0% found this document useful (0 votes)
42 views

Crowdstrike Zero Trust Solutions

Crowdstrike Zero Trust Solutions whitepaper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Crowdstrike Zero Trust Solutions

Crowdstrike Zero Trust Solutions whitepaper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CrowdStrike Solutions

CROWDSTRIKE
ZERO TRUST
A frictionless Zero Trust approach to stop
modern attacks in your enterprise

CHALLENGES KEY BENEFITS


In flat networks and hybrid enterprises, conventional
Zero Trust technologies with static policies built around Start the Zero Trust journey in a phased manner (e.g., starting with
hardware firewalls, VPNs and VLANs have limited efficacy, identity protection and extending to cover endpoints and workloads,
scalability and manageability. The traditional perimeter has or vice versa)
dissolved — users, endpoints, applications and workloads
are distributed across on-premises and multiple clouds.
Realize value from Day One by enabling instant protection
When users access applications and resources that reside without hardware or storage provisioning, reboots and complex
anywhere, from a mix of company-issued and unmanaged configurations
endpoints from any location, the enterprise becomes more
vulnerable to sophisticated threats.
Eliminate the security complexity involved with managing terabytes
of data, threat intelligence feeds, and hardware and storage
SOLUTION management with a unified, cloud-native approach

The CrowdStrike Zero Trust solution secures the modern Stop breaches such as supply chain attacks, ransomware exploits
enterprise with its cloud-delivered approach to stop and other sophisticated threats in real time from any endpoint,
breaches in real time on any endpoint, cloud workload workload and meet cyber insurance requirements
or identity, wherever they are. CrowdStrike does all of
the heavy lifting for enterprise security teams to enforce
Realize frictionless Zero Trust security with high-fidelity cloud-
frictionless Zero Trust with its industry-leading CrowdStrike delivered attack correlations, behavioral risk analytics and policy
Security Cloud — the world’s largest unified, threat-centric enforcement, and reduce the blast radius across on-premises and
data fabric to stop breaches. The CrowdStrike Security multi-cloud data centers
Cloud processes trillions of events, enabling hyper accurate
attack correlation and real-time threat analytics and
Improve security operations center (SOC) analysts’ mean time to
response that can scale any deployment model, whether effectively detect and respond to evolving adversarial tactics by
they are multi-cloud or hybrid enterprises that may also run reducing the need for cumbersome log analysis
legacy and proprietary applications.
CrowdStrike Solutions

CROWDSTRIKE ZERO TRUST

KEY CAPABILITIES
CrowdStrike follows the NIST SP 800-207 framework, widely followed by governments and
private organizations, to enable security in the cloud-first, work-from-anywhere environment.

REQUESTOR DATA
CHALLENGE/BLOCK
SECURITY CLOUD ALLOW

SENSOR/AGENT RESOURCES
Endpoint Threat Graph PUBLIC CLOUD
Identity PRIVATE CLOUD
Risk Engine
Workload DATACENTER
ALLOW
CHALLENGE/BLOCK
Policy Engine

CONTEXT AND CONTROL RISK SCORE

API ZTA
SSO, AD, AZURE AD, SIEM, SOAR, IDENTITY PROVIDERS,
50+ INTEGRATIONS SECURE ACCESS, OTHERS

KEY PRINCIPLES OF ZERO TRUST


 nderstand behavioral data: Are users accessing the applications or resources they
U
are supposed to? Is there protocol misuse such as a regular user doing Remote Desktop
Protocol (RDP) to a Domain Controller (DC)? Is there suspicious behavior using privileged
credentials?

 imit the attack surface with segmentation: Limit the scope of what applications can
L
do; control where regular users, third-party contractors and privileged users can go; and
limit what service accounts can access with segmentation. Apply the principles of least
privilege and dynamic risk assessment to reduce the attack surface.

 utomate security tied to context: Use signals from users, devices, networks and
A
workloads to gain unified visibility, improve analytics, enforce policies and automate
security — all tied to context to improve the fidelity of alerts and incident response.

 ontinuously verify accesses with the least friction: Verify every access to applications,
C
resources and workloads with deep knowledge of the risks and deviations, and not based
on trust or access timeouts (i.e., continuously monitor what’s happening even after granting
access to a resource). The key is to verify access continuously without degrading the user
experience or affecting business productivity.
CrowdStrike Solutions

