Overview
This Action uses the SophosLabs Intelix API to scan decrypted SendSafely package contents for malicious content. Packages containing malicious content can then be blocked or otherwise handled accordingly, and the appropriate stakeholders notified.
To request the template for this Action example, please reach out to your SendSafely account rep.
Please note that this Action requires access to the contents of SendSafely packages, and thus must be configured with a Portal Master Key.
Setup Instructions
1. Deploy the Lambda
To deploy the Lambda, you'll need the following permissions in AWS:
- Create a new Lambda Function
- Create a new AWS Secret (AWS Secrets Manager)
- Define a custom IAM Role for the Lambda function
Follow these steps:
- In AWS, navigate to CloudFormation and click Create stack, then select "With new resources (standard)" from the dropdown.
- Under Template source, select "Upload a template file," then click Choose file and select the YAML file provided by your SendSafely account rep.
- Click Next. Name the stack, e.g., "SophosLabsIntelixAVAction," then click Next.
- Click the three checkboxes at the bottom of the page, then click Next.
- Click Submit.
- Wait for the Stack's status to change from "CREATE_IN_PROGRESS" to "CREATE_COMPLETE."
2. Update Secrets Manager
There are three Secrets generated by this deployment:
- Sophos_Scanning_Private_Key
- Sophos_Scanning_Config
- Sophos_Access_Token
We will update the first two of them, but leave the third alone, as its values are programmatically generated by the deployment.
Sophos_Scanning_Private_Key
Click on this Secret in Secrets Manager, click Retrieve secret value, and click Edit. Here, paste the full text of the private key, including the opening and closing tags:
------BEGIN PGP PRIVATE KEY BLOCK-----
------END PGP PRIVATE KEY BLOCK-----
Click Save.
Sophos_Scanning_Config
Click on this Secret in Secrets Manager, click Retrieve secret value, and click Edit. Provide the following secret values:
- sophos-client-id, from Sophos
- sophos-client-secret, from Sophos
- ss-host
- ss-api-key
- ss-api-secret
- ss-public-key-id, from your Master Key (the SendSafely Support team will provide you this ID when you submit them the public key)
For now, leave the last two secret values be and Click Save. We'll populate one of them in Step 6.
3. Create a new Workflow
As an admin logged into your SendSafely portal, click the circle containing your initials in the top-right corner of the screen and select SendSafely Actions. Here, click New Workflow.
4. Choose the trigger event
At the time of this writing, the Actions framework supports two trigger events: "A file is uploaded to a Workspace" or "A package is finalized." If you wish to perform this Action on both events, you'll need to go through this process twice, setting up two Workflows: one for each event.
5. Decide whether this Workflow will apply to a specific user's packages
This Workflow, by default, will apply to all packages portal-wide. To limit its scope to packages owned by a specific user:
- Click the plus button and select Add an Event Filter.
- From the Criteria dropdown, select Package Owner Email.
- From the Operator dropdown, select equals.
- In the Value input, type the email of the user in question and click Save.
6. Add the Actions
Three Actions comprise this Workflow. We will add them one at a time.
Action 1.
First, we'll block the package or file, preventing your recipients from accessing its contents.
- Click the plus button and select Add an Action.
- From the Action dropdown, select Block Package (or, if the trigger event is "A file is uploaded to a Workspace, Block File).
- From the Notification dropdown, select Notify on Error or Timeout.
Action 2.
Next, we'll invoke the webhook of the Lambda, which will use the Master Key to decrypt the package or file's contents, pass them to the SophosLabs Intelix API for analysis, and return a verdict.
- Click the plus button and select Add another Action.
- From the Action dropdown, select Invoke an External Webhook.
- From the Notification dropdown, select Notify on False, or Timeout.
- Retrieve the AVScanningWebhookUrl from the Outputs tab of the relevant Stack in CloudFormation, then paste it into the input in SendSafely and click Save.
- Click the text that says "Click here to view the action secret," then click Copy.
- In AWS Secrets Manager, click into the "Sophos_Scanning_Config" Secret.
- Click Retrieve secret value, then click Edit.
- Paste the action secret into the value for action-secret-id-<actionId-finalize-package> (if the trigger event was "A package is finalized.") or for action-secret-id-<actionId-workspace-upload> (if the trigger event was "A file is uploaded to a Workspace"), then click Save.
Action 3.
Last, we'll unblock the package or file, rendering its contents available to its recipients.
- Click the plus button and select Add another Action.
- From the Action dropdown, select Unblock Package (or, if the trigger event is "A file is uploaded to a Workspace, Unblock File).
- From the Notification dropdown, select Notify on Error or Timeout.
Add Action Filter.
We'll now add an Action Filter to this 3rd Action, so that it only runs if the 2nd Action succeeds. Packages or files deemed clean by the SophosLabs Intelix API will be unblocked, whereas packages or files deemed dirty will remain blocked.
- Click Add Action Filter.
- From the Criteria dropdown, select Action Step 2 Result.
- From the Operator dropdown, select Equals.
- From the Value dropdown, select True.
Action 4 (Optional).
If the SophosLabs Intelix API determines that a package contains malware, you may wish to delete that package automatically.
- Click the plus button and select Add another Action.
- From the Action dropdown, select Delete Package (or, if the trigger event is "A file is uploaded to a Workspace, Delete File).
- From the Notification dropdown, select Notify on Error or Timeout.
Add Action Filter.
We'll now add an Action Filter to this 4th Action, so that it only runs if the 2nd Action fails. Packages or files deemed dirty by the SophosLabs Intelix API will be deleted.
- Click Add Action Filter.
- From the Criteria dropdown, select Action Step 2 Result.
- From the Operator dropdown, select Equals.
- From the Value dropdown, select False.
7. Activate the Workflow
At the top of the page, click the toggle next to the text "Disabled" to enable the Action. The text will change from "Disabled" to "Live.
8. Test the Workflow
Now that we've activated the Workflow, let's trigger it. If the triggering event is "A package is finalized," we'll make a Dropzone submission or create a Transfer package. If the triggering event is "A file is uploaded to a Workspace," we'll upload a file to a Workspace.
If the SophosLabs Intelix API determines that the package or file that triggered the Action is dirty, it will remain blocked. If the SophosLabs Intelix Falcon API determines that the package or file that triggered the Action is clean, it will be unblocked and rendered accessible to its intended recipients.
Comments
0 comments
Please sign in to leave a comment.