Set up the CrowdStrike Workload Protection connector
CrowdStrike Workload Protection is a cloud-native security solution designed to protect workloads across hybrid and multi-cloud environments. It helps organizations prevent breaches by offering runtime protection, vulnerability management, and compliance enforcement.
By integrating CrowdStrike Workload Protection, VRM leverages its insights to recommend the best next actions for security teams, ensuring seamless alignment with their broader tool stack and promoting a unified, strategic approach to security management.
Create API client
Set up a CrowdStrike API client for secure access to the CrowdStrike API.
Prerequisites:
Ensure you have access to CrowdStrike Falcon with sufficient permissions to create an API client.
To complete this task:
- Log in to the CrowdStrike Falcon platform.
- From the top-left menu, select Support and Resources > Resources and tools > API Clients and Keys.
- From the left navigation menu, select Settings > API Keys.
- Select Create API Client.
- Enter a name and description for the client.
- Select the Read permission for the Falcon Container Image scope.
- Select Create.
- Copy the API Client ID, API Client Secret, and Base URL to a secure location.
Create a VRM connector
- In VRM, from the left navigation menu, select the Settings icon
.
- Select Add Connector.
- Select the CrowdStrike Workload Protection tile.
- Enter a name for the connector.
- Enter the Client ID and Client Secret you generated in Falcon.
- For Endpoint URL, enter the Base URL of the instance you copied in Falcon.
- Select Add Connector.
Validate your data
After successfully connecting the CrowdStrike Workload Protection connector within VRM, it will take some time for VRM to fetch the asset data.
After the connector has completed the fetch, validate that VRM correctly ingested the data.
- In VRM, select Findings
from the left navigation menu.
- Select the Finding Source filter and select CrowdStrike Workload Protection.
The Findings table displays the CrowdStrike Workload Protection vulnerability findings.