Sublime Security
  • 04 Nov 2023
  • 1 Minute to read
  • Contributors
  • Dark
    Light
  This documentation version is deprecated, please click here for the latest version.

Sublime Security

  • Dark
    Light

Article summary

Sublime Security is a comprehensive email security platform that allows users to create custom detections, gain visibility and control, and focus on prevention of malicious emails.

Sublime events can be ingested in LimaCharlie via a json Webhook Adapter configuration.

Adapter Deployment

Sublime Security logs are ingested via a cloud-to-cloud webhook Adapter configured to receive JSON events. The steps of creating this Adapter and enabling the input include:

  1. Creating the Webhook Adapter via the LimaCharlie CLI
  2. Discovering the URL created for the Webhook Adapter.
  3. Providing the completed URL to Sublime Security for webhook events.

1. Creating the LimaCharlie Webhook Adapter

The following steps are modified from the generic Webhook Adapter creation documentation, found here.

Creating a Webhook Adapter requires a set of parameters, including organization ID, installation key, platform, and mapping details, among other parameters. The following configuration can be modified to easily configure a Webhook Adapter for ingesting Sublime Security events:

{
    "sensor_type": "webhook",
    "webhook": {
       "secret": "sublime-security",
        "client_options": {
            "hostname": "sublime-security",
            "identity": {
                "oid": "<your_oid>",
                "installation_key": "<your_installation_key>"
            },
            "platform": "json",
            "sensor_seed_key": "sublime-super-secret-key",
            "mapping" : {
                "event_type_path" : "data/flagged_rules/name",
                "event_time_path" : "created_at"
            }
        }
    }
}

Note that in the mapping above, we make the following changes:

  • event_type_path is mapped to the rule name from the Sublime alert
  • event_time_path is mapped to the created_at field from the Sublime alert

2. Building the Adapter URL

After creating the webhook, you'll need to retrieve the webhook URL from the Get Org URLs API call. You'll need the following information to complete the Webhook URL:

  • Organization ID
  • Webhook name (from the config)
  • Secret (from the config)

Let's assume the returned domain looks like 9157798c50af372c.hook.limacharlie.io, the format of the URL would be:

https://9157798c50af372c.hook.limacharlie.io/OID/HOOKNAME/SECRET

Note that the secret value can be provided in the webhook URL or as an HTTP header named lc-secret.

3. Configuring the Sublime webhook Action

Within the Sublime Security console, navigate to Manage > Actions. From here, you can select New Action > Webhook.

image.png

Within the Configure webhook menu, provide a name and the Adapter URL constructed in Step 2 above.

image.png

As mentioned in Step 2, you can configure the HTTP header lc-secret, if so desired.

Upon configuration of the webhook within Sublime Security, alerts can be configured to be sent to the LimaCharlie platform. To test the Webhook, select Trigger Custom Action from any Flagged message, and send to the LimaCharlie webhook.


Was this article helpful?

What's Next