With the acquisition of SGNL, the CrowdStrike Falcon® Next-Gen Identity Security platform is enhanced with continuous, contextual authorization for:
- human identities,
- non-human identities,
- AI agents.
A key innovation is the shift from static privileges to dynamic privilege management, which:
- grants access only when really needed,
- automatically revokes it when the risk level changes,
- responds in real time to threat signals.
SGNL acts as a runtime access enforcement layer between identity providers and SaaS applications and cloud resources, leveraging risk signals from the entire Falcon platform, identity providers, cloud environments, and organizational context.
Zero Standing Privileges – the end of static privileges
One of the foundations of the new approach is the concept of Zero Standing Privileges. SGNL:
- replaces static roles and permissions with risk-based policies,
- enables just-in-time access for all types of identities,
- eliminates privileges granted excessively – a major cause of attack escalation.
This allows security teams to define policies that automatically adjust to context and current threat levels.
Unified Identity Fabric – a single control plane for all identities
SGNL introduces the concept of a Unified Identity Fabric, a unified identity control plane that provides:
- full real-time visibility,
- correlation of telemetry from Falcon, IAM, SaaS, cloud, and systems like ServiceNow,
- a consistent, contextual view of identity risk.
Importantly, CrowdStrike extends just-in-time access mechanisms beyond Active Directory and Entra ID to include AWS IAM, Okta, and other SaaS and cloud platforms – crucial for organizations operating in complex hybrid environments.
Governance and downstream protection
SGNL integration also enhances identity governance and downstream resource protection:
- access enforcement based on CAEP (Continuous Access Evaluation Protocol),
- integration with Falcon Fusion SOAR,
- automatic access revocation not only at the identity provider level but also in end applications and services.
This approach significantly reduces the risk of misconfigurations – one of the most common causes of security breaches.