How it Works
Indicators of Misconfiguration (IOM)
Falcon Cloud Security performs configuration assessments to identify IOMs. These are configuration settings in your cloud environment that don’t follow recommended security guidelines and could be a security risk. CrowdStrike leverages read-only IAM permissions to collect the asset inventory and detect IOMs in your cloud environment.
This is accomplished by a single IAM Role, commonly referred to as the “reader role”, deployed to each account of the AWS Organization.
The IAM Role has only read-only permissions provided by a combination of the AWS-Managed SecurityAudit policy as well as a custom inline policy.
Note: This role will also be deployed in the Organization Management or Delegated Admin account to enable automatic registration of new AWS Accounts through the organizations:ListAccounts permission.
Threat Detection
Indicators of Attack (IOA)
Falcon Cloud Security performs behavior assessment to identify indicators of attack (IOA) in near real time. These are patterns of suspicious behavior that suggest an attack might be underway.
Falcon Identity Protection
If you have a Falcon Identity Protection subscription, enabling threat detection extends Falcon Identity Protection’s threat detection capabilities to include AWS IAM Identity Center. This allows visibility into IAM Identity Center users and insights into their authentication activity.
This is accomplished by
- EventBridge Rules deployed to each region of each account of the AWS Organization
- IAM Role deployed to each account of the AWS Organization
The EventBridge rules target the CrowdStrike EventBus for your tenant to automatically forward CloudTrail API Activity which generate IOAs and Identity Protection findings.
The IAM Role provides the permissions for the EventBridge rules to target an EventBus in an external account.
Sensor Management (1Click)
If your AWS environment uses AWS Systems Manager (SSM), you can leverage it to deploy the Falcon sensor to your EC2 instances from within the Falcon console with just one click. See CrowdStrike Documentation for more details.
This is accomplished by
- IAM Role in each account to allow CrowdStrike to invoke the Sensor Management Lambda function.
- Lambda function in each account to call SSM and deploy the CrowdStrike Falcon Distributor package against SSM-Managed EC2 Instances.
- IAM Role in each account to provide execution role for Lambda function.
- Secrets Manager Secret in each each account to store Falcon API Credentials for the CrowdStrike Falcon Distributor package.
Note: This feature will only apply to SSM-Managed EC2 Instances. See AWS Documentation for details.
SSM Distributor
If your AWS environment uses AWS Systems Manager (SSM), you can leverage it to deploy the Falcon sensor to your EC2 instances automatically via State Manager Associations. The same CrowdStrike Falcon Distributor Package that enables 1Click, can also be deployed against instances in your environment without clicking through the Falcon Console. See GitHub Documentation for details.
This solution allows you to easily set up the necessary State Manager Associations in each region of each account in the AWS Organization.
This is accomplished by
- IAM Role in each account to provide execution role for State Manager Assocations
- State Manager Association in each region of each account to execute the CrowdStrike Falcon Distributor package against SSM Managed EC2 instances. The Association can be configured with a schedule and will handle both Linux and Windows machines.
- Secrets Manager Secret in each region of each account to store Falcon API Credentials for the CrowdStrike Falcon Distributor package.
Note: This feature will only apply to SSM-Managed EC2 Instances. See AWS Documentation for details.
EKS Protection
If your AWS environment uses EKS to run Kubernetes workloads, you can automatically deploy the Falcon Operator and Falcon sensor to each EKS Cluster. This solution will automically deploy Falcon to existing clusters as well as new clusters upon creation.
This is accomplished by
- IAM Roles in each account to provide permissions to List Clusters and create EKS Access Entries.
- EventBridge rules in each region of each account to trigger on CreateCluster events.
- IAM Roles in root account to facilitate permissions for EventBridge, Lambda and CodeBuild.
- Lambda function to list EKS clusters and invoke codebuild for initial deployment of Falcon to existing clusters.
- Lambda function to be triggered by CreateCluster and invoke codebuild against new clusters.
- CodeBuild project to update access entries, pull CrowdStrike images and deploy Falcon Operator/Sensor.
ECR Connections
Ensuring that the images in the registry are assessed for vulnerabilities before runtime is an important part of cloud workload protection. When a new registry connection is added, a job starts to discover all the repositories, and in parallel, the images and tags are collected from each repository to create the catalog. The catalog contains info about all images, the repository they come from, the image tag associated with that image, and the registry it belongs to. The catalog is used to compare the future and current state of the repo. We avoid showing duplicate image info by using the catalog info, including when tags move between images, to determine if we have already seen and assessed an image. When a catalog is created for a registry, the images in the catalog are inventoried.
This is accoomplished by
- IAM Roles in each account to provide permissions to push images to CrowdStrike Falcon.
- Lambda function in each account to register ECR Registries with Registry Connection service.
Note: This will connect registries in each AWS Account of the org, for each region.
Next: Choose Architecture.