Skip to main content

The CrowdStrike Demo Falcon Integration Gateway for GCP

Project description

CrowdStrike

falcon-integration-gateway Python Lint Container Build on Quay

Falcon Integration Gateway (FIG) forwards threat detection findings and audit events from the CrowdStrike Falcon platform to the backend of your choice.

Detection findings and audit events generated by CrowdStrike Falcon platform inform you about suspicious files and behaviors in your environment. You will see detections on a range of activities from the presence of a bad file (indicator of compromise (IOC)) to a nuanced collection of suspicious behaviors (indicator of attack (IOA)) occurring on one of your hosts or containers. You can learn more about the individual detections in Falcon documentation.

This project facilitates the export of the individual detections and audit events from CrowdStrike Falcon to third-party security dashboards (so called backends). The export is useful in cases where security operation team workflows are tied to given third-party solution to get early real-time heads-up about malicious activities or unusual user activities detected by CrowdStrike Falcon platform.

Backends w/ Available Deployment Guide(s)

Backend Description Deployment Guide(s) Developer Guide(s)
AWS Pushes events to AWS Security Hub Coming Soon AWS backend
AWS_SQS Pushes events to AWS SQS Coming Soon AWS SQS backend
Azure Pushes events to Azure Log Analytics Azure backend
Chronicle Pushes events to Google Chronicle Chronicle backend
CloudTrail Lake Pushes events to AWS CloudTrail Lake CloudTrail Lake backend
GCP Pushes events to GCP Security Command Center GCP backend
Workspace ONE Pushes events to VMware Workspace ONE Intelligence Coming Soon Workspace ONE backend

Alternative Deployment Options

:exclamation: Prior to any deployment, ensure you refer to the configuration options available to the application :exclamation:

Installation to Kubernetes using the helm chart

Please refer to the FIG helm chart documentation for detailed instructions on deploying the FIG via helm chart for your respective backend(s).

Manual Installation and Removal

With Docker/Podman

To install as a container:

  1. Pull the image
    docker pull quay.io/crowdstrike/falcon-integration-gateway:latest
    
  2. Run the application in the background passing in your backend CONFIG options
    docker run -d --rm \
      -e FALCON_CLIENT_ID="$FALCON_CLIENT_ID" \
      -e FALCON_CLIENT_SECRET="$FALCON_CLIENT_SECRET" \
      -e FALCON_CLOUD_REGION="us-1" \
      -e FIG_BACKENDS=<BACKEND> \
      -e CONFIG_OPTION=CONFIG_OPTION_VALUE \
      quay.io/crowdstrike/falcon-integration-gateway:latest
    
  3. Confirm deployment
    docker logs <container>
    

From Git Repository

  1. Clone the repository

    git clone https://github.com/CrowdStrike/falcon-integration-gateway.git
    
  2. Modify the ./config/config.ini file with your backend options

  3. Run the application

    python3 -m fig
    

Developers Guide

Statement of Support

Falcon Integration Gateway (FIG) is an open source project, not a CrowdStrike product. As such it carries no formal support, expressed or implied.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

falcon-integration-gateway-3.1.10.tar.gz (27.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

falcon_integration_gateway-3.1.10-py3-none-any.whl (33.4 kB view details)

Uploaded Python 3

File details

Details for the file falcon-integration-gateway-3.1.10.tar.gz.

File metadata

File hashes

Hashes for falcon-integration-gateway-3.1.10.tar.gz
Algorithm Hash digest
SHA256 8566084340d1a08bbe4032a4ff862dbc4ac0333517034b608fd5e1a04cb92056
MD5 0573a93ffb0f3ab6cac04e7742b4cf43
BLAKE2b-256 d7ccfea166e951d2d73ede3b63756b61cce97fa0bdf03436f7a5733e83845239

See more details on using hashes here.

File details

Details for the file falcon_integration_gateway-3.1.10-py3-none-any.whl.

File metadata

File hashes

Hashes for falcon_integration_gateway-3.1.10-py3-none-any.whl
Algorithm Hash digest
SHA256 d47cf0aea1c7b238dc0627ad585439e1039f523e4c844f53e87015916c011af7
MD5 277a3f9eaf7bf21f348974e547afbf55
BLAKE2b-256 361a1acb54b794ee2010e39bf2b97ed7f60f228d020113a0464f35dd383b0362

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page