Skip to main content

Wiz

Wiz is a cloud security tool that scans your cloud environments to provide complete visibility into every technology running in your cloud. You can bring virtual network, virtual machine, vulnerability and more data from Wiz into Brinqa to construct a unified view of your attack surface and strengthen your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Wiz when the data integration runs, and how to obtain that information from Wiz. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Wiz from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate Wiz with Brinqa:

  • API URL: The Wiz API endpoint URL. The default URL is https://api.<region>.app.wiz.io.

  • Token URL: The Wiz API authentication token URL. The URL is specific to the identity provider (IdP) for the Wiz service account. See Table 1 for more information.

  • OAuth audience: The audience of your OAuth token. The audience is specific to your IdP. See Table 1 for more information.

  • Client ID and Client secret: The credentials associated with the Wiz service account, which must have permissions to log in to the API server and return data.

The Token URL and OAuth audience values depend on the IdP you use for the Wiz service account. The following table summarizes the different values:

Table 1. Wiz token URL and audience values

IdPToken URLAudience
Amazon Cognitohttps://auth.app.wiz.io/oauth/tokenwiz-api
Auth0https://auth.wiz.io/oauth/tokenbeyond-api

Obtain the client ID and client secret from Wiz

For the Wiz connector to use the Wiz API, you must provide the client ID and client secret from an active Wiz service account.

To obtain these credentials, please follow the steps in the official Wiz documentation for Brinqa integration. This guide is maintained by Wiz and outlines the process for creating the required service account and assigning appropriate permissions.

note

If you do not have the permissions to create a service account or assign permissions, contact your Wiz administrator.

The Wiz connector was developed in collaboration with Wiz and adheres to their recommended solutions. It has been certified by Wiz to ensure optimal functionality and security.

  • Due to limitations with GraphQL in exporting large datasets, the connector generates reports in CSV format.
  • The Wiz connector generates one report per asset type for Vulnerabilities, with each report prefixed by BRINQA-VULNERABILITIES-REPORT_.
  • It also generates one report per inventory type for Inventory, with each report prefixed by BRINQA-INVENTORY-REPORT_. This lets you easily identify and monitor said reports.
  • These reports are automatically deleted from Wiz based on your specified data cleanup frequency.

Additional settings

The Wiz connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

  • Maximum retries: The maximum number of times that the integration attempts to connect to the Wiz API before giving up and reporting a failure. The default setting is 5.

  • Report timeout (hours): The maximum number of hours to wait for a report to be generated before giving up and reporting a failure. The default setting is 4 hours.

Types of data to retrieve

The Wiz connector can retrieve the following types of data from the Wiz API:

Table 2: Data retrieved from Wiz

Connector ObjectRequiredMaps to Data Model
API GatewayNoNot mapped
Backup ServiceNoNot mapped
BucketNoNot mapped
CI/CD ServiceNoNot mapped
Compute Instance GroupNoNot mapped
Configuration FindingNoViolation
ContainerYesContainer
Container ImageYesContainer Image
Container RegistryNoNot mapped
Container ServiceNoNot mapped
ControlYesViolation Definition
Daemon SetNoNot mapped
Database ServerYesDatabase Instance
DeploymentNoNot mapped
Encryption KeyNoNot mapped
File System ServiceNoNot mapped
FirewallNoNot mapped
IssueYesViolation
Issue DefinitionYesViolation Definition
Kubernetes ClusterNoNot mapped
Raw Access PolicyNoNot mapped
Resource GroupNoNot mapped
Secret ContainerNoNot mapped
ServerlessYesServerless
Storage AccountNoNot mapped
SubnetNoNot mapped
SubscriptionNoNot mapped
Virtual MachineYesHost
Virtual Machine ImageYesHost Image
Virtual NetworkYesNetwork Segment
VolumeNoNot mapped
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
Web ServiceNoNot mapped
info

For detailed steps on how to view the data retrieved from Wiz in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Configuration Finding

Table 3: Configuration Finding attribute mappings

Source Field NameMaps to Attribute
firstSeenAtfirstSeen
iduid
remediationrecommendation
resource.idtargets
resource.nameLocal variable
resource.typeLocal variable
resultresults
ruletype
severityseverity
statusstatus
Container

