- New CNAPP Innovations for Proactive Security
- Application Explorer: Adding the Application Layer to Cloud Risk Analysis
- Adversary Intelligence for Cloud Risks: Attacker-Aligned Risk Prioritization
- Timeline Explorer: Triage with Precision
- Falcon Data Security for Cloud: AI Data Flow Discovery in the Cloud
Interest in cloud-native application protection platforms (CNAPPs) has exploded over the recent years, partly due to their ability to reduce alert noise by translating siloed misconfigurations into correlated, theoretical attack paths and exposures. While many organizations have adopted these solutions in pursuit of outcomes like zero critical issues, cloud breaches continue to rise. In 2025, cloud-conscious intrusions by state-nexus threat actors surged 266% year-over-year, the CrowdStrike 2026 Global Threat Report found.
As cloud environments and adversary tradecraft evolve, proactive security must adapt to help organizations better prepare their defenses. But three key gaps remain:
- Limited to infrastructure: Current approaches analyze cloud assets and links between services but lack visibility into the business applications and how they run on cloud infrastructure. Security teams need additional tools to understand which infrastructure findings impact mission-critical applications.
- Ignores adversary behavior: Risk analysis reveals potential attack paths but does not incorporate intelligence on which paths and industries are targeted by specific adversaries. Security teams chase theoretical risk with arbitrary severity labels, while adversaries focus on exploitation chains proven against organizations like theirs.
- Endless triage: Risk detections surface without connection to the configuration changes that introduced them. Security teams manually comb through logs to stitch together which changes caused exposure, lacking visibility into causality and who made the changes.
Today, we’re introducing three industry-first CNAPP capabilities in CrowdStrike Falcon® Cloud Security designed to address these limitations and give security teams the context needed to understand cloud risk, prioritize remediation, and move from detection to action faster.
New CNAPP Innovations for Proactive Security
These capabilities advance CNAPP by closing critical gaps in how cloud risk is assessed today, enabling organizations to understand how applications interact with infrastructure, which risks align with observed adversary behavior, and when conditions combine to enable a breach. Let’s take a look at what’s new.
Application Explorer: Adding the Application Layer to Cloud Risk Analysis
Falcon Cloud Security unifies application-layer visibility with cloud infrastructure context using Application Explorer. It shows how business applications run across cloud and on-premises environments, which services they depend on, and how infrastructure risks affect production applications — all within a single console. Organizations no longer need separate application monitoring tools or manual log stitching to understand business application risk.
CrowdStrike continuously performs code-level runtime analysis to build an application inventory, map dependencies, and identify application-layer risk. Built on the CrowdStrike Enterprise Graph®, Falcon Cloud Security correlates application insights with cloud infrastructure telemetry to show how applications interact with services, access data, use credentials, and integrate AI components. For example, if CrowdStrike identifies a storage resource with overly permissive access, it knows which applications connect to it and whether those applications process customer personally identifiable information (PII). Falcon Cloud Security also layers in business context to help security teams distinguish business-critical applications (e.g., payment processing, hospital ERP) from low-impact or non-production services.
For AI-driven applications, CrowdStrike discovers applications running as MCP, identifies dependencies on external large language models (LLMs), and maps what data those AI components can access — enabling organizations to discover shadow AI activity, detect unapproved model usage, and prevent sensitive data from being exposed to external AI services.
By correlating runtime application behavior with cloud infrastructure findings, Application Explorer gives organizations a precise view of business risk across production environments.
This new capability is generally available.
Adversary Intelligence for Cloud Risks: Attacker-Aligned Risk Prioritization
Falcon Cloud Security applies CrowdStrike’s world-class threat intelligence to cloud risk detections, enabling organizations to assess risk based on how threat actors operate. It maps cloud risks to known adversary profiles and observed techniques so security teams can focus on the conditions attackers target in documented intrusions.
Falcon Cloud Security automatically analyzes risk detections against more than 280 adversary groups tracked by CrowdStrike, including threat actors such as LABYRINTH CHOLLIMA and SCATTERED SPIDER, and identifies the industries they actively target. For example, if a risk maps to a threat group known to target financial services and the organization operates in that sector, the exposure reflects a documented intrusion pattern and signals a higher likelihood of targeting. Because CrowdStrike tracks each threat group’s tactics, techniques, and procedures (TTPs), organizations can prioritize the exposure with greater precision, assess potential blast radius, and align remediation to how that adversary is known to operate.
The CrowdStrike Falcon® Adversary OverWatch threat hunting team continuously monitors adversary behavior in real-world intrusions and translates evolving tactics into updated detection and intelligence context across the CrowdStrike Falcon® platform. As attackers shift techniques, CrowdStrike updates adversary mappings and detection logic so cloud risks are evaluated against current tradecraft.
By grounding cloud risk in observed attacker behavior rather than static severity scoring, Falcon Cloud Security provides unique prioritization depth and context that helps organizations focus remediation and proactively stop adversaries before the breach.

This new capability is in beta and will be generally available in the coming months.
Timeline Explorer: Triage with Precision
Timeline Explorer delivers automated root cause analysis by reconstructing how cloud risk develops over time. It shows how exposure formed and eliminates hours of manual investigation across logs, dashboards, and disconnected findings. Instead of pivoting across multiple tools to determine what happened, organizations gain a single chronological view that explains how a specific risk condition emerged. This clarity enables faster investigation and accelerates remediation decisions.
Cloud risk often forms when multiple changes across connected assets converge to create exposure. CrowdStrike automatically correlates each cloud risk detection with the asset changes that contributed to that specific condition, identifies the changes and who made them, and presents the sequence in a clear chronological timeline. Rather than reviewing isolated change history, organizations see the exact chain of events that combined to create the risk. Timeline Explorer links cause to outcome, transforming fragmented change data into a coherent narrative of how exposure developed.
Timeline Explorer also validates remediation within the same view. When a configuration change resolves the risk condition, the timeline reflects that update and confirms the exposure has been eliminated. Organizations no longer have to assume remediation worked — they can verify it.
By combining automated root cause analysis with remediation validation, Timeline Explorer helps organizations understand why a risk occurred, not just where it appeared. This insight enables teams to address the underlying people, process, or control gaps that introduced the exposure, reducing repeat risk and delivering greater long-term security value beyond fixing individual findings.

This new capability is in beta and will be generally available in the coming months.
Falcon Data Security for Cloud: AI Data Flow Discovery in the Cloud
Ultimately, adversaries don’t target infrastructure for its own sake, they target the sensitive data that applications and cloud services can access. As organizations build AI-powered applications, new data paths emerge that move sensitive information through AI pipelines, orchestration layers, and model services.
As organizations build AI-powered applications, those paths expand. AI pipelines introduce new ways for sensitive data to move across cloud services, orchestration layers, and model platforms, creating additional exposure points that security teams need visibility into. Training data, customer PII, and proprietary intellectual property can flow through AI pipelines without clear visibility or controls, creating compliance exposure and breach risk.
CrowdStrike Falcon® Data Security for Cloud now addresses this with real-time visibility into how sensitive cloud data flows into and through AI services at runtime. Using eBPF-powered monitoring, Falcon Data Security for Cloud continuously observes data flows across cloud services, APIs, containers, and internal services, classifying sensitive content in real time as it moves. For AI-driven workloads, this monitoring extends into AI data paths: Teams can see sensitive data as it’s collected from cloud storage and databases, passed through internal or external AI orchestration layers including MCP servers, and sent to or consumed by internal AI and machine learning (ML) services such as Amazon SageMaker and Bedrock.

