Connecting CrowdStrike Falcon Exposure Management to Drata allows for the automated, continuous monitoring of SLA due dates and evidence collection of vulnerabilities issues required for compliance.
This integration automates evidence collection for the Vulnerability Scanning test, which is mapped to DCF-18 by default. You can view findings by selecting the View Findings button after connecting or navigating directly to the Vulnerabilities page through the left-side navigation menu.
Prerequisite
Create a CrowdStrike Falcon API Client ID and Secret. Ensure to save the values; you will need to enter those values when connecting to Drata.
In the CrowdStrike Falcon console, navigate to the API Clients and Keys page and select on Create API client.
Enter the details for the API.
When prompted, enable the following API scopes:
Vulnerabilities: Read
Hosts: Read
Host Groups: Read
User Management: Read
Prevention Policies: Read
Device Control Policies: Read
Response policies: Read
Sensor Update Policies: Read
Note: Drata will pull up to 1,000 new or updated vulnerabilities for each connection daily, ordered by severity from critical to low. You can select what kind of vulnerabilities will be synced based on the severity when connecting.
Connect CrowdStrike Falcon Exposure Management to Drata
Select Connections from the left-side navigation menu.
Go to the Available Connections tab and search for "CrowdStrike Falcon Exposure Management".
Alternatively, you can select Vulnerability Scanning under the Types section of the connections to search for the connection.
In the connection drawer, you can select the severity and the date of the vulnerabilities you want to sync. These selections will also be included in the test result report for visibility.
Severity of vulnerabilities: Select the severity level of the vulnerabilities that you want to sync into Drata for compliance monitoring. Critical and High are auto-selected. Drata will bring up to 1000 new vulnerabilities or updates to vulnerabilities, sorted by severity.
First seen on: Select the date when the vulnerabilities you want to sync were first created. All vulnerabilities detected on and after this date will be synced.
Select the connect button to proceed.
Enter the Client ID and Secret and the Base URL. The base URL that corresponds to the cloud where your CrowdStrike integration is hosted. It has the format of
https://api[<deployment>].crowdstrike.com
. Use one of the following URLs based on your region:
Once the connection is successfully created, you can select the View Findings button on the connection card or navigate to the Vulnerabilities page to review and manage the synced vulnerabilities for compliance monitoring. Learn more at Vulnerabilities help article.