CrowdStrike Falcon Cloud Security Adds Detections for AWS IAM Identity Center

Falcon Cloud Security now includes detection for Amazon Web Services (AWS) IAM Identity Center.

CrowdStrike Falcon® Cloud Security now delivers real-time detections for AWS IAM Identity Center, helping organizations detect and respond to identity-driven cloud threats before they escalate.

A few months ago, we released CrowdStrike Falcon® Identity Protection support for AWS IAM Identity Center to help organizations detect and stop identity-based attacks before they could reach the cloud control plane. Now, we’re expanding that protection by bringing select identity threat detections directly into Falcon Cloud Security. This gives customers the ability to stop cross-domain attacks earlier — without requiring an additional investment.

Adversaries no longer operate in silos, and neither should defenders. Modern cross-domain attacks may start with stolen identities and end with full cloud control plane compromise. Threat actors like SCATTERED SPIDER use valid credentials to bypass traditional defenses, escalate privileges, and seize control of critical cloud resources. The evidence is in our data: The CrowdStrike 2025 Global Threat Report found 35% of cloud incidents in the first half of 2024 stemmed from valid account abuse. Meanwhile, the market for stolen access is thriving, as evidenced by a 50% year-over-year increase in access broker advertisements.

To stay ahead, organizations need a unified security approach across identity, endpoints, and cloud workloads. Read on to learn how we’re helping them break down silos with the CrowdStrike Falcon® cybersecurity platform.

Bringing Identity Threat Detection to Falcon Cloud Security

With this release, Falcon Cloud Security customers gain built-in detection capabilities for AWS IAM Identity Center, allowing them to spot and respond to suspicious authentication activity in real time. These detections help identify key identity-based threats, including:

  • Access from unusual location: Detects logins from unexpected locations, a common indicator of compromised credentials
  • Access from multiple locations concurrently: Flags attempts to use the same account from different regions simultaneously
  • Access from an IP with a bad reputation: Identifies logins originating from known malicious or high-risk IPs
  • Suspicious web-based activity: Highlights unusual authentication behaviors that may indicate an account takeover or an adversary-in-the-middle attack
  • Use of a stale user account: Alerts to access attempts from inactive or previously unused accounts, which adversaries often exploit
Figure 1. Drill-down view of an AWS IAM Identity Center detection that was triggered in the Falcon console. Figure 1. Drill-down view of an AWS IAM Identity Center detection that was triggered in the Falcon console.
By harnessing these detections, security teams can take informed response actions when identity-based threats emerge. When a detection is triggered, security teams can investigate the event directly within CrowdStrike Falcon® Next-Gen SIEM. This provides an opportunity to understand the context and take appropriate action. Alternatively, the security responder may choose to build a CrowdStrike Falcon® Fusion SOAR workflow that will automatically trigger actions based on these newly discovered detections. As an example, when an identity detection is triggered, an organization can automatically isolate the involved entities, alerting security teams or initiating a deeper forensic investigation. For those who need real-time response capabilities, such as blocking suspicious authentication attempts before they succeed, a CrowdStrike Falcon® Identity Protection subscription provides deeper integration and proactive identity security controls.
Figure 2. Detailed view of an AWS IAM Identity Center detection that was triggered in the Falcon console Figure 2. Detailed view of an AWS IAM Identity Center detection that was triggered in the Falcon console

By embedding real-time identity threat detection in Falcon Cloud Security, we’re enabling customers to stop cross-domain attacks earlier, reduce security blind spots, and strengthen their overall cloud defense — all from Falcon Cloud Security, our unified cloud-native application protection platform (CNAPP).

Watch it in action:

How to Enable Identity Threat Detections in Falcon Cloud Security

Enabling identity threat detection is simplified with Falcon Cloud Security’s step-by-step registration workflow.

In the Falcon console, navigate to the Cloud Security Account Registration Page and add a new AWS account.

Figure 3. Add a new AWS account in Falcon Cloud Security Figure 3. Add a new AWS account in Falcon Cloud Security
In the second step of the workflow, Select recommended options, Falcon Identity Protection features are enabled with the Real-time visibility and detection checkbox.
Figure 4. Enable Falcon Identity Protection features Figure 4. Enable Falcon Identity Protection features
Complete the rest of the workflow steps, connecting the API client and deploying the CloudFormation stack on AWS. Once completed, you will get visibility and detections related to AWS IAM Identity Center. You can verify identity protection is active when viewing your AWS accounts on the Account Registration page.
Figure 5. Identify identity protection is active in Falcon Cloud Security Figure 5. Identify identity protection is active in Falcon Cloud Security

Cross-Domain Protection from Today’s Adversaries

Identity is the new perimeter. Securing it requires integrated protection across identity and cloud environments. With the latest AWS IAM Identity Center detections, Falcon Cloud Security now provides real-time visibility into identity-based threats, helping organizations detect and respond to suspicious access activity before it escalates. By unifying cloud and identity security, CrowdStrike strengthens defenses against credential abuse, lateral movement, and cloud control plane compromise, ensuring a more resilient security posture without added complexity.

Additional Resources

CrowdStrike 2025 Global Threat Report

CrowdStrike 2025 Global Threat Report

Get your copy of the must-read cybersecurity report of the year.