Skip to main content

CrowdStrike Cloud Security

CrowdStrike Cloud Security is a cloud security tool that scans your container images for policy violations and vulnerabilities. You can bring image and security data from CrowdStrike Cloud Security into Brinqa to construct a unified view of your attack surface and strengthen your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with CrowdStrike Cloud Security and how to obtain that information from CrowdStrike. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select CrowdStrike Cloud Security from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate CrowdStrike Cloud Security with Brinqa:

  • API URL: The CrowdStrike API URL. The default API URL is https://api<region>.crowdstrike.com.

    For additional information on the CrowdStrike API URL, see CrowdStrike documentation.

  • Client ID and Client secret: The client ID and client secret associated with the CrowdStrike account, which must have permissions to log in to the API server and return data.

Generate a CrowdStrike client secret

For the CrowdStrike Cloud Security connector to use the CrowdStrike API, you must provide a client secret. CrowdStrike does not allow retrieving the client secret for an existing user, therefore, you must generate a new client secret instead. To do so, follow these steps:

  1. Log in to your organization's CrowdStrike Falcon portal as an administrator.

  2. From the navigation menu, click Support and resources, and then click API clients and keys.

  3. Click Create API client.

    The Create API client window displays.

  4. Fill out the Client name, Description, and select the appropriate API scopes for the user.

  5. Click Create.

    Your new client ID, client secret, and recommended Base URL display. You cannot view the client secret again after this. Copy and save it to a secure location.

    CrowdStrike client token details

note

If you do not have permissions to create a client secret, contact your CrowdStrike administrator. For additional information, see CrowdStrike documentation.

Additional settings

The CrowdStrike Cloud Security connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 5000. It is not recommended to go over 5000.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 4.

  • Maximum retries: The maximum number of times that the integration attempts to connect to the CrowdStrike API before giving up and reporting a failure. The default setting is 10.

Types of data to retrieve

The CrowdStrike Cloud Security connector can retrieve the following types of data from the CrowdStrike API:

Table 1: Data retrieved from CrowdStrike

Connector ObjectRequiredMaps to Data Model
DetectionYesViolation
Violation Definition
ImageYesContainer Image
VulnerabilityYesVulnerability
Vulnerability Definition
info

For detailed steps on how to view the data retrieved from CrowdStrike Cloud Security in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Detection

Table 2: Detection attribute mappings

Source Field NameMaps to Attribute
ai_relatedLocal variable
cidLocal variable
detection_nameuid
detection_nametype, name, uid
detection_severityseverity, sourceSeverity, severityScore
detection_typecategories
first_seenfirstFound
image_idtargets
last_seenlastFound
sourceLocal variable
Image

Table 3: Image attribute mappings

Source Field NameMaps to Attribute
ai_relatedLocal variable
architectureLocal variable
base_osLocal variable
Categoriescategories
cidLocal variable
detectionsLocal variable
first_seenfirstSeen
highest_detection_severityLocal variable
highest_vulnerability_severityLocal variable
image_digestdigest
image_iduid
last_seenlastSeen
layers_with_vulnerabilitiesLocal variable
packagesLocal variable
registryregistry
repositoryrepository
Source statussourceStatus
Statusstatus
tagLocal variable
vulnerabilitiesLocal variable
Vulnerability

Table 4: Vulnerability attribute mappings

Source Field NameMaps to Attribute
ai_relatedLocal variable
cidLocal variable
cve_iduid
cve_idcveRecords, cveIds, name, uid, type
cvss_scorecvssV3BaseScore
first_seenfirstFound
image_idtargets
last_seenlastFound
sourceLocal variable
vulnerability_cps_ratingLocal variable
vulnerability_descriptiondescription
vulnerability_severityseverity, sourceSeverity, severityScore
vulnerability_statusstatus, sourceStatus, providerStatus, statusCategory
LOCAL VARIABLE

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

CrowdStrike Vulnerability Definitions

CrowdStrike provides comprehensive visibility into vulnerabilities across your network. However, CrowdStrike does not provide a dedicated API for directly retrieving vulnerability definitions. To bridge this gap, Brinqa has developed a distinct method for generating vulnerability definitions using data from CrowdStrike.

Take the following Vulnerability Definition ID for example:

ae83df32fef2184aaf5075b7e75e8edf_2a49280e6eaa5ebe5fdecdd337fcae14

The Vulnerability Definition ID is composed of two parts: [CrowdStrike Customer ID]_[CrowdStrike Definition ID]

  • CrowdStrike Customer ID (CID): The first part of the Vulnerability Definition ID serves as a unique identifier for your organization, ensuring that the vulnerability data is specific to your CrowdStrike environment.

  • CrowdStrike Definition ID: The second part of the Vulnerability Definition ID directly corresponds to the unique identifier of the vulnerability in your CrowdStrike environment.

In the above example, ae83df32fef2184aaf5075b7e75e8edf represents the CrowdStrike Customer ID, and 2a49280e6eaa5ebe5fdecdd337fcae14 is the CrowdStrike Definition ID. This format ensures that each vulnerability definition is accurately tied to the vulnerability identified within your organization's specific context.

Operation options

The CrowdStrike Cloud Security connector supports the following operation options. See connector operation options for information about how to apply them.

Table 5: CrowdStrike Cloud Security connector operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
Detectionimage_idAny valid image IDReturn only detections associated with the specified image ID(s).Key: image_id Value: abc12345xyz. This key and value combination only retrieves detections for the specified image.
ImagerepositoryAny valid repository nameA comma-separated list of repository names. Return only images from the specified repositories.Key: repository Value: my-org/app-backend, security-scanner/nginx. This key and value combination retrieves images from the specified repositories.
registryAny valid registry URL and pathA comma-separated list of registry URLs. Return only images from the specified registries.Key: registry Value: https://registry.example.com, https://dockerhub.io/library. This key and value combination retrieves images from the specified registries.
Vulnerabilityimage_idAny valid image IDReturn only vulnerabilities associated with the specified image ID(s).Key: image_id Value: abc12345xyz. This key and value combination only retrieves vulnerabilities for the specified image.
note

The option keys and values are case-sensitive as they are shown in this documentation.

APIs

The CrowdStrike Cloud Security connector uses the CrowdStrike API. Specifically, it uses the following endpoints:

Table 6: CrowdStrike Cloud Security API Endpoints

Connector ObjectAPI Endpoints
DetectionGET /container-security/combines/images/export/v1
ImageGET /container-security/combined/image-assessment/images/v1
VulnerabilityGET /container-security/combined/images/export/v1

Changelog

The CrowdStrike Cloud Security connector has undergone the following changes:

Table 7: CrowdStrike Cloud Security connector changelog

VersionDescription
3.2.0Initial Integration+ release.