Skip to content

CrowdStrike/foundry-sample-insider-risk-workday

CrowdStrike Falcon

Insider Risk Workday sample Foundry app

The Insider Risk Workday sample Foundry app is a community-driven, open source project which serves as an example of an app which can be built using CrowdStrike's Foundry ecosystem. foundry-sample-insider-risk-workday is an open source project, not a CrowdStrike product. As such, it carries no formal support, expressed or implied.

This app is one of several App Templates included in Foundry that you can use to jumpstart your development. It comes complete with a set of preconfigured capabilities aligned to its business purpose. Deploy this app from the Templates page with a single click in the Foundry UI, or create an app from this template using the CLI.

Important

To view documentation and deploy this sample app, you need access to the Falcon console.

Description

Organizations face critical security challenges when employees leave and have elevated access to sensitive data. The sample Foundry Insider Risk Workday helps automate the process of monitoring leaving employees. This application helps teams:

  • Monitor high-risk individuals who may pose insider risk.
  • Automatically track employees during their departure process.
  • Enhance protection of sensitive data during critical transition periods.
  • Maintain security oversight for users with privileged access.

This app illustrates the following functionality amongst other components:

  • Fetch Leaving/departing employees data from Workday.
  • Add employees to Identity Protection watchlist and Active Directory group using Workflow built-in actions for enhanced monitoring capabilities.

Prerequisites

  • The Foundry CLI (instructions below)
  • Workday Configuration
  • Active Directory Configuration

Install the Foundry CLI

You can install the Foundry CLI with Scoop on Windows or Homebrew on Linux/macOS.

Windows:

Install Scoop. Then, add the Foundry CLI bucket and install the Foundry CLI.

scoop bucket add foundry https://github.com/crowdstrike/scoop-foundry-cli.git
scoop install foundry

Or, you can download the latest Windows zip file, expand it, and add the install directory to your PATH environment variable.

Linux and macOS:

Install Homebrew. Then, add the Foundry CLI repository to the list of formulae that Homebrew uses and install the CLI:

brew tap crowdstrike/foundry-cli
brew install crowdstrike/foundry-cli/foundry

Run foundry version to verify it's installed correctly.

Workday Configuration

1. Create and configure API Client:

  1. Register a new API Client for integrations
  2. Enable Non-Expiring Refresh Tokens option
  3. Add the following scopes
    • Staffing
    • Contact Information
    • Tenant Non-Configurable
  4. Securely store the generated Client ID and Client Secret

2. Set up required user and security:

  1. Create a new Integration System User (ISU)
  2. Create a new Integration System Security Group
  3. Assign Integration System User created in step #1 to Security Group created in a step #2
  4. Add the following domains to Integration System Security Group
    • Worker Data: Current Staffing Information
    • Worker Data: Historical Staffing Information
    • Worker Data: Public Worker Reports
    • Exit Interview
    • Person Data: Work Email
  5. Activate pending security policy changes
  6. Assign ISU to API Client and generate Refresh Token

Active Directory Configuration

Create an Active Directory group (using Microsoft Active Directory) dedicated for departing employees. This group will be selected during the application installation process.

Getting Started

Clone this sample to your local system, or download as a zip file.

git clone https://github.com/CrowdStrike/foundry-sample-insider-risk-workday
cd foundry-sample-insider-risk-workday

Log in to Foundry:

foundry login

Select the following permissions:

  • Create and run RTR scripts
  • Create, execute and test workflow templates
  • Create, run and view API integrations
  • Create, edit, delete, and list queries

Deploy the app:

foundry apps deploy

Tip

If you get an error that the name already exists, change the name to something unique to your CID in manifest.yml.

Re-deploy the app:

foundry apps deploy

Once the deployment has finished, you can release the app:

foundry apps release

Next, go to Foundry > App catalog, find your app, and install. During app install, you will be prompted for app configuration:

  • (API-Integration) Workday generate access token configuration:

    • Workday host: Your Workday host name with protocol (https/http)

    • ClientId Your Workday API client Id

    • ClientSecret Your Workday API client secret

      Example:

  • (Workflow) 'Add leavers to watchlist and AD group' & 'Remove leavers from watchlist and AD group' configuration:

    • Workday Tenant Id: Your Workday tenant id

    • Refresh Token: Your API client refresh token

    • Target Group: Active directory group name

      Example:

Note

You will notice the same configurations been asked a couple of times. This is because there are two workflows (Add leavers to watchlist and AD group & Remove leavers from watchlist and AD group) using the same configurations.

About this sample app

Foundry capabilities used

  • API-Integration. Used to connect to Workday API to get leaving employee data.
  • Functions. Used to get a user linked account.
  • Logscale Saved Search. Used to query departing employees data
  • Workflow templates. Workflow to execute API-Integrations to get leaving employees data from Workday and add/remove employees to/from Identity Protection watchlist.

Directory structure

Known limitations

Multi-Domain Environment Restrictions

Multi-domain environments without trust relationships are not supported. The application requires established trust relationships between domains to function properly.

Cloud-Only User Limitations

Cloud-only users (those without Active Directory accounts) are not supported in the current release. - Support for Entra ID and Okta groups will be available in an upcoming release.

Note

  • The workflow Add leavers to watchlist and AD group runs daily and processes both:

    • Newly identified employees who have given notice of future departure.
    • Previously identified employees whose departure dates are still in the future.

    The workflow will continue to add/maintain these employees on the Identity Protection watchlist and in Active Directory until their actual departure date. This ensures monitoring of all employees those who are on a notice period.

  • The workflow Remove leavers from watchlist and AD group runs daily and automatically removes employees from the watchlist and Active Directory after 30 days of their departure date. This automation helps maintain a clean and up-to-date entries.

Foundry resources



WE STOP BREACHES

About

Insider Risk Workday sample Foundry app

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Contributors 3

  •  
  •  
  •