You need to know about about kernel development.
When you work in the kernel at ring 0 there are no safety nets the only sane thing to do to avoid data corruption is to panic. This is true across all operating systems.
The problem here is Crowdstrike flagged the driver as required for boot.
You can't have it both ways if a driver is required you can't expect to OS to start deciding which drivers not to load. I'm not even sure it would be inherently apparent to the kernel which driver is causing the problem. It wouldn't be an immediate crash on load.
The only thing I might give a bit of blame to Microsoft is that they certified a driver that essentially downloads and executes updates that bypass the usual certification an testing process. The problem is that if Microsoft didn't allow this all the 3rd party AV/SEC vendors would be screaming antitrust.
Microsoft had build APIs to provide the required functionality without requiring a kernel driver but the EU required it to be removed due to Antitrust reasons. If anyone deserves the blame besides crowdstrike it's the EU.
The thing that made it really bad is that a lot of the same companies that have Crowdsrike also use bitlocker. Again, the only improvement I can see here is having a Safemode that prompts for the bitlocker keys rather than requiring an external USB but that would likely decrease the effectiveness of FDE but I'm not all that familiar with bitlocker.
*sigh* Can't believe I'm defending Microsoft.