Table 4: Container attribute mappings

Source Field NameMaps to Attribute
Cloud Native JSON.tagstags
Cloud PlatformLocal variable
Descriptiondescription
External IDLocal variable
Last SeenlastSeen
NameLocal variable
Native TypeLocal variable
ProjectsLocal variable
Provider IDLocal variable
Provider ID/External IDuid
namename
categoriescategories
Regionregion
Resource TypeLocal variable
SubscriptionLocal variable
Subscription IDLocal variable
Wiz JSON Object.RuntimeLocal variable
Wiz JSON Object.applicationEndpoint.openToAllInternetLocal variable
Wiz JSON Object.applicationEndpoint.validatedOpenPortsLocal variable
Wiz JSON Object.common.creationDatesourceCreatedDate
Wiz JSON Object.common.statusproviderStatus
Wiz JSON Object.common.statusstatus
Wiz JSON Object.imageExternalIdimage
Wiz JSON Object.kubernetes.baseExtraData.clusterExternalIdLocal variable
Wiz JSON Object.kubernetes.baseExtraData.clusterNameLocal variable
Wiz JSON Object.virtualMachineExternalIdhost
Container Image

Table 5: Container Image attribute mappings

Source Field NameMaps to Attribute
Categoriescategories
Cloud Native JSON.tagstags
Cloud PlatformLocal variable
Descriptiondescription
External IDLocal variable
Last SeenLocal variable
Namename
Native TypeLocal variable
ProjectsLocal variable
Provider IDLocal variable
Provider ID/External IDuid
Regionregion
Resource TypeLocal variable
SubscriptionLocal variable
Subscription IDLocal variable
Wiz JSON Object.applicationEndpoint.openToAllInternetLocal variable
Wiz JSON Object.applicationEndpoint.validatedOpenPortsLocal variable
Wiz JSON Object.common.creationDatesourceCreatedDate
Wiz JSON Object.common.statusproviderStatus
Wiz JSON Object.common.status (normalized)status
Wiz JSON Object.digestdigest
Wiz JSON Object.encryptedLocal variable
Wiz JSON Object.repoExternalIdLocal variable
Control

Table 6: Control attribute mappings

Source Field NameMaps to Attribute
descriptiondescription
iduid
namename
remediationInstructionsrecommendation
Issue

Table 7: Issue attribute mappings

Source Field NameMaps to Attribute
CREATED_ATfirstFound
CREATED_ATsourceCreatedDate
DUE_ATLocal variable
ENTITY.EXTERNAL_IDLocal variable
ENTITY.IDLocal variable
ENTITY.NAMELocal variable
ENTITY.STATUSLocal variable
ENTITY.TYPELocal variable
ENTITY.UIDtargets
IDuid
NOTES.TEXTLocal variable
RESOLVED_ATlastFixed
RESOLUTION_REASONLocal variable
SEVERITYseverity, severityScore, sourceSeverity
SEVERITYseverityScore
SEVERITYsourceSeverity
SERVICE_TICKETS.EXTERNAL_IDLocal variable
SERVICE_TICKETS.IDLocal variable
SERVICE_TICKETS.NAMELocal variable
SERVICE_TICKETS.URLLocal variable
SOURCE_RULES.IDtype
STATUSproviderStatus, sourceStatus, status, statusCategory
SUBSCRIPTION.EXTERNAL_IDLocal variable
SUBSCRIPTION.IDLocal variable
TYPEcategories
UPDATED_ATsourceLastModified
Issue Definition

Table 8: Issue Definition attribute mappings

Source Field NameMaps to Attribute
ISSUE.SOURCERULE.DESCRIPTIONdescription
ISSUE.SOURCERULE.IDuid
ISSUE.SOURCERULE.NAMEname
ISSUE.SOURCERULE.NAMEsummary
ISSUE.SOURCERULE.REMEDIATIONINSTRUCTIONSrecommendation
ISSUE.SOURCERULE.RESOLUTIONRECOMMENDATIONrecommendation
ISSUE.SOURCERULE.RESOLUTIONRECOMMENDATIONPLAINTEXTrecommendation
ISSUE.SOURCERULE.RISKSLocal variable
ISSUE.SOURCERULE.SECURITYSUBCATEGORIES.DISPLAYNAMEcategories
ISSUE.SOURCERULE.SEVERITYseverity, severityScore, sourceSeverity
ISSUE.SOURCERULE.THREATSLocal variable
ISSUE.SOURCERULE.TYPELocal variable
Virtual Machine

