- Print
- DarkLight
Sublime Security is a comprehensive email security platform that allows users to create custom detections, gain visibility and control, and focus on prevention of malicious emails.
Sublime events can be ingested in LimaCharlie via a json
Webhook Adapter configuration.
Adapter Deployment
Sublime Security logs are ingested via a cloud-to-cloud webhook Adapter configured to receive JSON events. The steps of creating this Adapter and enabling the input include:
- Creating the Webhook Adapter via the LimaCharlie CLI
- Discovering the URL created for the Webhook Adapter.
- Providing the completed URL to Sublime Security for webhook events.
1. Creating the LimaCharlie Webhook Adapter
The following steps are modified from the generic Webhook Adapter creation documentation, found here.
Creating a Webhook Adapter requires a set of parameters, including organization ID, installation key, platform, and mapping details, among other parameters. The following configuration can be modified to easily configure a Webhook Adapter for ingesting Sublime Security events:
{
"sensor_type": "webhook",
"webhook": {
"secret": "sublime-security",
"client_options": {
"hostname": "sublime-security",
"identity": {
"oid": "<your_oid>",
"installation_key": "<your_installation_key>"
},
"platform": "json",
"sensor_seed_key": "sublime-super-secret-key",
"mapping" : {
"event_type_path" : "data/flagged_rules/name",
"event_time_path" : "created_at"
}
}
}
}
Note that in the mapping above, we make the following changes:
event_type_path
is mapped to the rule name from the Sublime alertevent_time_path
is mapped to thecreated_at
field from the Sublime alert
2. Building the Adapter URL
After creating the webhook, you'll need to retrieve the webhook URL from the Get Org URLs API call. You'll need the following information to complete the Webhook URL:
- Organization ID
- Webhook name (from the config)
- Secret (from the config)
Let's assume the returned domain looks like 9157798c50af372c.hook.limacharlie.io
, the format of the URL would be:
https://9157798c50af372c.hook.limacharlie.io/OID/HOOKNAME/SECRET
Note that the secret
value can be provided in the webhook URL or as an HTTP header named lc-secret
.
3. Configuring the Sublime webhook Action
Within the Sublime Security console, navigate to Manage > Actions. From here, you can select New Action > Webhook.
Within the Configure webhook menu, provide a name and the Adapter URL constructed in Step 2 above.
As mentioned in Step 2, you can configure the HTTP header lc-secret
, if so desired.
Upon configuration of the webhook within Sublime Security, alerts can be configured to be sent to the LimaCharlie platform. To test the Webhook, select Trigger Custom Action from any Flagged message, and send to the LimaCharlie webhook.