Skip to content

Wiz IO

Wiz IO

About

Agentless coverage of your entire cloud environment

  • Wiz scans every resource across entire cloud stack and multi-cloud environments using a 100% API approach that deploys in minutes.

Analysis that goes beyond standalone point solutions

  • Wiz redefines cloud security, combining what used to be addressed by standalone CSPM and CWPP products with our innovative Cloud Risk Engine to reveal effective risk.

The most critical risks surfaced and prioritized instantly

  • Wiz finds the toxic combinations of cloud risk factors that together create an actual breach path

Product Details

Vendor URL: Wiz IO

Product Type: Monitoring

Product Tier: Tier II

Integration Method: Custom

Integration URL: Wiz IO - Cyderes Documentation

Log Guide: Sample Logs by Log Type - Cyderes Documentation

Parser Details

Log Format: JSON

Expected Normalization Rate: Near 100%

Data Label: WIZ_IO

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
Control.Description extensions.vulns.vulnerabilities
Control ID principal.hostname
Control Name metadata.product_event_type
Entity ID target.cloud.project.id
Entity Name target.cloud.project.name
Entity Technologies Name security_result.about.resource.name
Entity.Technologies.StackLayer security_result.about.resource.resource_subtype
Entity.Type target.cloud.project.type
ID metadata.product_log_id
Projects ID security_result.about.cloud.project.id
Projects Name security_result.about.cloud.project.name
Severity security_result.severity
Status security_result.about.investigation.comments
sysloghost observer.hostname
tagCountry principal.asset.location.country_or_region

Product Event Types

Event UDM Event Classification
all SCAN_VULN_HOST

Log Sample

{"ID":"id","Severity":"HIGH","Status":"OPEN","ResolutionReason":"","Description":"This VM instance group is widely accessible on any port. Thus, an attacker can easily access it and compromise it. It is highly recommended to limit the network access to each resource for only the required paths. ","Note":"","Control":{"ID":"id","Name":"VM instance group widely accessible on any port","Description":"This VM instance group is widely accessible on any port. Thus, an attacker can easily access it and compromise it. It is highly recommended to limit the network access to each resource for only the required paths. ","ResolutionRecommendation":"To resolve this issue follow these steps:\n1. Inspect the evidence.\n2. If the resource is stale, remove it.\n3. Restrict the public exposure:\n    * Inspect the Wiz network exposure calculation and restrict public access to the VM.\n    * Ensure that exposed ports allow only encrypted communications.\n* Limit the range of addresses that allows access to this VM group.","Tags":[],"Type":"SECURITY_GRAPH","Severity":"HIGH","CreatedAt":"2021-04-04T07:16:35Z","LastRunAt":"2021-11-19T16:04:51Z","LastSuccessfulRunAt":"2021-11-19T16:04:51Z","Enabled":true},"Projects":[{"ID":"HOSTNAME","Name":"Azure Production ","Description":"","Identifiers":[],"BusinessUnit":"","RiskProfile":{"BusinessImpact":"HBI"},"Slug":"azure-production","Archived":false}],"ServiceTickets":[],"Entity":{"ID":"HOSTNAME","Name":"name","Type":"COMPUTE_INSTANCE_GROUP","FirstSeen":"0001-01-01T00:00:00Z","LastSeen":"0001-01-01T00:00:00Z","Technologies":[{"Name":"Azure Databricks","Description":"Fast, easy, and collaborative Apache Spark-based analytics platform","Note":"","Risk":"HIGH","Categories":[{"Name":"Machine Learning \u0026 AI"}],"StackLayer":"APPLICATION_AND_DATA","DeploymentModel":"CLOUD_PLATFORM_SERVICE"}],"UserMetadata":{"Note":"","IsIgnored":false,"IsInWatchlist":false},"CustomIPRangeExposures":{"Nodes":[],"TotalCount":0},"OtherSubscriptionExposures":{"Nodes":[],"TotalCount":0},"OtherVnetExposures":{"Nodes":[],"TotalCount":0},"PublicExposures":{"Nodes":[],"TotalCount":0},"VPNExposures":{"Nodes":[],"TotalCount":0}},"EntitySnapshot":{"ID":"HOSTNAME","Name":"name","Type":"COMPUTE_INSTANCE_GROUP","CloudPlatform":"Azure"},"CreatedAt":"2021-11-19T16:04:51Z","DueAt":"0001-01-01T00:00:00Z","ResolvedAt":"0001-01-01T00:00:00Z","UpdatedAt":"2021-11-19T16:04:51Z"}

Sample Parsing

metadata.product_log_id = "id"
metadata.event_timestamp = "2021-11-19T16:08:39.365219Z"
metadata.event_type = "SCAN_VULN_HOST"
metadata.vendor_name = "WIZ"
metadata.product_name = "IO"
metadata.product_event_type = "VM instance group widely accessible on any port"
metadata.ingested_timestamp = "2021-11-19T16:08:39.365219Z"
principal.hostname = "HOSTNAME"
principal.asset.hostname = "HOSTNAME"
target.cloud.project.type = "COMPUTE_INSTANCE_GROUP"
target.cloud.project.id = "id"
target.cloud.project.name = "name"
security_result.about.resource.name = "Azure Databricks"
security_result.about.resource.resource_subtype = "APPLICATION_AND_DATA"
security_result.about.cloud.project.id = "id"
security_result.about.cloud.project.name = "Azure Production "
security_result.about.investigation.status = "NEW"
security_result.about.investigation.comments = "OPEN"
security_result.severity = "HIGH"
extensions.vulns.vulnerabilities.description = "This VM instance group is widely accessible on any port. Thus, an attacker can easily access it and compromise it. It is highly recommended to limit the network access to each resource for only the required paths. "

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon