IBM Verify Antenna
IBM® Verify Antenna is a lightweight, self-hosted container that enables the seamless exchange of security events and risk signals by using the OpenID Shared Signals Framework.
The Shared Signals Framework (SSF) is a collaborative approach to cybersecurity threat detection and response. It enables organizations to share and act on threat intelligence in a standardized and automated way. By providing a common language and structure for describing security events, the framework facilitates the exchange of critical information between security systems, tools, and stakeholders.
This approach allows for more effective and efficient detection, prevention, and response to cyberthreats, ultimately improving the overall security posture of participating organizations. The framework is flexible and adaptable, supporting a wide range of use cases and threat scenarios, including phishing, ransomware, advanced persistent threats, and supply chain vulnerabilities.
By using the Shared Signals Framework, organizations can enhance their cybersecurity capabilities, reduce the risk of cyberattacks, and increase their resilience in the face of evolving cyberthreats.
- As a transmitter, it ingests events from various sources such as files, databases, audit streams, and so on. It transforms them into standards-based or custom event formats, and transmits them securely, as defined by the framework.
- As a receiver, IBM Verify Antenna consumes events and converts them into actions on target systems. For example, it can revoke user sessions when it detects risky behavior that is associated with a user or device.
Runtime overview
- Ingests data from an external source.
- Converts the data into a standardized security event.
- Converts the security event into a security event token (SET), a signed JSON Web Token.
- Transmits the SET.
- Receives SETs from the transmitter.
- Verifies the SET's signature and source.
- Performs actions based on the security event that is contained in the SET.
Stream setup
- Delivery method
- What delivery method to use to deliver the security event token. This is either push or poll.
- Event type
- What events does the receiver want to receive. These can be event types from profiles such as Continuous Access Evaluation Profile and Risk Incident Sharing and Coordination profile, or any custom event types agreed upon by both transmitter and receiver.
IBM Verify Antenna Components
The IBM Verify Antenna container image consists of multiple internal components.
- Ingester
- Collects data from multiple sources.
- Processor
- Processes the ingested data. In this case, it takes the data from the ingester and converts it into a standardized security event. This transformation is executed with a customizable JavaScript per ingester source.
- Transmitter
- Prepares and transmits the security events. The security event is signed and converted into a
Security Event Token (SET).
- For PUSH streams, the transmitter sends the relevant SETs.
- For POLL streams, the transmitter stores the SETs and waits for the receiver to POLL. When the receiver polls the transmitter for events, the transmitter returns the stored SETs. For polling, the receiver must acknowledge the receipt of each SET. For SETs that have not been acknowledged, the transmitter resends them in the next polling cycle.
- Receiver
- Receives pushed SETs or polls the transmitter for SETs. The SET is validated and persisted before the receiver sends back an acknowledgment for the SET.
- Processor
- For each event type received, a customizable JavaScript can be executed to read the event and perform an action. This customizable JavaScript is per event type.