HomeGuidesChangelog
Guides

CrowdStrike Integration

The RegScale CLI integrates with CrowdStrike Falcon to synchronize alerts, vulnerabilities, assets, compliance posture, and evidence into RegScale.

Prerequisites

  • RegScale CLI installed and configured (regscale init)
  • A CrowdStrike Falcon tenant with API access
  • A CrowdStrike API client with the required scopes (see below)

CrowdStrike API Client Setup

Create an API client in the CrowdStrike Falcon console under Support and resources > API clients and keys.

Required API Scopes

Add the following scopes based on the commands you plan to use:

ScopeRequired For
alerts:readsync_incidents, query_incidents, collect_evidence
alerts:writeAlert tagging and assignment (optional)
hosts:readsync_assets, collect_evidence
spotlight-vulnerabilities:readsync_vulnerabilities
prevention-policies:readsync_policies, collect_evidence
host-group:readsync_policies (resolving assigned host groups)
user-management:readIncident assignment lookups (optional)
intel:readThreat intelligence (optional)

Minimum scopes for full integration: alerts:read, hosts:read, spotlight-vulnerabilities:read, prevention-policies:read, host-group:read

Note: As of March 2026, CrowdStrike has deprecated the Incidents API (/incidents/) in favor of the Alerts API (/alerts/). RegScale CLI v6.32+ uses the Alerts API. Ensure your API client has alerts:read rather than the legacy incidents:read scope.

Configuration

Add the following to your init.yaml:

crowdstrikeBaseUrl: "https://api.crowdstrike.com"
crowdstrikeClientId: "your-client-id"
crowdstrikeClientSecret: "your-client-secret"

Base URL values by cloud:

CrowdStrike CloudBase URL
US-1https://api.crowdstrike.com
US-2https://api.us-2.crowdstrike.com
EU-1https://api.eu-1.crowdstrike.com
US-GOV-1https://api.laggar.gcw.crowdstrike.com

Commands

Sync Incidents

Syncs alerts from CrowdStrike into RegScale as incidents, along with associated device assets and MITRE ATT&CK properties (tactics, techniques).

regscale crowdstrike sync_incidents --id <REGSCALE_ID> --module <MODULE>
OptionRequiredDescription
--id, -iYesRegScale parent record ID
--module, -mYesRegScale parent module (e.g., securityplans)
--dry_runNoReturn item counts without syncing
--offsetNoSkip this many items from the start
--limitNoProcess at most this many items

Example:

regscale crowdstrike sync_incidents --id 6 --module securityplans

Scopes required: alerts:read


Query Incidents

Query alerts from CrowdStrike using Falcon Query Language (FQL) filters and create RegScale incidents from the results.

regscale crowdstrike query_incidents --id <REGSCALE_ID> --module <MODULE>
OptionRequiredDescription
--id, -iYesRegScale parent record ID
--module, -mYesRegScale parent module
--filterNoFQL filter string (e.g., status:'new')

Example:

regscale crowdstrike query_incidents --id 6 --module securityplans --filter "status:'new'"

Scopes required: alerts:read


Sync Vulnerabilities

Syncs vulnerabilities from CrowdStrike Spotlight into RegScale as issues. Uses the Spotlight combined endpoint for efficient retrieval with pagination.

regscale crowdstrike sync_vulnerabilities --id <REGSCALE_ID>
OptionRequiredDescription
--id, -iYesRegScale security plan ID
--dry_runNoReturn item counts without syncing
--offsetNoSkip this many items from the start
--limitNoProcess at most this many items

Example:

regscale crowdstrike sync_vulnerabilities --id 6

Scopes required: spotlight-vulnerabilities:read


Sync Assets

Syncs hosts and devices from CrowdStrike Falcon into RegScale as assets. Captures device details including hostname, OS, IP addresses, sensor version, and serial number.

regscale crowdstrike sync_assets --id <REGSCALE_ID>
OptionRequiredDescription
--id, -iYesRegScale security plan ID
--dry_runNoReturn item counts without syncing
--offsetNoSkip this many items from the start
--limitNoProcess at most this many items

Example:

regscale crowdstrike sync_assets --id 6

Scopes required: hosts:read


Sync Compliance

Maps CrowdStrike compliance data against the control implementations on a RegScale security plan. Auto-detects the compliance framework or accepts a manual override.

regscale crowdstrike sync_compliance --id <REGSCALE_ID>
OptionRequiredDescription
--id, -iYesRegScale security plan ID
--frameworkNoFramework override: NIST, CSF, SOC2, CMMC, ISO, CIS, OWASP. Auto-detected if omitted.

Supported frameworks:

  • NIST 800-53 — Direct mapping from CrowdStrike compliance data
  • CSF (NIST Cybersecurity Framework) — Direct mapping
  • SOC2 — Cross-walked from NIST mapping
  • CMMC — Cross-walked from NIST mapping
  • ISO 27001 — Cross-walked from NIST mapping
  • CIS Controls — Cross-walked from NIST mapping
  • OWASP — Cross-walked from NIST mapping

Ensure a security profile has been applied to the security plan before running.

Example:

# Auto-detect framework from existing control implementations
regscale crowdstrike sync_compliance --id 6

# Explicitly specify framework
regscale crowdstrike sync_compliance --id 6 --framework SOC2

Sync Policies

Fetches all prevention policies (server, workstation, general) from CrowdStrike, generates an auditor-friendly HTML report, and creates an Evidence record in RegScale linked to the specified security plan.

regscale crowdstrike sync_policies --id <REGSCALE_ID>
OptionRequiredDescription
--id, -iYesRegScale security plan ID

Example:

regscale crowdstrike sync_policies --id 6

Scopes required: prevention-policies:read, host-group:read


Collect Evidence

Collects a comprehensive CrowdStrike evidence package for audit purposes. Generates three evidence records attached to the security plan:

  1. Host inventory summary — Count by OS, status, and sensor version
  2. Prevention policy configurations — Policy settings with assigned host groups
  3. Recent alerts/detections — Alert details with timestamps

Designed for SOC2 CC.6.8.1 (antivirus configurations) and similar audit evidence requests.

regscale crowdstrike collect_evidence --id <REGSCALE_ID>
OptionRequiredDescription
--id, -iYesRegScale security plan ID
--alert_days, -dNoNumber of days to look back for alerts (default: 30)
--alert_limit, -lNoMaximum number of alerts to include (default: 10)

Example:

# Default: last 30 days, up to 10 alerts
regscale crowdstrike collect_evidence --id 6

# Custom: last 90 days, up to 50 alerts
regscale crowdstrike collect_evidence --id 6 --alert_days 90 --alert_limit 50

Scopes required: alerts:read, hosts:read, prevention-policies:read, host-group:read

Troubleshooting

404 errors on API calls

If you receive 404 errors, verify your API client has the correct scopes enabled in the CrowdStrike console. A missing scope will return 404, not 403.

Authentication failures

Verify crowdstrikeBaseUrl, crowdstrikeClientId, and crowdstrikeClientSecret in your init.yaml. Ensure the base URL matches your CrowdStrike cloud region.

No data returned

  • sync_incidents: Ensure alerts:read scope is enabled (not the legacy incidents:read)
  • sync_vulnerabilities: Ensure spotlight-vulnerabilities:read scope is enabled and Spotlight is licensed on your tenant
  • sync_assets: Ensure hosts:read scope is enabled