How to Ensure Cyber Security With ipstackĀ© Integration

Introduction

When a customer is independently creating a loan application (from the Web), it might be difficult to check how reliable their connection is and and how trustworthy they are. This makes a cyber security check an important part of the overall company security.

For this purposes, TurnKey Lender supports integration with ipstackĀ© - a powerful, real-time IP to geolocation API capable of looking up accurate location data and assessing security threats originating from risky IP addresses.

Learn:

  • What parameters are collected

  • How the ipstackĀ© security check results are used in the application

  • How to integrate with ipstackĀ©

Available ipstackĀ© Parameters

Integration with ipstackĀ© allows to check a number of security parameters including the following ones, used by the TurnKey Lender application:

  • Proxy usage: Š”hecks if the customer is using an intermediary server between them and the application page (a ā€œproxy serverā€) when applying for the loan. Proxy servers may be used to mask the true origin of the request to the Application. For example source country or network

  • Tor system usage: Š”hecks if the customer is using the onion routing system (used for anonymization of communication) when applying for the loan.

  • Crawler usage: A crawler is a computer program that can be used to steal sensitive data.

  • IP location details: The IP address and location (country, region, city, zip) from which the loan application has been physically created. In particular the system can check if the IP location matches information provided in the loan.

  • Network threat level: An automatically defined parameter based on the assessment of all the collected data and passed by the ipstackĀ© API. Can be defined as low, medium or high.

The ipstackĀ© Check Results Usage

The results of the ipstackĀ© checks are used for two purposes:

  • To display results to help make the loan approval/rejection decision on the Underwriting workplace.

  • To define rules for automatic loan application decision engine.

The ipstackĀ© Check Results on the Underwriting Workplace

The results of the connection check are visible on the Underwriting workplace under the Risk Score section.

The ipstackĀ© Check Result Details

Results of the checks on the use of proxy server, crawler and Tor system are displayed. If the threat has not been detected, the result is displayed in green.

Ā 

Ā 

Otherwise, the result is displayed in red.

Ā 

Ā 

Ā 

IP Location Check

The IP location parameters (country, region, etc.) are checked against the location details of the customer defined in the loan application. If a discrepancy is defined, a warning is issued.

Hover over the IP location line to see the details:

Ā 

Ā 

The ipstackĀ© Check Results for Automatic Decision

Along with that, the ipstackĀ© check results are used by TurnKey Lenderā€™s decision engine (to make an automatic decision on the loan application approval/rejection). By default, the rules on all three parameters are used and the application is rejected in case of:

  • a Proxy usage detection

  • a Tor system usage detection

  • a network threat level of medium or high

The number of rules met is displayed at the bottom of the tile on the ā€œUnderwritingā€ workplace.

Ā 

Alter the Decision Engine Rules

To change the rules, go to the ā€œSettings workplaceā€, open the ā€œDecision engineā€ tab and scroll down to the ā€œNetwork security rulesā€ section.

These rules can be updated in the same manner as for any other Setting Up Rules.

If you have unchecked the rule, it will not be used by the decision engine, but will still be available in the Risk Score tab (Underwriting workplace).

How to Integrate with ipstackĀ©

Integration process with ipstackĀ© is rather straightforward for our users:

  • Create an ipstackĀ© account and get the API Access Key, as described in the ipstack documentation.

  • Request the integration from TurnKey Lender team and provide them with your API Access Key value.