Make monday.com work with Microsoft 365 & SharePoint →
Subitems Automations Plus logo

Subitems Automations Plus

DataNexify

111 installs, since February 24, 2025.   22 installs/month.   Updated June 13, 2025.

Free plan available No touch
Gallery image Gallery image Gallery image Gallery image

🔁 Add Automations to subitems just like you do for items.🤖

Create, Sync, and Control Every Subitem Like Magic!


Managing subitems manually is slow, error-prone, and doesn’t scale. With our app, you get over 60+ smart automations that bring true parity between items and subitems. Whether you're updating dates, assigning people, or managing dependencies—it’s all automatic.


🔧 What You Can Automate

✅ Create subitems dynamically from dropdowns, text, numbers, or labels

✅ Set subitem due dates based on item dates + smart offsets

✅ Mirror status, owners, and column values between items and subitems

✅ Auto-assign creators, rename subitems, and add prefixes/suffixes

✅ Create N subitems from a number column, label, or recurring schedule

✅ Auto-sync timelines, aggregate numbers, or shift dates smartly

✅ Move, convert, or copy subitems to other boards/items

✅ Create workdocs automatically on subitem creation or status change

✅ Trigger actions when some/all/no subitems meet conditions

✅ Connect items and subitems with dependencies and relationships

✅ Full bidirectional sync: item ↔️ subitem ↔️ connected item

✅ Weekday rules, archiving, conditional logic, and more


💡 Smart Use Cases

  • Auto-create task checklists for every new item
  • Shift all subitem deadlines when project timeline changes
  • Ensure no subitem starts before its dependency is ready
  • Roll up estimates, budgets, or timelines to the parent
  • Build workflows across multiple boards using mapped automations


✨ Want Something Custom?

Reach out at 📩 [email protected] for custom automations.


🎥 See It in Action

Book a free live demo and explore how this can transform your monday.com setup!

👉 https://calendly.com/connect-datanexify/30min

Security & Compliance

Security

Does the developer periodically perform penetration testing?

Yes
Penetration testing is conducted regularly, focusing on identifying and addressing security vulnerabilities in the system. This involves running simulated attacks to test the app’s defenses, using tools like Burp Suite. These tests are aligned with major releases and adhere to OWASP guidelines to ensure that the app remains secure against potential threats

Does the developer have a dedicated security and privacy point of contact for such issues or questions?

Yes

Does the app restrict redirects and forwards only to approved destinations, or show a warning when redirecting to potentially untrusted content?

Yes
The app ensures safe redirects and forwards by implementing an allow list of trusted destinations. Before performing a redirect, the app checks the target URL against this allow list to verify it is an approved location.

Does the app protect against mass parameter assignment attacks?

Yes
Yes, the app protects against mass parameter assignment attacks by implementing strong parameter filtering and whitelisting. Only explicitly permitted fields are allowed to be updated when handling user input, preventing unauthorized or unintended attributes from being modified. Additionally, sensitive fields are excluded from mass assignment by default, ensuring they cannot be manipulated through bulk input. Regular code reviews are also conducted to identify and mitigate potential vulnerabilities related to mass assignment.

Does the app perform encoding and sanitization on all user supplied parameters to protect against Cross-Site Scripting?

Yes
To prevent XSS, we use DOMPurify before accepting input in the backend. Input is validated to allow only expected formats, and special characters (e.g., ``, `&`) are encoded into safe HTML entities. Contextual escaping and libraries like OWASP’s ESAPI enhance protection.

Does the developer protect all state-changing actions against Cross-Site Request Forgery (CSRF)?

Yes
To protect against CSRF, use anti-CSRF tokens in forms and API requests, ensure tokens are unique per session.

Does the developer have mechanisms to notify monday.com in case of a security breach?

Yes
In case of a security breach, I will notify monday.com immediately upon detection. I will reach out through their developer support or report the issue via Monday’s support email. The notification will include critical details such as when the breach was discovered, the affected data, and steps already taken to contain it.

Does this developer have a process for installing application-level updates and security patches for the service (such as software packages and databases)?

Yes
Here’s a concise 5-step process for installing application-level updates and security patches: 1. Identify and Assess: Regularly check for updates from vendors and review release notes. Assess the impact on your system’s compatibility and functionality. 2. Backup: Create a complete backup of your system, including databases and configurations, ensuring you can restore if issues arise. 3. Test: Apply the update in a staging environment to identify and resolve potential issues before applying it to production. 4. Deploy: Schedule and execute the update during off-peak hours to minimize disruption. Monitor the deployment process for any problems. 5. Verify and Document: After the update, verify that the application works correctly and monitor system performance. Update documentation to reflect the changes and inform stakeholders of any new features or adjustments.

Compliance

Is the app certified with the information security standard ISO/IEC 27001:2022?

No

Is the app compliant with the Health Insurance Portability and Accountability Act (HIPAA)?

No

Is the app certified with System and Organization Controls (SOC 2 or SOC 3)?

No

Is the app compliant with the General Data Protection Regulation (GDPR)?

Yes

Data

Does the app send any data outside of monday.com? If yes, indicate whether the data is customer-submitted (e.g., board names, item names, doc content) or non-customer-submitted (e.g., account ID, board ID, user ID).

Yes
We store your logs on aws.

Where does the app store logs data?

aws
we store all logs on aws.

Where does the app store the app data?

DB

Does the developer ensure application logs do not contain secrets or personally-identifiable information (PII)?

Yes
We ensure that logs do not contain secrets or Personally Identifiable Information (PII) thorough code reviews. During the review process, we verify that sensitive data like passwords, API keys, and PII are not logged. Developers are guided by best practices and logging guidelines that focus on excluding confidential information.

Is customer data segregated from the data of other customers (for example logically or physically)?

Yes
We do not store any customer data for this app!

Privacy

Does the developer enforce multi-factor authentication on employees access to systems which may process customer data?

Yes
At our company, only the development team has access to customer data, and this is done through a secure VPN that requires multi-factor authentication (MFA) for access. This layered security approach ensures that only authorized personnel can reach sensitive data, further protecting it from unauthorized access.

Does the developer protect access to customer data based on the principle of least privilege?

Yes
At our company, only the development team has access to customer data, and this access is strictly controlled through a secure VPN. Access is limited to necessary personnel, ensuring data is handled responsibly and securely. Regular audits and monitoring are conducted to maintain compliance and data protection standards.

Reviews

No reviews yet.

Installation history

We have data for December 28, 2024 onwards only. Collected sometime after 00:00 UTC daily.

ID: 10000744App ID: 10283934Listing updated: June 9, 2025