Purpose of this article is to offer general guidance on how to troubleshoot issues related to deployment of CrowdStrike Falcon Next-Gen SIEM for AWS through AWS Marketplace. It summarizes common issues and the recommended steps to resolve them.
Overview:
CrowdStrike’s pay-as-you-go listing for Falcon Next-Gen SIEM in AWS Marketplace includes a new automated setup experience that automatically provisions the AWS resources required for deployment using AWS CloudFormation. After subscribing through AWS Marketplace, customers are guided through a step-by-step configuration wizard to complete setup and begin using the solution.
This article highlights the most common deployment issues customers may encounter during deployment and provides guidance on how to resolve them.
Common Issues and How to Resolve them
1. Deployment must be initiated from the AWS Organizations management account
- CrowdStrike Next-Gen SIEM can only be deployed from the AWS Organizations management account (or a delegated admin account, if supported) using an administrator-level role. Because the deployment creates cross-account roles and permissions across the entire organization, management-account access is required to ensure consistent and secure configuration. This is the recommended approach because it aligns with best practices for AWS organization setup and security architecture.
- Customers using standalone accounts or attempting deployment from a member account will not be able to complete setup.
2. CloudFormation StackSet failure due to missing trusted access
- The onboarding flow deploys cross-account resources using AWS CloudFormation StackSets. For this to work, trusted access for AWS CloudFormation must be enabled in AWS Organizations. In many organizations this is not enabled by default, which causes the deployment to fail during StackSet operations even though the CloudFormation stack initially launches.
- When trusted access is disabled, customers may see an error such as:
Resource handler returned message: "You must enable organizations access to operate a service managed stack set (Service: CloudFormation, Status Code: 400, Request ID: ) (SDK Attempt Count: 1)" (RequestToken: , HandlerErrorCode: InvalidRequest)
- To resolve this issue, ensure that CloudFormation trusted access is enabled from the AWS Organizations console under the management account.

3. Access and Permissions Requirements
-
As the deployment integrates with multiple AWS services to automate SIEM deployment and data collection across your AWS organization, the solution uses CloudFormation to configure essential resources including:
- IAM roles
- CloudTrail S3 bucket configurations
- KMS permissions
- EventBridge rules
- SQS queues
- Lambda functions
- Secrets Manager
-
Note: For customers with AWS Security Hub or Amazon GuardDuty enabled, the solution automatically configures the necessary EventBridge rules to connect these services to Next-Gen SIEM, further streamlining the deployment process.
-
Marketplace subscription permissions:
Support Path Options
-
For problems signing up for NG-SIEM product on Marketplace
-
Problems with AWS services involved in deployment (e.g., CloudFormation, IAM)
- Create technical support case with AWS
- If you do not have a support contract with AWS, contact CrowdStrike support AWSMP@CrowdStrike.com
This article was co-authored by John Dittmer and Krutarth Doshi.