Overview
This server provides a secure, scalable bridge between AI agents and the CrowdStrike Falcon platform, bringing security telemetry and threat intelligence directly into your AWS environment. Purpose-built for deployment on Amazon Bedrock AgentCore, the falcon-mcp server enables agentic applications to programmatically access detections, incidents, behaviors, and threat intelligence from the Falcon platform. This empowers AI agents to reason over rich security context, automate response workflows, and drive proactive defense across your cloud and enterprise environments. By exposing modular Falcon capabilities through a standardized interface, the falcon-mcp server supports a wide range of use cases, from autonomous incident triage and threat enrichment to building fully agentic, context-aware security operations workflows. The falcon-mcp server gives you the data access layer to build the foundation for an AI-native SOC, backed by the power of the CrowdStrike Falcon platform. To learn more about this resource and explore its capabilities, visit the official project page at: https://github.com/crowdstrike/falcon-mcp
Highlights
- The falcon-mcp server establishes a consistent and secure protocol for agents to communicate with the CrowdStrike Falcon platform, enabling - standardized integration across agentic systems.
- It includes native support for deployment onto Amazon Bedrock AgentCore, making it easy to integrate into your AWS environment and power agentic workflows.
- It is designed to support current and future Falcon platform capabilities, ensuring agentic workflows remain adaptive and comprehensive.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Trust Center
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
All orders are non-cancellable and all fees and other amounts you pay under this Agreement are non-refundable.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Amazon Bedrock AgentCore
- Amazon Bedrock AgentCore
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Features
- Client Credentials: You can now pass credentials directly through the client's init parameters, providing more flexibility in how you configure the Falcon client.
- MITRE Report Formats: The Intel module now supports exporting MITRE reports in JSON or CSV format, making it easier to integrate threat intelligence data into your workflows.
- Stateless HTTP Mode: Added a new stateless HTTP transport mode designed for scalable deployments, enabling better horizontal scaling of the MCP server.
Bug Fixes
- Fixed test expectations for the get_mitre_report function in the Intel module tests.
Improvements
- Reduced repeated API code patterns across modules for better maintainability.
- Simplified the generate_md_table utility function.
Additional details
Usage instructions
Prerequisites
CrowdStrike API Credentials
Create API credentials in your CrowdStrike console:
- Log into your CrowdStrike console
- Navigate to Support > API Clients and Keys
- Click Add new API client
- Configure your API client:
- Client Name: Choose a descriptive name (e.g., "Falcon MCP Server")
- Description: Optional description for your records
- API Scopes: Select scopes based on which modules you plan to use (see scope requirements )
- Note down these values (you cannot retrieve them later):
- FALCON_CLIENT_ID - Your API client ID
- FALCON_CLIENT_SECRET - Your API client secret
- FALCON_BASE_URL - Your API base URL (region-specific)
AWS VPC Requirements
The MCP Server requires internet connectivity to communicate with CrowdStrike's APIs.
- Internet Gateway or NAT Gateway - Enables outbound internet connectivity
- Outbound HTTPS Access - Allow communication to api.crowdstrike.com on port 443
- Security Groups - Configure appropriate rules for your network requirements
Environment Variables
Configure these environment variables when deploying your AgentCore agent:
| Variable | Value | Description |
|---|---|---|
| FALCON_CLIENT_ID | Your client ID | CrowdStrike API client ID |
| FALCON_CLIENT_SECRET | Your client secret | CrowdStrike API client secret |
| FALCON_BASE_URL | <https://api.crowdstrike.com> | API base URL (region-specific) |
| FALCON_MCP_TRANSPORT | streamable-http | Transport protocol |
| FALCON_MCP_HOST | 0.0.0.0 | Host binding |
| FALCON_MCP_PORT | 8000 | Server port |
| FALCON_MCP_USER_AGENT_COMMENT | AWS/Bedrock/AgentCore | Request identifier |
| FALCON_MCP_STATELESS_HTTP | true | Required for AgentCore |
Important: FALCON_MCP_STATELESS_HTTP must be set to true for proper operation in AgentCore's stateless container environment.
Available Modules
The Falcon MCP Server provides security tools organized into modules. Each module requires specific API scopes.
| Module | Purpose |
|---|---|
| Cloud Security | Analyze Kubernetes containers and container image vulnerabilities |
| Detections | Find and analyze detections for malicious activity |
| Discover | Search application inventory across your environment |
| Hosts | Manage and query host/device information |
| Identity Protection | Entity investigation and identity protection analysis |
| Incidents | Analyze security incidents and coordinated activities |
| Intel | Research threat actors, IOCs, and intelligence reports |
| Sensor Usage | Access and analyze sensor usage data |
| Serverless | Search vulnerabilities in serverless functions |
| Spotlight | Manage vulnerability data and security assessments |
Example tool invocation (search for recent detections):
{ "jsonrpc": "2.0", "id": "1", "method": "tools/call", "params": { "name": "falcon_search_detections", "arguments": { "filter": "status:'new'", "limit": 3 } } }Verify Deployment
After deployment, verify connectivity by invoking the falcon_check_connectivity tool:
{ "jsonrpc": "2.0", "id": "1", "method": "tools/call", "params": { "name": "falcon_check_connectivity" } }Additional Resources
For full details, visit the Falcon MCP GitHub repository .
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Powerful Cloud Security with Great Visibility, But Some Learning Curve and Pricing Concerns
However, even the security scans does the same, so this is not a major complaint.