by a specific user. These are ideal for monitoring activity and responding to risky behavior in real time.
Asset-Based Workflows trigger when an asset is newly created or updated and matches specific conditions, for example those containing credit card numbers and being shared publicly. These are ideal for enforcing data security policies proactively, catching risks at the source before they escalate.
Creating an automated workflow in Metomic is straightforward. Here's how it works:
Start with a Name and Incident Status. Give your workflow a clear name, then assign an incident status: critical, high, medium, or low. This helps your team prioritize which workflows require immediate attention and ensures alignment across your organization on what constitutes each severity level.
Define Your Asset Conditions. This is where you specify what triggers the workflow. Using filters similar to those on the Assets page, you can set conditions based on integration (like Google Drive or Slack), classifier (like credit card numbers or API keys), exposure level, volume thresholds, or other attributes. The workflow will only trigger when an asset meets all the conditions you've defined.
You can view your conditions in linear or list view, making it easy to understand exactly what the workflow will catch.
Add Actions. Once your conditions are set, you decide what happens next. If you set the incident status to critical and add no actions, Metomic will simply create an incident for your team to review. But the real power comes from adding automated actions:
You can add multiple actions to a single workflow, or configure fallback actions if the primary action fails. These automations run without human intervention, ensuring consistent enforcement of your security policies.

Publish and Activate. When you're ready, publish the workflow and turn it on. Your active workflows will appear in your workflow list, where you can monitor incidents that are open, in review, or closed. You can even automate the closure and review statuses, further reducing manual overhead.
Asset-Based Workflows fundamentally change how security operates:
Security risks won’t wait. But with the right workflows in place, neither will your response.
👉 Learn more about Metomic Asset-Based Workflows.