Table 9: Virtual Machine attribute mappings

Source Field NameMaps to Attribute
Categoriescategories
Cloud Native JSON.ArchitectureLocal variable
Cloud Native JSON.ImageIdimage
Cloud Native JSON.InstanceIdinstanceId
Cloud Native JSON.InstanceTypeLocal variable
Cloud Native JSON.Monitoring.StateLocal variable
Cloud Native JSON.NetworkInterfaces.MacAddressmacAddresses
Cloud Native JSON.PrivateDnsNamednsNames
Cloud Native JSON.PrivateDnsNameprivateDnsNames
Cloud Native JSON.PrivateIpAddressipAddresses
Cloud Native JSON.PrivateIpAddressprivateIpAddresses
Cloud Native JSON.PublicDnsNamehostnames
Cloud Native JSON.PublicDnsNamepublicDnsNames
Cloud Native JSON.PublicIpAddressipAddresses
Cloud Native JSON.PublicIpAddresspublicIpAddresses
Cloud Native JSON.StateReasonLocal variable
Cloud Native JSON.SubscriptionLocal variable
Cloud Native JSON.Subscription IDLocal variable
Cloud Native JSON.lastStartTimestamplastStarted
Cloud Native JSON.lastStopTimestamplastStopped
Cloud Native JSON.nameLocal variable
Cloud Native JSON.networkInterfaces.networkLocal variable
Cloud Native JSON.networkInterfaces.subnetworkLocal variable
Cloud Native JSON.projectLocal variable
Cloud Native JSON.providerIdLocal variable
Cloud Native JSON.tagstags
Cloud PlatformLocal variable
Descriptiondescription
External IDLocal variable
Last SeenLocal variable
Namename
Native TypeLocal variable
ProjectsLocal variable
Provider IDLocal variable
Provider ID/External IDuid
Regionregion
Resource TypeLocal variable
SubscriptionLocal variable
Subscription IDLocal variable
Wiz JSON Object.RuntimeLocal variable
Wiz JSON Object.applicationEndpoint.openToAllInternetLocal variable
Wiz JSON Object.applicationEndpoint.validatedOpenPortsLocal variable
Wiz JSON Object.common.creationDatefirstSeen
Wiz JSON Object.common.creationDatesourceCreatedDate
Wiz JSON Object.common.statusproviderStatus
Wiz JSON Object.common.statusstatus
Wiz JSON Object.imageExternalIdimage
Wiz JSON Object.isContainerHostLocal variable
Wiz JSON Object.operatingSystemoperatingSystem
Virtual Machine Image

Table 10: Virtual Machine Image attribute mappings

Source Field NameMaps to Attribute
Categoriescategories
Cloud Native JSON.tagstags
Cloud PlatformLocal variable
Descriptiondescription
External IDLocal variable
Last SeenLocal variable
Namename
Native TypeLocal variable
ProjectsLocal variable
Provider IDLocal variable
Provider ID/External IDuid
Regionregion
Resource TypeLocal variable
SubscriptionLocal variable
Subscription IDLocal variable
Wiz JSON Object.ImageLocationLocal variable
Wiz JSON Object.ImageOwnerAliasLocal variable
Wiz JSON Object.PlatformDetailsLocal variable
Wiz JSON Object.applicationEndpoint.openToAllInternetLocal variable
Wiz JSON Object.applicationEndpoint.validatedOpenPortsLocal variable
Wiz JSON Object.common.creationDatesourceCreatedDate
Wiz JSON Object.common.statusproviderStatus
Wiz JSON Object.common.statusstatus
Wiz JSON Object.familyLocal variable
Wiz JSON Object.is_publicLocal variable
Virtual Network

Table 11: Virtual Network attribute mappings

Source Field NameMaps to Attribute
Categoriescategories
Cloud Native JSON.addressSpace.addressPrefixesLocal variable
Cloud Native JSON.enableDdosProtectionLocal variable
Cloud Native JSON.tagstags
Cloud PlatformLocal variable
Descriptiondescription
External IDLocal variable
Last SeenLocal variable
Namename
Native TypeLocal variable
ProjectsLocal variable
Provider IDLocal variable
Provider ID/External IDuid
Regionregion
Resource TypeLocal variable
SubscriptionLocal variable
Subscription IDLocal variable
Wiz JSON Object.addressRangeEdgesLocal variable
Wiz JSON Object.addressRangesipv4Ranges
Wiz JSON Object.applicationEndpoint.openToAllInternetLocal variable
Wiz JSON Object.applicationEndpoint.validatedOpenPortsLocal variable
Wiz JSON Object.common.creationDatesourceCreatedDate
Wiz JSON Object.common.statusproviderStatus
Wiz JSON Object.common.statusstatus
Wiz JSON Object.flowLogsEnabledLocal variable
Wiz JSON Object.hasDeployedInstancesLocal variable
Wiz JSON Object.isDefaultLocal variable
Vulnerability