CROWDSTRIKE ZERO TRUST

SCALABLE AND FLEXIBLE FRICTIONLESS ZERO TRUST JOURNEY

OPTIMIZE
PROTECTION

M I T I GAT E
• Enhance UX with intelligent
conditional access
V I SUALI Z E • Protect endpoints, • Extend MFA to improve
identities, workloads in security coverage
real time with behavioral • Assess and share endpoint
• Discover endpoints, and real-time analytics security posture
identities, applications • Automatically segment • Unlock the full potential
• Visualize attack paths identities of frictionless Zero Trust
• Discover and assess • Enrich telemetry with with CrowdStrike Zero Trust
multi-cloud workloads threat context and intel Ecosystem partners

ADOPTION

The CrowdStrike Zero Trust Journey

By adopting frictionless CrowdStrike Zero Trust aligned with the key principles described, the
enterprise can maximize enterprise-wide coverage across endpoints, identities, and applications
and workloads, with rapid and scalable deployment.

Purpose-built in the cloud with a single lightweight-agent architecture, the CrowdStrike Zero
Trust solution provides automated protection and remediation, elite threat hunting and prioritized
observability of vulnerabilities, with the least friction for users and IT and security teams. With
industry-leading sets of endpoint, workload, container and identity telemetry, threat intelligence
and AI-powered analytics, security teams can automatically predict and prevent modern threats in
real time. CrowdStrike’s cloud-native approach is the only solution that empowers security teams to
achieve Zero Trust protection without the combined overhead of managing terabytes of data, threat
feeds, hardware and software, and related ongoing personnel management costs.

The enterprise can start the Zero Trust journey with CrowdStrike Identity Protection solution
and extend the CrowdStrike Zero Trust solution to cover the other most vulnerable areas such
as endpoints or workloads. Falcon sensors can be deployed in minutes to tens of thousands of
endpoints in a day.

Existing CrowdStrike customers can easily continue their Zero Trust journey with the power of the
CrowdStrike Security Cloud, without additional hardware, storage provisioning and personnel costs.

VISUALIZE
CrowdStrike Zero Trust provides granular visibility across endpoints, users and multi-cloud
workloads to help security teams understand what’s happening in hybrid environments and
accurately assess threats and attack paths.
CrowdStrike Solutions

CROWDSTRIKE ZERO TRUST

Discover all endpoints, identities and applications: Discover managed and unmanaged
endpoints and identify systems that could be a risk on the network, such as unprotected
“bring your own device” (BYOD) or third-party systems, with the inventory of all systems in
the network. Discover privileged account activity with complete visibility of the usage and
creation of administrator credentials to identify unusual behavior across on-premises and
cloud environments. Understand application inventory along with unwanted and vulnerable
applications. Identify all applications that are running in your enterprise, along with versions,
hosts and users. Visualize suspicious applications in the network, and pinpoint unprotected or
unmanaged applications that impact security posture.

Get full attack visibility across endpoints, identity stores, workloads and container
environments: Unravel an entire attack happening across endpoints in an intuitive process tree
with complete context enriched with threat intelligence data. Gain multi-directory identity store
visibility to understand the scope and impact of identities and their privileges across Microsoft
Active Directory (AD) and Azure AD. Integrate with single sign-on (SSO) and federation solutions,
such as Active Directory Federation Services (AD FS), PingFederate and Okta to get the big
picture of what users are doing in the organization. Get visibility into cloud workloads and
container environments, identify images, registries and libraries, and understand file access,
network communications and process activity with full visibility into running containers.

Discover and assess multi-cloud workloads: Automatically discover existing cloud workload
deployments with real-time information about workloads including context-rich metadata about
system size and configuration, networking, and security group information for AWS, GCP and
Azure. Understand the security posture by identifying workloads that are not protected by the
Falcon platform. Get complete visibility into the container footprint across on-premises and cloud
deployments.

MITIGATE
Powered by the CrowdStrike Security Cloud, detect and stop threats in real time with automatic
segmentation and high-fidelity threat correlations.

Protect endpoints, identities and workloads from malicious attacks: Protect Windows,
Windows Server, macOS and Linux endpoints from ransomware, malware and fileless attacks by
combining machine learning, artificial intelligence (AI), indicators of attack (IOAs), exploit blocking
and more. Protect hybrid identity stores, assess directory configuration and continuously
analyze every user account across on-premises and cloud identity stores with visibility into live
authentication traffic and encrypted protocol usage (e.g., LDAP/S). Protect cloud workloads and
containers from malware, and investigate and stop malicious behavior early. Prevent attacks on
container-based applications by uncovering hidden threats in open source packages and third-
party images.

