Skip to main content

CrowdStrike SaaS Security

CrowdStrike SaaS Security is a SaaS security platform that monitors and protects SaaS application environments by detecting security violations, alerts, and risks across integrated services. You can bring alert, compliance, device, host, user, and security data from CrowdStrike SaaS Security into Brinqa to construct a unified view of your attack surface and strengthen your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with CrowdStrike SaaS Security and how to obtain that information from CrowdStrike. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select CrowdStrike SaaS Security from the Connector dropdown. If you cannot find the connector in the dropdown, make sure that you have installed it first. You must provide the following information to authenticate CrowdStrike SaaS Security with Brinqa:

  • API URL: The CrowdStrike API URL. The default API URL is https://<region>.crowdstrike.com.

    For additional information on the CrowdStrike API URL, see CrowdStrike documentation.

  • Client ID and Client secret: The client ID and client secret associated with the CrowdStrike account, which must have permissions to log in to the API server and return data.

Generate a CrowdStrike client secret

For the CrowdStrike SaaS Security connector to use the CrowdStrike API, you must provide a client secret. CrowdStrike does not allow retrieving the client secret for an existing user, therefore, you must generate a new client secret instead. To do so, follow these steps:

  1. Log in to your organization's CrowdStrike Falcon portal as an administrator.

  2. From the navigation menu, click Support and resources, and then click API clients and keys.

  3. Click Create API client.

    The Create API client window displays.

  4. Fill out the Client name, Description, and select the appropriate API scopes for the user.

  5. Click Create.

    Your new client ID, client secret, and recommended Base URL display. You cannot view the client secret again after this. Copy and save it to a secure location.

    CrowdStrike client token details

note

If you do not have permissions to create a client secret, contact your CrowdStrike administrator. For additional information, see CrowdStrike documentation.

Additional settings

The CrowdStrike SaaS Security connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 100.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 1.

  • Maximum retries: The maximum number of times that the integration attempts to connect to the CrowdStrike API before giving up and reporting a failure. The default setting is 3.

Types of data to retrieve

The CrowdStrike SaaS Security connector can retrieve the following types of data from the CrowdStrike API:

Table 1: Data retrieved from CrowdStrike SaaS Security

Connector ObjectRequiredMaps to Data Model
AlertYesAlert
Alert DefinitionYesAlert Definition
Compliance ControlNoNot mapped
DeviceYesDevice
HostYesHost
Integrated UserYesPerson
IntegrationYesCloud Account
ViolationYesViolation
Violation DefinitionYesViolation Definition
info

For detailed steps on how to view the data retrieved from CrowdStrike SaaS Security in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Alert

Table 2: Alert attribute mappings

Source Field NameSDM Attribute
account_idACCOUNT_ID
affected_diffAFFECTED_DIFF
Generated (sync capture timestamp)LAST_CAPTURED
idUID
integration.idTARGETS
is_archivedIS_ARCHIVED
new_affected_countNEW_AFFECTED_COUNT
Generated (set to "active")PROVIDER_STATUS
security_check_api_linkSECURITY_CHECK_API_LINK
sourceSOURCE
Generated (normalized "active")SOURCE_STATUS
source_idTYPE
timestampSOURCE_CREATED_DATE
user_who_archivedUSER_WHO_ARCHIVED
Alert Definition

Table 3: Alert Definition attribute mappings

Source Field NameSDM Attribute
categoriesCATEGORIES
descriptionDESCRIPTION
idUID
Generated (sync capture timestamp)LAST_CAPTURED
alert_typeNAME
Compliance Control

Table 4: Compliance Control attribute mappings

Source Field NameSDM Attribute
control_titleCONTROL_TITLE
domainDOMAIN
exposure_idUID
Generated (sync capture timestamp)LAST_CAPTURED
standardSTANDARD
Device

Table 5: Device attribute mappings

Source Field NameSDM Attribute
account_idACCOUNT_ID
categoriesCATEGORIES
emailEMAIL
has_user_associationHAS_USER_ASSOCIATION
idUID
integrationsINTEGRATIONS
Generated (sync capture timestamp)LAST_CAPTURED
last_seenLAST_SEEN
nameNAME
osOS
os_platformOS_PLATFORM
os_versionOS_VERSION
user_existsUSER_EXISTS
Host

Table 6: Host attribute mappings

Source Field NameSDM Attribute
account_idACCOUNT_ID
categoriesCATEGORIES
emailEMAIL
has_user_associationHAS_USER_ASSOCIATION
idUID
integrationsINTEGRATIONS
Generated (sync capture timestamp)LAST_CAPTURED
last_seenLAST_SEEN
mac_addressesMAC_ADDRESSES
nameNAME
osOS
os_platformOS_PLATFORM
os_versionOS_VERSION
user_existsUSER_EXISTS
Integrated User

Table 7: Integrated User attribute mappings

Source Field NameSDM Attribute
account_idACCOUNT_ID
categoriesCATEGORIES
companyCOMPANY
countryCOUNTRY
departmentDEPARTMENT
descriptionDESCRIPTION
domainDOMAIN
emailsEMAILS
enabledENABLED
exposuresEXPOSURES
exposures_totalEXPOSURES_TOTAL
idUID
integrationsINTEGRATIONS
integrations_totalINTEGRATIONS_TOTAL
Generated (sync capture timestamp)LAST_CAPTURED
login_namesLOGIN_NAMES
full_nameNAME
rolesROLES
statusSOURCE_STATUS
statusSTATUS
user_item_identityUSER_ITEM_IDENTITY
Integration

