Wiz

Enrich asset context with vulnerability data from the Wiz cloud security platform

About

The Wiz context integration provides enriched asset context to Netography Fusion from the Wiz Cloud Security Platform. It gathers vulnerability data about the cloud assets in your environment from the Wiz API, and adds that as Context Labels in Netography Fusion.

Use Cases

Reduce investigation time

An AWS EC2 instance that has only ever communicated to the corporate network makes a new outbound connection to China. As you investigate this, you may want to know more about this EC2 instance. The vulnerability context provided by Wiz is immediately available to you without having to pivot to another tool or ask another analyst with direct access to Wiz for this information.

Enhance monitoring for vulnerable assets

Cloud assets with high-severity vulnerabilities are at higher risk of being exploited and becoming the source of malicious activity. Now that the vulnerability state of these assets is directly available, you can use that information to monitor these assets, including:

  • Creating and viewing dashboards focused on activity from the most vulnerable assets
  • Create a custom escalation workflow for network activity, such as potential network scanning or exfiltration when it comes from a highly vulnerable asset
  • Build custom detections that include the vulnerability state of the asset

You can use the following NQL to accomplish this:
label.ip.cvss_rating == critical || label.ip.cvss_rating == high

Monitor network activity for assets with high-profile vulnerabilities while they are being remediated

A new vulnerability is released that is being actively exploited in cloud environments. You can focus your attention on the network activity for assets that Wiz has identified as being vulnerable to this issue. By watching the assets with a highly visible vulnerability more closely, you can identify potential indicators of compromise and act on them during the critical period before the vulnerability is remediated.

You can use the following NQL to accomplish this:

label.ip.cve == CVE-2023-0123

Context Labels

The Wiz context integration will populate the following IP context labels in Netography based on the data that is retrieved via the Wiz API:

Context NameDescriptionExamples
vuln_countThe total number of vulnerabilities (any severity)10
cvss_ratingThe highest CVSS rating of any vulnerabilitymedium
cvss_scoreThe highest CVSS score of any vulnerability6.5
cveA list of CVE IDs with a >= high severity (limit of 100 per asset)CVE-2021-20254

Wiz Configuration

Configure a service account

A Wiz Service Account is used to authenticate with the Wiz Integration API. The service account must possess (at least) these listed permissions:

Permissions Required
create:reports
read:reports
update:reports
read:vulnerabilities
(optional) read:issues (this is not used today, but will be in a future update)

❗️

Wiz Service account requires global scope

The integration requires the service account be configured with a global scope. Project level scopes are not supported at this time. If your organization requires project level scope permissions, contact Netography Support as support for this capability will be added in a future update.

Consult Wiz documentation for the specific steps needed to create this account and configure permissions.

API configuration parameters required

To configure the integration, the following Wiz API configuration parameters are required:

Wiz API Configuration Parameters Parameter Information
API Endpoint URLURL is based on the region of your Wiz deployment:
e.g.http://api.<region>.app.wiz.io/graphql
Token URLUsed for authentication and the URL may differ depending on the type of authentication you are using with Wiz.
e.g. https://auth.app.wiz.io/oauth/token
Client IDGather this when creating the service account in the previous step
Client SecretGather this when creating the service account in the previous step

Netography Fusion Configuration

Add the context integration

In the Netography Fusion Portal:

  1. Go to the Setup section on the left-hand navigation menu and select Integrations.
  2. Select Context Integrations in the tab that appears on the Integrations page.
  3. Select the Add Integration button.
  4. Select Wiz.

Configure the context integration

  1. Fill out the standard fields required for each context integration:
FieldDescription
NameA unique name to identify this instance of the integration (e.g. wiz1)
Update IntervalHow frequently to retrieve updated information from Wiz in seconds (86400 is the smallest supported interval based on Wiz integration requirements). 86400 seconds = 24 hours
Auto UpdateEnable to retrieve updated information automatically at the frequency set by theUpdate Interval
If disabled, the integration can be run manually from the list of configured integrations menu by selecting the ... next to the name of the integration and then selecting Run
  1. Enter the configuration parameters you obtained from Wiz.
FieldRequiredDescription
API Endpoint URLyesThe API endpoint for Wiz to use.
Token URLyesThe authentication endpoint for Wiz
Client IDyesAuthentication field for the Wiz Service Account
Client SecretyesAuthentication field for the Wiz Service Account
  1. Select Create and Run to save the integration.
  2. Note the troubleshooting guidance below, which may occur after completing step 3.

Troubleshooting

❗️

Context deadline exceeded errors when running Wiz integration in Portal

The Wiz integration can take many hours to run (up to a day) the first time it executes due to the large number of vulnerabilities that may exist within Wiz in total. This will result in a context deadline exceeded error being reported by the Portal when the integration is run by a user in the Portal manually, either during the initial Create and Run step, or when making changes thereafter.

This error indicates that the integration did not complete quickly enough for it to report its state to the Netography Fusion Portal, but it does not mean that the integration is not working.

Check the audit log to see if the integration completed successfully or if an error was returned by the API.

Check back in the Netography Fusion Portal in 24 hours to see if the context labels have been successfully populated.