CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center

CrowdStrike expands identity threat detection capabilities for AWS IAM Identity Center to strengthen identity protection across growing AWS environments.

As organizations scale their operations on Amazon Web Services (AWS), they must secure their identities and ensure all users have the correct permissions. AWS IAM Identity Center is built to simplify access management across multiple AWS accounts — a critical tool for rapidly growing AWS environments. This hub for identity data and processes demands strong protection against the identity-focused threats growing popular among today’s adversaries.

Organizations need scalable solutions to secure identities across AWS as well as other identity providers. CrowdStrike is excited to announce expanded identity threat detection capabilities for AWS IAM Identity Center through CrowdStrike Falcon® Identity Protection. 

Unified Identity Security Across AWS and Beyond

Falcon Identity Protection now extends its comprehensive security coverage to include AWS IAM Identity Center, joining its robust protection for on-premises Active Directory and cloud identity providers including Entra ID, Okta and more. This integration provides security teams with unified visibility, monitoring and threat detection across hybrid identity infrastructures.

Key benefits of this integration include:

  • Holistic visibility: Consolidate your view of identities — including AWS IAM Identity Center users — within the CrowdStrike Falcon® platform for streamlined monitoring and compliance from a single place.
  • Proactive threat detection: Track authentication patterns, identify high-risk users and detect suspicious activity before adversaries can exploit them. 
  • Enhanced AWS security posture: Enrich permissions analysis to prevent lateral movement and secure your cloud environment against identity-driven attacks.

By integrating with AWS IAM Identity Center, Falcon Identity Protection helps to mitigate risk and strengthen identity security in an organization’s AWS environment, contributing to a more robust cloud security strategy. 

Solving Modern Identity Challenges in the Cloud

Managing permissions across multiple identity providers is a monumental challenge for the typical enterprise. AWS IAM Identity Center offers a central hub for managing AWS user access, but the visibility gap between cloud and on-premises identity stores can create blind spots. When attackers lurk in these gaps, they can exploit vulnerabilities to escalate privileges, execute lateral movement attacks and exfiltrate valuable data. 

Falcon Identity Protection fills this gap, providing organizations with:

  • Authentication analytics: Monitor user activity to spot anomalies indicating malicious user behavior.
  • Risk scoring: Identify high-risk users based on permission settings, behavioral patterns and historical activity.
  • Simplified compliance: Centralize identity data to streamline auditing processes and support efforts to prepare for standards like ISO 27001 and SOC 2.

For security leaders and practitioners, the call to action is clear: Secure identities before they become a breach vector. With Falcon Identity Protection’s new integration, you can gain unified visibility across hybrid identity environments, including AWS IAM Identity Center; detect and respond to identity-related threats in real time; and strengthen your AWS security posture while simplifying compliance and reducing operational complexity.

How It Works

Falcon Identity Protection’s unified integration experience enables quick time-to-value by consolidating identity and cloud activity data within the Falcon platform, including user authentication events, permissions and behavioral analytics, all presented in a unified interface. 

While all Falcon Identity Protection customers can access these new innovations, we should note that current CrowdStrike Falcon® Cloud Security customers can integrate with AWS IAM Identity Center using the same cloud connector and account registration process they used for the CrowdStrike Falcon Cloud Security module. 

The following steps outline how this integration works to help organizations strengthen their AWS IAM Identity Center security posture:

  1. Accelerate time-to-value: Configure the AWS IAM Identity Center integration to gain instant unified visibility of the entire scope of the identity infrastructure — including those in cloud environments — with the Falcon platform.

Figure 1. Easily enable this integration in the Falcon console with a guided step-by-step workflow, and get instant visibility into your AWS IAM Identity Center environment. Figure 1. Easily enable this integration in the Falcon console with a guided step-by-step workflow, and get instant visibility into your AWS IAM Identity Center environment.
  1. Assess and identify risks: Falcon Identity Protection analyzes the AWS IAM Identity Center environment and provides data correlation against other configured directories, automatically flagging potential risks such as stale accounts, lateral movement and unusual access patterns.

  2. Gain Insights: Falcon Identity Protection brings data from many commonly used directories into the Falcon platform, enabling visibility at scale. Users can explore detailed analytics on user behaviors, automatically establish a baseline for normal user activity, identify anomalous access patterns and more.

Figure 2. Gain visibility into anomalous location access for AWS and Entra logins Figure 2. Gain visibility into anomalous location access for AWS and Entra logins
  1. Leverage advanced threat intelligence: Falcon Identity Protection harnesses the power of machine learning to automatically detect and alert on suspicious web behaviors associated with AWS IAM Identity Center users.
Figure 3. Suspicious web-based detection triggers on the user’s unusual location when accessing AWS. Figure 3. Suspicious web-based detection triggers on the user’s unusual location when accessing AWS.
  1. Respond swiftly: Falcon Identity Protection empowers teams to take immediate action on potential threats, or automate responses with Falcon Fusion SOAR workflows for rapid threat mitigation. These steps might include revoking user sessions or initiating other security measures that stop adversaries.

Watch the Video:

A Unified Defense for Identity-Driven Security

Identity is the new perimeter, and securing that perimeter requires a unified approach across all identity providers. With  Falcon Identity Protection, CrowdStrike’s identity threat detection and response (ITDR) solution, organizations can better protect their cloud environments against identity-related threats, streamline compliance efforts and fortify their defenses against lateral movement attacks. Falcon Identity Protection creates a critical line of defense for your identity ecosystem — on-premises, in the cloud and beyond.

Additional Resources

Breaches Stop Here