Workflow Engine

Rule-based Email Automation

Back to Overview

Why a Workflow Engine?

Organizations that exchange personal or confidential information via email - whether in B2C or B2B contexts - must not only meet GDPR requirements, but increasingly also requirements from NIS2, industry-specific compliance guidelines or internal security standards.

Critical infrastructures, clinics, research institutions, insurance companies, authorities and suppliers are exemplary for a challenge that now affects all companies:

How can email communication be designed securely, automatically and verifiably - without hindering business operations?

Static transport rules - such as "activate TLS if available" - are not flexible enough for this. They can only react to a limited extent to recipients, content or risk context - and often intervene too late or not at all in complex scenarios. TLS also only ensures encryption to the next server on the transmission path.

Intelligent Email Processing

The rule-based workflow engine

of mail:u secure solves this problem with maximum flexibility:

• Any number of conditions (recipient, domain, file type, subject, classification, user action, etc.) that can be linked together.
• Freely combinable actions (S/MIME, PGP, PDF container, FileLink, signature, archive, API routing …)
• Fully configurable execution sequence
• Rule linking via AND/OR/IF-THEN logic
• Dynamic email routing based on all parameters
• Complex special cases such as security incidents, data classes or role-based delivery can also be mapped
• Integration of user-specific decisions from the client or third-party tool (Outlook, ERP, CRM, etc.)

Every email is processed exactly as required by the protection requirements and communication context.

Rule-based Workflow Engine - Die regelbasierte Workflow-Engine - Intelligente E-Mail-Verarbeitung

How the Engine Works

Condition Catalog

• Recipient / sender address or group
• Sensitivity Labels (Microsoft Purview, VS-NfD, TISAX)
• File type and size
• Subject tags (e.g. #NIS2, #HCONF)
• Header flags from specialist systems
• Content contents

Actions

• S/MIME or PGP encryption
• Signature / signature verification
• PDF container with password
• Delivery via a portal incl. optional 2-factor auth (web application)
• FileLink output incl. optional 2-factor auth
• Archive or journal copy
• Handover to portal, DMS, SIEM via API

Example Policy

IF Recipient-Domain = [AT]partner.de
AND Attachment.Size > 25MB
THEN Attachment → FileLink (TTL 14 days)
Mail → S/MIME encrypted, signed
ELSE IF Key missing
Mail → PDF container + return channel

Rules can be configured via web wizard or rolled out as YAML/JSON via a GitOps pipeline.

Benefits in regulated areas

Benefits for Secure Data Transmission

Fine-grained Policies
Separate rule sets per department, user, location or tenant

Versioned & auditable
Git history, policy diffs for ISO 27001 and NIS2 proof

Simulation Mode
"Dry run" generates report without real delivery

API-First
Specialist systems (LIS, ERP, ticketing) can trigger actions via header or subject

Benefits for secure data transmission - Mehrwerte für sichere Datenübertragung
Workflow Icon - Practice Workflows - Praxis-Workflows

Use Cases

Practice Workflows

Medical Images in Healthcare
CT image series (120 MB, DICOM) is detected ⇒ FileLink + S/MIME signature ⇒ radiologist downloads GDPR-compliant.

Incident Report from Energy Provider
Subject contains #NIS2 ⇒ PDF container, password via SMS, copy to security team.

CAD File in Supply Chain
STEP file 35 MB, recipient without PKI ⇒ FileLink with two-factor portal access, complete audit trail.

Quote Communication with B2C Customer
Secure storage of quote and all information (contracts) in portal. Secure access for customer without encryption technology in use. Reply options and download of data and information.

Technical Deep Dive

Policy as Code

YAML in Git repo, CI/CD pipeline, rollback.

OpenTelemetry

Traces, metrics, logs for SOC / SIEM.

Tenant Separation

own rule sets, key stores, FileLink spaces.

Kubernetes Cluster

automatic horizontal scaling, blue/green deploy.

Compliance Coverage

Framework / StandardImplementation by Engine
GDPR Art. 32End-to-end cryptography, audit trail
NIS2Incident webhook, tenant segregation, policy proof
ISO 27001Role-based admin portal, versioned policies
B3S HealthcareFileLink in DE-RZ, password-protected PDF containers

Implementation in Five Steps

1

Analysis Workshop

Capture data flows, labeling, attachment types

2

Proof of Concept (1 week)

SaaS tenant, two test policies, SECFLOW for pilot users

3

Policy Design Sprint

Model rules, set up Git repo

4

Go-Live

Blue/Green deployment without downtime

5

Optimization Cycle

Quarterly policy review & audit report

Decorative gradient background

Policy Workshop Free

Design your first automated workflow rule for secure data transmission in 60 minutes.

Current
Workflow Engine