Detect and respond to incidents without manual threat correlations: Automatically detect
and prioritize malicious and attacker activity with IOAs. Contain and investigate compromised
systems with powerful response actions through intelligent endpoint detection and response
(EDR). Mitigate identity threats in real time, without using logs and time-consuming analysis.
Detect and prevent reconnaissance (e.g., LDAP, BloodHound, credential compromise attacks),
lateral movement (e.g., RDP, Pass-the-Hash (PtH), Mimikatz tool, interactive service logins), and
persistence (e.g., Golden Tickets, privilege escalation) with advanced analytics and correlation in
the CrowdStrike Security Cloud.
CrowdStrike Solutions

CROWDSTRIKE ZERO TRUST

Automatically segment identities: Automatically classify identities based on roles;


privileges; human, service and shared accounts; and even hybrid (identities that are on on-
premises and cloud AD) or cloud-only identities (identities that reside only on Azure AD or
analogous location). Segment and identify privileged accounts and permissions on Azure AD
deployments, and secure them by detecting misconfigurations linked to tactics, techniques
and procedures (TTPs).

Reduce costs and management overhead: Reduce false positives with high-fidelity
telemetry from endpoints, workloads and identities distributed across the hybrid enterprise.
Powered by petabytes of data at scale, detect new and unusual threats in real time with deep
AI and behavioral analysis from endpoints, identities and workloads, and take the appropriate
action based on policies. Eradicate threats with precision using powerful response actions,
and contain compromised systems to stop attacks before they become breaches. Reduce
SIEM and UEBA costs by sending only those curated/analyzed authentication and incident
logs, instead of gigabytes of data dump that require finding the needles in the haystack
by writing the detection rules. Because authentication, endpoint and workload anomalies
are monitored and detected by the CrowdStrike Security Cloud, there’s no need to write
correlation rules in SIEM and UEBA solutions.

Enrich telemetry with threat intelligence: Identify new campaigns associated with known
threat actors by enriching the telemetry with context about real-world threats. Automatically
identify and investigate nation-state, eCrime and related threats with reduced manual effort.

OPTIMIZE
Provide maximum Zero Trust security coverage across the organization, improve the user
experience and leverage CrowdStrike’s Zero Trust ecosystem partners as you scale up your
Zero Trust journey.

Enhance the user experience with intelligent conditional access: Define and enforce
access policies with simple rules, based on authentication patterns, behavior baselines and
individual risk scores. Ensure consistent login experience for genuine users while enforcing
identity verification when the risk increases.

Extend multifactor authentication (MFA) to improve security posture: Increase ROI and
reduce the attack surface by extending MFA to any resource or application, including those
on-premises legacy/proprietary systems and tools (e.g., PowerShell and protocols such as
RDP over NTLM) that could not be integrated with MFA solutions.

Assess and share endpoint security posture: With real-time security posture assessment
scores, determine endpoint health across the enterprise. Maximize security by identifying
and updating sensor policies and OS settings that are non-compliant and increase risk.
Enforce real-time conditional access to resources from compliant endpoints by sharing the
assessment scores with CrowdStrike Zero Trust ecosystem partners.

Leverage APIs to connect your favorite tools: Integrate third-party and custom security
solutions with the CrowdStrike Security Cloud. Unlock the full potential of frictionless Zero
Trust with CrowdStrike Zero Trust Ecosystem partners. In addition to APIs, CrowdStrike
Zero Trust Assessment (ZTA) provides pre-integrations with the CrowdStrike Zero Trust
ecosystem partners including Zscaler, Okta, Proofpoint and Netskope.
CrowdStrike Solutions

CROWDSTRIKE ZERO TRUST

ENABLE FRICTIONLESS ZERO TRUST


With CrowdStrike, realize frictionless Zero Trust to reduce risks and costs for the enterprise. Eliminate
the overhead of managing terabytes of data, threat feeds, hardware/software and ongoing personnel
investments. Protect your hybrid environments with continuous risk-based verification of user accesses
(including contractors, partners and vendors) from managed and unmanaged endpoints to on-premises,
cloud and legacy applications. By sharing contextual risk-based information from a single source of truth,
enable Zero Trust access for distributed workforce without compromising productivity — regardless of
physical location or network location, or based on whether they were managed or unmanaged (BYOD)
endpoints.

ABOUT CROWDSTRIKE
CrowdStrike Holdings, Inc. (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern
security with one of the world’s most advanced cloud-native platforms for protecting critical areas of
enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real-time
indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across
the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat
hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform enables
customers to benefit from rapid and scalable deployment, superior protection and performance, reduced
complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

Learn more: https://www.crowdstrike.com/


Follow us: Blog | Twitter | LinkedIn | Facebook | Instagram
Start a free trial today: https://www.crowdstrike.com/free-trial-guide/

© 2022 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat
Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and
in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to
identify their products and services.

You might also like