Netskope Cloud Risk Exchange and CrowdStrike ZTA

  • 21 November 2022
  • 0 replies
  • 71 views

Userlevel 3
Badge +15

Overview

Cloud Exchange CRE’s integration with CrowdStrike gives you the ability to change a device’s status from Managed to Unmanaged (or vice versa) based off of the CrowdStrike Zero Trust Assessment (ZTA) score. This is helpful to give devices real time policy changes to protect your network when a device is seen as risky from the CrowdStrike sensor running on the device.

 

Requirements

  • CloudExchange 4.2 or newer
  • Basic Cloud Exchange setup (Netskope tenant API v1 and v2 setup)
  • Netskope plug - Netskope CRE
  • CrowdStrike CRE plugin version 1.1.0 or greater
  • CrowdStrike agent

Setup Steps

CrowdStrike

  1. Deploy CrowdStrike Falcon Sensors to your end devices
  2. Setup API clients and keys

 

Netskope Cloud Exchange

  1. Setup Netskope Plugins
    1. Netskope CRE Plugin
    2. CrowdStrike CRE v1.1.0 or greater
  2. Create Business Rules
  3. Create Action

Netskope Policy

  1. Create Device Classification Rule

Verify

CrowdStrike Setup Steps

Deploy CrowdStrike Falcon Sensors to your end devices

Please follow the instructions in the CrowdStrike documentation. Basically you just need to grab your Customer ID and download the appropriate OS version of the installer. During the setup of the installer, you will be asked for your Customer ID.

https://falcon.crowdstrike.com/documentation

 

 

 

Setup API clients and keys

In your CrowdStrike portal go to Support and resources > API clients and keys

 

 

Note down your Base URL and then select Add new API Client

 

 

Give your API client a name and select the following Read API scopes

 

Scopes- Read

Alerts

Detections

Device control policies

Host

Host groups

Incidents

IOC Manage APIs

IOC (Indicators of Compromise)

User management

Zero Trust Assessment

 

Scopers Read - Write

Real time response

 

Netskope Cloud Exchange setup steps

Cloud Exchange Plugins

On your Netskope Cloud Exchange go to Settings > Plugins

You will need two plugins configured for this solution. The Netskope CRE plugin and the CrowdStrike v1.1.0 CRE plugin. If you need to update your plugins go to the Plugin Repository tab and select ‘check for updates’.

 

 

 

Configure Netskope CRE plugin

Select Netskope CRE

Name our plugin and select your Tenant

 

 

Since we will be making a call to the Netskope tenant about users, we will need a SCIM token setup on your tenant.

 

On your Netskope Tenant go to Settings > Tools > Directory Tools > SCIM integration.

Copy your SCIM Server URL

Create a New Oauth Token and copy the token.

 

 

 

Back on Cloud Exchange, paste the SCIM URL and Key into your plugin.

 

 

Configure CrowdStrike CRE plugin

From the plugin page select CrowdStrike CRE v1.1.0 or greater.

 

Give it a Configuration Name

 

Fill in the information you obtained while configuring the above step on the CrowdStrike API Client.

 

 

 

You can adjust the ranges for what the different risk scores are. Leave this default. You can see device risk scores under Plugin Activity.

Save your plugin.

 

 

Create a Cloud Exchange Business Rule

On your Cloud Exchange go to Risk Exchange > Business Rules and Create New Rule

 

 

A basic rule can be that anytime a user/device’s score reaches an aggregated high risk to map to ‘CrowdStrike High Score’

 

 

Create an Action

In this example the action will be used to trigger the CrowdStrike Real Time Response (RTR) script for any user that has a high score.

Business Rule: select the business rule you just created

Configuration: select your CrowdStrike plugin

Actions: Put RTR Script

 

 

Netskope Policy Setup Steps

Device Classification Rule

In your Netskope Tenant go to Settings > Manage > Device Classification > New Device Classification Rule

When matched with the score from the CrowdStrike client the device will be marked as Managed and policy will be applied.

 

Give your policy a rule name and select file. In the box put the following available values.

See note below on what these scores equal.

 

"c:crwd_zta_1_25",

"c:crwd_zta_26_50",

"c:crwd_zta_51_75",

"c:crwd_zta_76_100"

 

 

 

Note on scores

Netskope uses scores from 0 to 1000 as shown in the below table. These scores map to CrowdStrike’s user scores but are different by one decimal place. When creating the device classification rule using my example of c:crwd_zta_76_100.txt. I am that any user that is considered as a low risk user should be placed in the managed device category.

 

 

 

Verify

In Cloud Exchange go to Risk Exchange > Plugin Activity. You will see the feed coming in from CrowdStrike of your deployed sensors. I went into CrowdStrike and found my test device by the sensor id. To test I change my Action Rule to match the score of my test device and have it move the user based off of the score I already have. This is easier than doing bad things on your devices and changing the score.

 

Here is a closer view of Cloud Exchange. The Configuration column is the name of the plugin that the information came from.

 

 

To view which devices have triggered the RTR script to fire go to Action Logs

 

 

On the client you will see the text file get placed on the c: drive and your client will be marked as managed if it matches the Netskope Device Classification Rule, and Unmanaged if it doesn’t match the rule.

 

 

 


0 replies

Be the first to reply!

Reply