Skip to main content

The CrowdStrike Demo Falcon Integration Gateway for GCP

Project description

CrowdStrike

falcon-integration-gateway Python Lint Container Build on Quay

Falcon Integration Gateway (FIG) forwards threat detection findings and audit events from the CrowdStrike Falcon platform to the backend of your choice.

Detection findings and audit events generated by CrowdStrike Falcon platform inform you about suspicious files and behaviors in your environment. You will see detections on a range of activities from the presence of a bad file (indicator of compromise (IOC)) to a nuanced collection of suspicious behaviors (indicator of attack (IOA)) occurring on one of your hosts or containers. You can learn more about the individual detections in Falcon documentation.

This project facilitates the export of the individual detections and audit events from CrowdStrike Falcon to third-party security dashboards (so called backends). The export is useful in cases where security operation team workflows are tied to given third-party solution to get early real-time heads-up about malicious activities or unusual user activities detected by CrowdStrike Falcon platform.

Backends w/ Available Deployment Guide(s)

Backend Description Deployment Guide(s) Developer Guide(s)
AWS Pushes events to AWS Security Hub Coming Soon AWS backend
AWS_SQS Pushes events to AWS SQS Coming Soon AWS SQS backend
Azure Pushes events to Azure Log Analytics Azure backend
Chronicle Pushes events to Google Chronicle Chronicle backend
GCP Pushes events to GCP Security Command Center GCP backend
Workspace ONE Pushes events to VMware Workspace ONE Intelligence Coming Soon Workspace ONE backend

Alternative Deployment Options

:exclamation: Prior to any deployment, ensure you refer to the configuration options available to the application :exclamation:

Installation to Kubernetes using the helm chart

Please refer to the FIG helm chart documentation for detailed instructions on deploying the FIG via helm chart for your respective backend(s).

Manual Installation and Removal

With Docker/Podman

To install as a container:

  1. Pull the image
    docker pull quay.io/crowdstrike/falcon-integration-gateway:latest
    
  2. Run the application in the background passing in your backend CONFIG options
    docker run -d --rm \
      -e FALCON_CLIENT_ID="$FALCON_CLIENT_ID" \
      -e FALCON_CLIENT_SECRET="$FALCON_CLIENT_SECRET" \
      -e FALCON_CLOUD_REGION="us-1" \
      -e FIG_BACKENDS=<BACKEND> \
      -e CONFIG_OPTION=CONFIG_OPTION_VALUE \
      quay.io/crowdstrike/falcon-integration-gateway:latest
    
  3. Confirm deployment
    docker logs <container>
    

From Git Repository

  1. Clone the repository

    git clone https://github.com/CrowdStrike/falcon-integration-gateway.git
    
  2. Modify the ./config/config.ini file with your backend options

  3. Run the application

    python3 -m fig
    

Developers Guide

Statement of Support

Falcon Integration Gateway (FIG) is an open source project, not CrowdStrike product. As such it carries no formal support, expressed or implied.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

falcon-integration-gateway-3.1.7.tar.gz (25.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

falcon_integration_gateway-3.1.7-py3-none-any.whl (30.2 kB view details)

Uploaded Python 3

File details

Details for the file falcon-integration-gateway-3.1.7.tar.gz.

File metadata

File hashes

Hashes for falcon-integration-gateway-3.1.7.tar.gz
Algorithm Hash digest
SHA256 9f0e68c8d27b2b395bdeb0780ecd7a36d1a0bb5ed74d54458d57605c26456ab3
MD5 5cac489b6af6cd65873a4dc86b44814b
BLAKE2b-256 3183d7cda5a8cca92ab4861c367b0add07d3b978423027b20a44cb413ddce8b8

See more details on using hashes here.

File details

Details for the file falcon_integration_gateway-3.1.7-py3-none-any.whl.

File metadata

File hashes

Hashes for falcon_integration_gateway-3.1.7-py3-none-any.whl
Algorithm Hash digest
SHA256 28b61045affcc10187f8f4fadff41b3a6cf5312c3cbfc78165fcef36d8cf537d
MD5 91be0df16423040440a72a92dfd93483
BLAKE2b-256 30946f3b5db2246cdf3ac4f02eda35c5d81f8ba5a8c99a771c3382325a4b2922

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page