Table 8: Integration attribute mappings

Source Field NameSDM Attribute
account_idACCOUNT_ID
aliasALIAS
categoriesCATEGORIES
created_timeSOURCE_CREATED_DATE
enabledENABLED
idUID
issuesISSUES
Generated (sync capture timestamp)LAST_CAPTURED
last_runLAST_SCANNED
nameNAME
saas_idSAAS_ID
saas_nameSAAS_NAME
integration_statusSOURCE_STATUS
integration_statusSTATUS
Violation

Table 9: Violation attribute mappings

Source Field NameSDM Attribute
account_idACCOUNT_ID
account_idTARGETS
affectedAFFECTED
base_check_idBASE_CHECK_ID
base_check_idTYPE
created_byCREATED_BY
creation_dateFIRST_FOUND
creation_dateSOURCE_CREATED_DATE
dismiss_expiration_dateDISMISS_EXPIRATION_DATE
dismiss_reasonDISMISS_REASON
idSECURITY_CHECK_ID
idUID
is_globalIS_GLOBAL
Generated (sync capture timestamp)LAST_CAPTURED
Generated (computed from status)PROVIDER_STATUS
saas_nameSAAS_NAME
statusSOURCE_STATUS
status_last_changed_dateSOURCE_LAST_MODIFIED
status_reasonSTATUS_REASON
user_who_dismissedUSER_WHO_DISMISSED
Violation Definition

Table 10: Violation Definition attribute mappings

Source Field NameSDM Attribute
security_domainCATEGORIES
control_codesCONTROL_CODES
remediation_planDESCRIPTION
idUID
Generated (sync capture timestamp)LAST_CAPTURED
security_check_typeNAME
remediation_planRECOMMENDATION
severity (normalized)SEVERITY
severity (scored)SEVERITY_SCORE
severitySOURCE_SEVERITY
LOCAL VARIABLE

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Operation options

The CrowdStrike SaaS Security connector supports the following operation options. See connector operation options for information about how to apply them.

Table 11: CrowdStrike SaaS Security connector operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
Alert,
Alert Definition
alert_typeAny valid alert typeReturn only alerts or alert definitions of the specified type.Key: alert_type Value: misconfiguration. This key and value combination only retrieves alerts of the specified type.
Compliance Control,
Violation,
Violation Definition
check_typeAny valid check typeReturn only violations matching the specified check type.Key: check_type Value: security. This key and value combination only retrieves violations of the specified check type.
impactAny valid impact valueReturn only violations with the specified impact level.Key: impact Value: high. This key and value combination only retrieves violations with high impact.
include_compliancetrue, falseWhen set to true, the connector retrieves compliance control data alongside violations. Default is false.Key: include_compliance Value: true. This key and value combination retrieves compliance control data with violation results.
integration_idAny valid integration IDReturn only violations for the specified integration.Key: integration_id Value: abc12345. This key and value combination only retrieves violations for the specified integration.
statusAny valid violation statusReturn only violations with the specified status.Key: status Value: open. This key and value combination only retrieves violations with an open status.
Device,
Host
integration_idAny valid integration IDReturn only devices or hosts associated with the specified integration.Key: integration_id Value: abc12345. This key and value combination only retrieves devices for the specified integration.
Integrated UseremailAny valid email addressReturn only users matching the specified email.Key: email Value: user@example.com. This key and value combination only retrieves the user with the specified email.
integration_idAny valid integration IDReturn only users associated with the specified integration.Key: integration_id Value: abc12345. This key and value combination only retrieves users for the specified integration.
privileged_onlytrue, falseWhen set to true, return only privileged users.Key: privileged_only Value: true. This key and value combination only retrieves privileged users.
Integrationsaas_idAny valid SaaS IDReturn only integrations matching the specified SaaS ID.Key: saas_id Value: 12345. This key and value combination only retrieves integrations with the specified SaaS ID.
note

The option keys and values are case-sensitive as they are shown in this documentation.

APIs

The CrowdStrike SaaS Security connector uses the CrowdStrike SaaS Security API. Specifically, it uses the following endpoints:

Table 12: CrowdStrike SaaS Security API Endpoints

Connector ObjectAPI Endpoints
AlertGET /saas-security/entities/alerts/v3
Alert DefinitionGET /saas-security/entities/alerts/v3
Compliance ControlGET /saas-security/entities/compliance/v3
DeviceGET /saas-security/entities/devices/v3
HostGET /saas-security/entities/devices/v3
Integrated UserGET /saas-security/entities/users/v3
IntegrationGET /saas-security/entities/integrations/v3
ViolationGET /saas-security/entities/checks/v3
Violation DefinitionGET /saas-security/entities/checks/v3

Changelog

The CrowdStrike SaaS Security connector has undergone the following changes:

note

This connector is part of a bundled release with other connectors from the same vendor. If a version shows "No change", it means that the connector version was updated for consistency as part of the bundle, but no functional changes were made to this specific connector. You can update to or skip this version without affecting your existing configuration.

Table 13: CrowdStrike SaaS Security connector changelog

VersionDescriptionDate Published
3.2.18Initial Integration+ release.March 15th, 2026