Overview
This Action uses the open source Google Magika API to scan decrypted SendSafely package files to identify file types. Packages containing files whose true types don't match their purported extensions can then be blocked or otherwise handled accordingly, and the appropriate stakeholders notified.
To request the template for this Action example, please reach out to your SendSafely account rep.
Please note that this Action requires access to the contents of SendSafely packages, and thus must be configured with a Portal Master Key.
Setup Instructions
1. Deploy the Lambda
To deploy the Lambda, you'll need the following permissions in AWS:
- Create a new Lambda Function
- Create a new AWS Secret (AWS Secrets Manager)
- Define a custom IAM Role for the Lambda function
Follow these steps:
- In AWS, navigate to CloudFormation and click Create stack, then select "With new resources (standard)" from the dropdown.
- Under Template source, select "Upload a template file," then click Choose file and select the YAML file provided by your SendSafely account rep.
- Click Next. Name the stack, e.g., "MagikaFileTypeCheckerAction," then click Next.
- Click the three checkboxes at the bottom of the page, then click Next.
- Click Submit.
- Wait for the Stack's status to change from "CREATE_IN_PROGRESS" to "CREATE_COMPLETE."
2. Update Secrets Manager
One Secret, File_Type_Check, is generated by this deployment. Click on this Secret in Secrets Manager, click Retrieve secret value, and click Edit. Provide the following secret values:
- ss-host
- ss-api-key
- ss-api-secret
- pk-: In the secret key, replace with the ID of your Master Key, provided to you by the SendSafely Support team when you submitted the public key to them. In the secret value, paste the full text of the private key, including the opening and closing tags:
------BEGIN PGP PRIVATE KEY BLOCK-----
------END PGP PRIVATE KEY BLOCK-----
For now, leave the last secret be and Click Save. We'll populate it in Step 6.
3. Create a new Workflow
As an admin logged into your SendSafely portal, click the circle containing your initials in the top-right corner of the screen and select SendSafely Actions. Here, click New Workflow.
4. Choose the trigger event
At the time of this writing, the Actions framework supports two trigger events: "A file is uploaded to a Workspace" or "A package is finalized." If you wish to perform this Action on both events, you'll need to go through this process twice, setting up two Workflows: one for each event.
5. Decide whether this Workflow will apply to a specific user's packages
This Workflow, by default, will apply to all packages portal-wide. To limit its scope to packages owned by a specific user:
- Click the plus button and select Add an Event Filter.
- From the Criteria dropdown, select Package Owner Email.
- From the Operator dropdown, select equals.
- In the Value input, type the email of the user in question and click Save.
6. Add the Actions
Three Actions comprise this Workflow. We will add them one at a time.
Action 1.
First, we'll block the package or file, preventing your recipients from accessing its contents.
- Click the plus button and select Add an Action.
- From the Action dropdown, select Block Package (or, if the trigger event is "A file is uploaded to a Workspace, Block File).
- From the Notification dropdown, select Notify on Error or Timeout.
Action 2.
Next, we'll invoke the webhook of the Lambda, which will use the Master Key to decrypt the package or file's contents, pass them to the Magika API for analysis, and return a verdict.
- Click the plus button and select Add another Action.
- From the Action dropdown, select Invoke an External Webhook.
- From the Notification dropdown, select Notify on False, or Timeout.
- Retrieve the FileTypeCheckFunctionUrl from the Outputs tab of the relevant Stack in CloudFormation, then paste it into the input in SendSafely and click Save.
- Click the text that says "Click here to view the action secret," then click Copy.
- In AWS Secrets Manager, click into the "File_Type_Check" Secret.
- Click Retrieve secret value, then click Edit.
- In the secret action-secret-id-, replace the text with the Action ID, and paste the action secret into the secret value, then click Save.
Action 3.
Last, we'll unblock the package or file, rendering its contents available to its recipients.
- Click the plus button and select Add another Action.
- From the Action dropdown, select Unblock Package (or, if the trigger event is "A file is uploaded to a Workspace, Unblock File).
- From the Notification dropdown, select Notify on Error or Timeout.
Add Action Filter.
We'll now add an Action Filter to this 3rd Action, so that it only runs if the 2nd Action succeeds. Packages with files whose types match their extensions will be unblocked, whereas packages with files whose types do not match their extensions will remain blocked.
- Click Add Action Filter.
- From the Criteria dropdown, select Action Step 2 Result.
- From the Operator dropdown, select Equals.
- From the Value dropdown, select True.
Action 4 (Optional).
If the Magika API determines that a package contains files whose types do not match their extensions, you may wish to delete that package automatically.
- Click the plus button and select Add another Action.
- From the Action dropdown, select Delete Package (or, if the trigger event is "A file is uploaded to a Workspace, Delete File).
- From the Notification dropdown, select Notify on Error or Timeout.
Add Action Filter.
We'll now add an Action Filter to this 4th Action, so that it only runs if the 2nd Action fails. Packages with files whose types do not match their extensions will be deleted.
- Click Add Action Filter.
- From the Criteria dropdown, select Action Step 2 Result.
- From the Operator dropdown, select Equals.
- From the Value dropdown, select False.
7. Activate the Workflow
At the top of the page, click the toggle next to the text "Disabled" to enable the Action. The text will change from "Disabled" to "Live.
8. Test the Workflow
Now that we've activated the Workflow, let's trigger it. If the triggering event is "A package is finalized," we'll make a Dropzone submission or create a Transfer package. If the triggering event is "A file is uploaded to a Workspace," we'll upload a file to a Workspace.
If the Magika API determines that the package contains a file whose type does not match its extension, it will remain blocked. If the Magika API determines that the package contains only files whose types match their extensions, it will be unblocked and rendered accessible to its intended recipients.
Comments
0 comments
Please sign in to leave a comment.