Skip to content
Threat Feed
medium advisory

CrowdStrike Falcon Flex for Services Expansion

CrowdStrike is expanding the Falcon Flex model to its services offering to provide organizations with more flexible access to incident response and proactive security services.

CrowdStrike is extending the Falcon Flex model, previously focused on platform consumption, to its expert-led cybersecurity services. Announced in March 2026, this expansion provides organizations with a more adaptable way to consume services like incident response, proactive security assessments, advisory, platform services, and training. The new “Zero Dollar Flex Fund” offers qualifying new customers 200 hours of CrowdStrike Services at no initiation cost, including 160 hours of incident response and 40 hours of proactive services, valid for a 12-month agreement. The goal is to reduce procurement friction, align service consumption with actual security needs, and provide faster access to expert support during incidents. This initiative caters to organizations seeking expert assistance without a broader platform commitment or those needing flexible support during evolving threat landscapes.

Attack Chain

This brief describes a service offering designed to improve incident response. Therefore, the following attack chain describes the response to an attack, not the attack itself.

  1. Initial Compromise: An organization experiences a security incident (e.g., malware infection, data breach) through unspecified means.
  2. Detection & Triage: Internal security teams identify the incident and determine the need for external incident response support.
  3. Service Engagement: The organization engages CrowdStrike through the Falcon Flex for Services program. This step bypasses traditional procurement delays.
  4. Incident Assessment: CrowdStrike incident responders conduct an initial assessment to understand the scope and impact of the incident. This includes analyzing logs, network traffic, and endpoint data.
  5. Containment & Eradication: Based on the assessment, responders implement containment measures to prevent further damage and eradicate the threat from the environment. This may involve isolating affected systems, removing malicious software, and patching vulnerabilities.
  6. Recovery: Systems are restored to a secure state, and business operations resume. This phase involves validating the effectiveness of remediation efforts and implementing preventative measures to avoid recurrence.
  7. Post-Incident Analysis: CrowdStrike provides a detailed report outlining the incident’s root cause, the attacker’s tactics, techniques, and procedures (TTPs), and recommendations for improving security posture.
  8. Proactive Hardening: Leveraging the findings from the incident response, the organization utilizes the 40 hours of proactive services to assess readiness, improve defenses, and strengthen operational preparedness, further enhancing the security posture and minimizing future risks.

Impact

The Falcon Flex for Services model aims to reduce the impact of security incidents by providing organizations with rapid access to expert incident response and proactive security services. Successful engagement leads to faster incident containment, reduced downtime, and improved security posture. The Zero Dollar Flex Fund lowers the barrier to entry for new customers, enabling them to benefit from CrowdStrike’s expertise without upfront costs. This can be especially beneficial for smaller organizations or those with limited security resources.

Recommendation

  • Evaluate the Falcon Flex for Services program to determine its suitability for your organization’s incident response needs (refer to the “CrowdStrike Flex for Services Expands Access to Elite Security Expertise” blog post).
  • For first-time CrowdStrike services customers, explore eligibility for the Zero Dollar Flex Fund to gain access to initial incident response and proactive services hours.
  • Review CrowdStrike’s offerings for incident response, proactive security services, advisory, platform services, and training to understand the full range of available expertise.

Detection coverage 2

Detect Potential Initial Access via Unsolicited Network Connection

medium

Detects a process initiating an outbound network connection that is not typically associated with network activity. This could indicate unauthorized access.

sigma tactics: initial_access techniques: T1566 sources: network_connection, windows

Detect Execution of Suspicious Process in Temp Directory

high

Detects execution of a process in a temp directory. This is often indicative of malware or malicious activity.

sigma tactics: execution techniques: T1059 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →