Container and Kubernetes Security

CrowdStrike Cloud Security delivers containers, Kubernetes, and hosts from build to runtime in AWS, Azure, and Google Cloud.

CrowdStrike is recognized by Frost & Sullivan as a leader in the 2022 Frost Radar™️: Cloud-Native Application Protection Platform, 2022 report. CrowdStrike was also named a Winner in the 2022 CRN Tech Innovator Awards for the Best Cloud Security category. Both accolades underscore CrowdStrike's growth and innovation in the CNAPP market. Learn more.

Frost and Sullivan CNAPP Banner

Benefits

Identify vulnerabilities from development to production for any cloud

Protect cloud-native applications and reduce the attack surface by detecting vulnerabilities, hidden malware, secrets/keys, compliance violations and more — from build to runtime — ensuring only compliant containers run in production.

“Shift-left” security Into the CI/CD pipeline and automate DevSecOps

Integrate frictionless security early into the continuous integration/continuous delivery (CI/CD) pipeline, and automate protection that empowers DevSecOps to deliver production-ready applications without impacting build cycles.

Protect against attacks when containers are the most vulnerable — at runtime

Build and run applications knowing they are protected. Get access to automated discovery, runtime protection, continuous threat detection and response for cloud workloads and containers, and managed cloud threat hunting in a single platform.

Features

Why CrowdStrike Container Security

Vulnerability scanning and management

  • Improve decision making: Gather insights and details about your container — images, registries, libraries and containers spun from those images.
  • Uncover hidden threats: Find hidden malware, embedded secrets, configuration issues and more in your images to help reduce the attack surface.
  • Gain visibility into container environments: Get full visibility into running containers to uncover details surrounding file access, network communications and process activity.
  • Identify vulnerabilities faster: Save valuable time with pre-built image scanning policies enabling you to quickly catch vulnerabilities, misconfigurations and more.
  • Eliminate threats prior to production: Block exploitable vulnerabilities before runtime, eliminating headaches for security teams.
  • Continuously monitor: Identify new -detections at runtime, and alert and take action without having to rescan images.
Vulnerability scanning mgmt

Automated CI/CD pipeline security

  • Accelerate delivery: Create verified image policies ensuring only approved images are allowed to progress through your pipeline and run on your hosts or Kubernetes clusters.
  • Identify threats earlier: Continuously scan container images for known vulnerabilities, configuration issues, secrets/keys and OSS licensing issues.
  • Assess the vulnerability posture of your pipeline: Uncover hidden malware present in the downloaded base images before containers are deployed.
  • Improve security operations: Streamline visibility for security operations by providing insights and context for misconfigurations and compliance violations.
  • Integrate with developer toolchains: Seamlessly integrate with Jenkins, Bamboo, GitLab and more, to remediate and respond faster within existing DevOps toolchains.
  • Enable DevSecOps: Reporting and dashboards drive alignment and a shared understanding across security operations, DevOps and infrastructure teams.
Automoated cicd pipeline security

Runtime protection

  • Secure hosts and containers: CrowdStrike Falcon® runtime protection defends containers and Kubernetes against active attacks.
  • Gain broad container support: Falcon supports containers running on Linux and is deployable across Kubernetes environments such as EKS. It also supports container as a service (CaaS) such as Fargate, providing the same level of protection. Technology previews are available for AKS, GKE and Red Hat OpenShift.
  • Leverage market-leading protection technologies: Machine learning (ML), artificial intelligence (AI), IOAs and custom hash blocking automatically defend against malware and sophisticated threats targeting containers.
  • ML and AI: Falcon leverages ML and AI to detect known and unknown malware within containers without requiring scanning or signatures.
  • IOAs: Falcon uses IOAs to identify threats based on behavior. Understanding the sequences of behavior allows Falcon to stop attacks that go beyond malware, including fileless attacks.
  • Stop malicious behavior: Behavioral profiling enables you to block activities that violate policy, with zero impact to legitimate container operation.
  • Detect rogue containers: Maintain an up-to-date inventory as containers are deployed and decommissioned, detect and scan rogue images, and identify and stop containers launched as privileged or writable.
  • Container drift prevention: Enforce container immutability by detecting new binaries created and executed inside containers.
  • Investigate container incidents faster: Easily investigate incidents when detections are associated with the specific container and not bundled with the host events.
  • See everything: Capture container start, stop, image and runtime information, and all events generated inside the container, even if it only runs for a few seconds.
  • Deploy seamlessly with Kubernetes: Deploy easily at scale by including it as part of a Kubernetes cluster.
  • Improve container orchestration: Capture Kubernetes namespace, pod metadata, process, file and network events.
Runtime protection b

