General Setup Details
CrowdStrike Falcon sensor installation is conducted via the standard Glean deploy process. The customer need not worry about having to perform the installation, nor does the customer need to make any changes to the Glean deployment. The customer will need to provide Glean with some details to have CrowdStrike Falcon deployed properly. Please see the requirements section.Setup Details
For EC2 instances, Glean simply installs the Falcon agent. For K8s, Glean leverages the Falcon Operator to install the Node Sensor and the Kubernetes Admission Controller.Requirements
Licensing
CrowdStrike is not hosted by Glean; CrowdStrike is hosted by the customer and Glean hooks in to the customer’s CrowdStrike licenses. For customers to leverage CrowdStrike Falcon sensors to monitor their Glean deployment, there are one of 2 licensing options that customers must possess:- Option 1: For CrowdStrike’s most comprehensive security capabilities, customers will need both CNAPP and CNAPP with Containers
- Option 2: For just runtime protection, customers will need both Cloud Runtime Security and Cloud Runtime Security with Containers
Pricing
Because this is reporting back to the customer’s CrowdStrike tenant, the customer is responsible for all billing related matters.Customer Instructions
Glean requires that the customer perform the following steps:- Perform the steps required to add the Glean AWS account to your Falcon console for monitoring. Follow the CrowdStrike documentation for how to do this.
- You will need CrowdStrike credentials that will be used by the Falcon sensors to communicate back to CrowdStrike. These credentials are composed of the following elements:
- Client ID
- Client Secret
- Customer ID
- Grant the credentials the
Falcon Images Downloadpermission. This is needed for the k8s components to pull down the required containers from CrowdStrike. - Create the Secrets Manager entry (more on this below)
- Provide details to Glean (more on this below)
Secret Creation
The Glean deployment needs access to the credentials that have been minted. To securely provide this to the deployment, Glean requires that the customer mint an AWS Secrets Manager secret in the same region as the Glean deployment. For simplicity, we recommend creating this secret in the same AWS account as the Glean deployment, however, you also have the option of placing this in a different AWS account (instructions below).Preferred: Secret in the same AWS account as the Glean deployment:
If you are creating a secret in the same AWS account as the Glean deployment, then we recommend that you create a secret that is encrypted with the AWS managedaws/secretsmanager KMS key.
Create the secret and proceed to the next section on what the secret value should be.
Secret in a different AWS account than the Glean deployment:
If you are creating a secret in a different AWS account than the Glean deployment, then you must create a new AWS Customer Managed Key (KMS) first. This KMS key will need to have the following policy applied:The Secret Contents
The secret that is created needs to be a JSON string that looks like this:- The CrowdStrike Falcon Client Secret for
FALCON_CLIENT_SECRET - The Customer ID for
CUSTOMER_ID
- The ARN of the created secret
- The ARN of the KMS key that encrypted the secret. You can locate this in the KMS console. For the
aws/secretsmanagermanaged secret, you can locate this in the AWS console under AWS managed keys to obtain the ARN for it.
Provide Glean with Details
After you have completed all the customer steps above, then last step is to provide the desired CrowdStrike deployment details to Glean. The following details need to be sent over:- The Client ID for the credentials.
- The ARN of the Secrets Manager Secret that was created above.
- The ARN of the KMS key that encrypted the Secrets Manager Secret that was created above.
- An optional comma-separated list of Tags that you would like to have applied to CrowdStrike deployments.
- An optional “version decrement” for EC2 instances. By default, this value is set to 0. This sets the Falcon version to deploy minus the decrement (i.e. you can have the Falcon release that is 2 versions old to be deployed). See the CrowdStrike documentation for details.
- An optional kubernetes Falcon auto update strategy. By default, this is set to
normal, but this can also be set toofforforce. See the CrowdStrike documentation for details. - An optional kubernetes Falcon update policy string. This is the name of the Falcon Linux sensor update policy (configured in the Falcon UI). When set, this policy determines which Falcon sensor version to install. This is unset by default. See the CrowdStrike documentation for details.