Skip to content
Threat Feed
low advisory

CrowdStrike Falcon Flex for Services Expansion

CrowdStrike is expanding its Falcon Flex model to include its services, offering flexible consumption of expert-led cybersecurity services including incident response and proactive security measures.

CrowdStrike has extended its Falcon Flex model to its services offering, allowing organizations to consume cybersecurity services with greater flexibility. This model enables organizations to draw down from a standalone services entitlement, applying it across CrowdStrike’s services portfolio based on their specific priorities and operational needs. The Falcon Flex for Services covers incident response, proactive security services, advisory, platform services, and training. Additionally, CrowdStrike is introducing the Zero Dollar Flex Fund, providing qualifying new services customers with access to 200 hours of CrowdStrike Services at no initiation cost, including 160 hours of incident response and 40 hours of proactive services. This initiative aims to lower the barrier for organizations to engage with CrowdStrike’s expertise, especially those seeking expert support before committing to a broader platform. The key benefit is a more adaptable way to consume CrowdStrike expertise over time, without requiring a new procurement cycle for every shift in priorities.

Attack Chain

This brief describes a service offering that enables rapid incident response, rather than a specific attack chain. Therefore, the typical attack chain steps do not apply. However, the service is designed to improve resilience against attacks, which can be described as follows:

  1. Initial Access: An attacker gains initial access to the target environment through various means such as phishing, vulnerability exploitation, or stolen credentials (not directly mentioned in the source).
  2. Lateral Movement: The attacker attempts to move laterally within the network, escalating privileges to gain control over critical systems (not directly mentioned in the source).
  3. Data Exfiltration: The attacker identifies and exfiltrates sensitive data from the compromised systems (not directly mentioned in the source).
  4. Impact: The attacker deploys ransomware or causes other damage to disrupt business operations (not directly mentioned in the source).
  5. Detection: The organization detects the intrusion, potentially through existing security tools or alerts (not directly mentioned in the source).
  6. Activation of CrowdStrike Services: The organization leverages CrowdStrike Flex for Services to engage incident response experts.
  7. Incident Response: CrowdStrike experts rapidly assess the scope of the breach, contain the attacker’s activities, and begin remediation efforts.
  8. Remediation and Recovery: CrowdStrike assists in recovering compromised systems, patching vulnerabilities, and implementing security enhancements to prevent future incidents.

Impact

The successful utilization of CrowdStrike Flex for Services can significantly reduce the impact of a cyberattack by enabling rapid incident response and minimizing downtime. Organizations can pre-arrange incident response coverage, providing access to elite expertise and a more adaptable approach to consuming cybersecurity services over time. The Zero Dollar Flex Fund provides a direct path to CrowdStrike expertise for first-time services customers, offering a standalone 12-month agreement with flexibility in applying proactive services to readiness and consulting priorities. This results in improved preparedness, faster containment of threats, and more effective recovery from incidents, minimizing potential financial losses, reputational damage, and operational disruptions.

Recommendation

  • Evaluate the CrowdStrike Falcon Flex for Services model to determine its suitability for your organization’s incident response and cybersecurity service needs (Reference: CrowdStrike Flex for Services).
  • For qualifying new services customers, explore the Zero Dollar Flex Fund to gain initial access to CrowdStrike Services for incident response and proactive security measures (Reference: Zero Dollar Flex Fund).
  • Integrate CrowdStrike’s incident response capabilities with existing security tools and processes to streamline incident handling and improve overall security posture (Reference: CrowdStrike Services).

Detection coverage 3

CrowdStrike Services Engagement - Process Creation

info

Detects process creation events that may be related to CrowdStrike services engagements based on specific process names often used during incident response or other service activities.

sigma sources: process_creation, windows

CrowdStrike Services Engagement - Network Connection

info

Detects network connections that may be related to CrowdStrike services engagements based on connections to known CrowdStrike infrastructure or commonly used tools.

sigma sources: network_connection, windows

CrowdStrike Services Engagement - File Download

info

Detects file downloads that may be related to CrowdStrike services engagements, focusing on commonly used tools for incident response and analysis.

sigma sources: file_event, windows

Detection queries are kept inside the platform. Get full rules →