Incident response and forensics for workloads and containers

  • Real-time visibility: Stream container information and activity to the Falcon platform in real time for in-depth insight, enabling security teams to uncover hidden threats, hunt and investigate.
  • Powerful search: Filter events inside containers from the worker node and search based on container metadata such as images, mode, configuration type and more.
  • Proactive threat hunting: Once deployed, Falcon records container details and activity, enabling proactive threat hunting where security teams can hunt, get query results in seconds and easily pivot from one clue to the next.
  • Continuous availability: Event details provide forensic evidence and a full set of enriched data, even for ephemeral containers after they have been decommissioned.
  • Ability to unravel entire attacks on one screen: An easy-to-read process tree provides full attack details in context for faster and easier investigations.
Incident response forensics

Simplicity and performance

  • Simplify DevSecOps adoption: Reduce the overhead, friction and complexity associated with protecting cloud workloads, containers, and serverless environments.
  • Single-pane of glass: One console provides central visibility over cloud security posture, workloads and containers regardless of their location.
  • Complete policy flexibility: Apply at individual workload, container, group or higher level and unify policies across both on-premises and multi-cloud deployments.
  • Scale at will: No rearchitecting or additional infrastructure required.
  • Gain broad platform support: The Falcon platform supports Open Container Initiative (OCI)-based containers such as Docker and Kubernetes and also self-managed and hosted orchestration platforms such as GKE (Google Kubernetes Engine), EKS (Amazon Elastic Kubernetes Service), ECS (Amazon Elastic Container Service), AKS (Azure Kubernetes Service), and OpenShift.
instances by cloud provider

Cloud integrations

Optimize your investments and get started faster

Cloud workload protection

Click the links below to visit our Cloud-AWS Github pages

Clarity in cloud blog image

DevOps & cloud-native

Click the links below to visit our Cloud-AWS Github pages

OW hone

Falcon Cloud Security Solutions

Cloud Workload Protection

Provides comprehensive breach protection across private, public, hybrid and multi-cloud environments, allowing customers to rapidly adopt and secure technology across any workload.

Cloud Security Posture Management

Provides multi-cloud visibility, continuous monitoring and threat detection, and ensures compliance enabling DevOps to deploy applications with greater speed and efficiency – cloud security posture management made simple.

Cloud Security Assessment

Test and evaluate your cloud infrastructure to determine if the appropriate levels of security and governance have been implemented to counter inherent security challenges.

Customers trust CrowdStrike

Expensify logo
Full logo
Verizon logo


 

Read CrowdStrike Cloud Security reviews on G2

Tested and proven leader

CrowdStrike is proud to be recognized as a leader by industry analyst and independent testing organizations.

CRN logo

Learn more how CrowdStrike won the 2022 CRN Tech Innovator Award for Best Cloud Security.

Frost and Sullivan logo

Learn why Frost & Sullivan ranked CrowdStrike as a leader in Cloud-Native Application Security Platform (CNAPP).


Forrester logo

CrowdStrike received the highest possible score in the scalability and in the execution roadmap, and among the second highest in the partner ecosystems securing workloads criterion in the 2022 Forrester Wave™ for Cloud Workload Security.