Together, these innovations provide a unified, proactive approach to protecting cloud environments and provide the full context needed to stay ahead of emerging threats.
CrowdStrike brings AWS AI efficiencies
AWS GenAI Competency: CrowdStrike has achieved AWS Geneative AI Competency, distinguishing us as a leader in developing generative AI solutions that drive innovation and efficiency. This competency reflects CrowdStrike's expertise in leveraging AWS's generative AI tools to build, train, deploy, and scale core AI models to elevate the security analyst experience.
AWS Security Competency — AI Security: CrowdStrike achieved AWS Security Competency in the AI ​​Data Security category, highlighting our expertise in protecting AI workloads across security-critical environments. This competency recognizes CrowdStrike's advanced capabilities in ensuring AI data privacy, maintaining AI model integrity and availability, preventing misuse of generative AI, and detecting and mitigating AI threats.
New CrowdStrike and AWS integration secures code before deployment
EKS support built into AWS
Businesses scaling on AWS need security that runs at the speed of the cloud. CrowdStrike uses AWS's built-in multi-account integration to automate deployment and use of event-driven cloud architecture. Today, we're excited to announce that we've expanded support to Amazon EKS, enabling automatic deployment of the Falcon Cloud Security runtime and cluster protection on EKS clusters.
Managing EKS security across multiple accounts and regions typically requires separate deployment efforts, reducing agility and time to value. The integrated CrowdStrike solution simplifies deployments with a single, configurable CloudFormation template, simplifying security management and unifying the customer experience by eliminating the complexities of combining separate software and data sources.
AWS IAM Identity Center
We're expanding the security coverage of CrowdStrike Falcon® Identity Protection to include AWS IAM Identity Center, extending existing protections for on-premises Active Directory and cloud identity providers like Entra ID, Ping, and Okta. This integration provides organizations with unified visibility and protection across identity providers, including AWS IAM Identity Center users, enabling security teams to efficiently track permissions, monitor authentication patterns, identify high-risk users, and integrate identity data within the CrowdStrike Falcon® platform for compliance Simplified and auditable. Read more in this blog post: CrowdStrike Falcon Identity Protection for AWS IAM Identity Center strengthens AWS' security posture.
As identity threats grow in scale and complexity, Falcon Identity Protection enables companies to proactively detect and respond to potential risks, secure permissions and prevent lateral movement attacks to strengthen their security posture in AWS.
Enhance cloud detection and response across AWS
In response to the increasing agility of adversaries, CrowdStrike has introduced innovations to help organizations detect and respond faster in the cloud. Organizations need robust capabilities to detect, investigate, and respond to active threats while proactively eliminating potential vulnerabilities and attack paths.
Speed ​​up investigations with full visibility
This race against the adversary begins with a complete view of potential attack paths, including visibility from endpoint to cloud to identity. Adversaries can exploit vulnerabilities in assets along the attack path to move deeper into the target environment and achieve their objectives.
Our attack path analysis supports a range of AWS resources. We continue to increase the number of cloud and identity resources we support for AWS, in addition to GCP and Azure, to provide complete visibility. New resources include AWS IAM user, AWS DynamoDB, AWS RDS instance, Azure AD user, Azure Disk, Azure Storage account, GCP IAM role, and GCP Cloud Storage.
Automatically collecting an adversary's full path enables security teams to investigate and respond more quickly, strengthening the security posture and better protecting critical assets.