Table 12: Vulnerability attribute mappings

Source Field NameMaps to Attribute
ASSETIDtargets
ASSETNAMELocal variable
CRITICALRELATEDISSUESCOUNTLocal variable
CVSSSEVERITYLocal variable
DETAILEDNAMEresults
DETECTIONMETHODLocal variable
DESCRIPTIONdescription
EXPLOITABILITYSCORELocal variable
FINDINGSTATUSproviderStatus, sourceStatus, status, statusCategory
FIRSTDETECTEDfirstFound
FIXEDVERSIONLocal variable
HIGHRELATEDISSUESCOUNTLocal variable
IDuid
IMPACTSCORELocal variable
INFORELATEDISSUESCOUNTLocal variable
LASTDETECTEDlastFound
LOCATIONPATHlocationPath
LOWRELATEDISSUESCOUNTLocal variable
MEDIUMRELATEDISSUESCOUNTLocal variable
NAMEname
NAMEtype
NVDSEVERITYLocal variable
PROVIDERUNIQUEIDLocal variable
REMEDIATIONrecommendation
RESOLUTIONREASONLocal variable
RESOLVEDATlastFixed
SCOREsourceSeverityScore
SEVERITYseverity, severityScore, sourceSeverity
TYPEcategories
VERSIONLocal variable
VENDORSEVERITYLocal variable
WIZURLLocal variable
Vulnerability Definition

Table 13: Vulnerability Definition attribute mappings

Source Field NameMaps to Attribute
AFFECTEDSOFTWAREaffected
CATEGORIEScategories
CISAKEVDUEDATEcisaDueDate
CISAKEVRELEASEDATEcisaAddedDate
CVSSV2.ATTACKCOMPLEXITYcvssV2AccessComplexity
CVSSV2.ATTACKVECTORcvssV2AttackVector
CVSSV2.BASESCOREcvssV2BaseScore
CVSSV2.CONFIDENTIALITYIMPACTcvssV2ConfidentialityImpact
CVSSV2.INTEGRITYIMPACTcvssV2IntegrityImpact
CVSSV2.PRIVILEGESREQUIREDcvssV2Authentication
CVSSV3.ATTACKCOMPLEXITYcvssV3AttackComplexity
CVSSV3.ATTACKVECTORcvssV3AttackVector
CVSSV3.CONFIDENTIALITYIMPACTcvssV3ConfidentialityImpact
CVSSV3.INTEGRITYIMPACTcvssV3IntegrityImpact
CVSSV3.PRIVILEGESREQUIREDcvssV3PrivilegesRequired
CVSSV3.USERINTERACTIONREQUIREDcvssV3UserInteraction
DESCRIPTIONdescription
EPSSPERCENTILEepssPercentile
EPSSSEVERITYLocal variable
EPSSSCOREepssScore
EXPLOITABILITY/HASCISAKEVEXPLOITexploitability
EXPLOITABILITYSCORELocal variable
EXTERNALIDexternalUids
HASHCISAKEVEXPLOITcisaExploited
HIGHPROFILETHREATLocal variable
ISHIGHPROFILETHREATLocal variable
NAMEcveIds, cveRecords, name, uid
NVDSEVERITYLocal variable
PUBLISHEDATpublishedDate
RECOMMENDATIONrecommendation
REFERENCESreferences
SEVERITYseverity, severityScore, sourceSeverity
SOURCEURLreferences
VENDORSEVERITYLocal variable
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Operation options

The Wiz connector supports the following operation options. See connector operation options for information about how to apply them.

Expand the sections below to view the supported operation options per connector object.

Configuration Finding

Table 14: Configuration Finding operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
Configuration FindingframeworkCategoryAny Wiz framework category ID(s).A comma-separated list to filter configuration findings by their associated framework category.Key: frameworkCategory,
Value: wct-id-4,wct-id-7.
This key and value combination only retrieves configuration findings for framework categories wct-id-4 and wct-id-7.
includeDeletedtrue or falseInclude or exclude deleted configuration findings in the results. Leave the value blank to indicate all findings.Key: includeDeleted,
Value: false.
This key and value combination excludes deleted configuration findings from the results.
ruleNameAny string identifying a rule name.A comma-separated list to filter configuration findings by the specified rule names.Key: ruleName,
Value: ruleName1,ruleName2.
This key and value combination only retrieves findings related to the ruleName1 and ruleName2 rules.
resourceTypeAny string identifying a resource type.A comma-separated list to filter configuration findings by the specified resource type.Key: resourceType,
Value: type1,type2.
This key and value combination only retrieves configuration findings for resources of type Server.
resultERROR, FAIL, NOT_ASSESSED, PASSEDA comma-separated list to filter configuration findings based on their result status. Leave the value blank to indicate all result statuses.Key: result,
Value: ERROR,FAIL.
This key and value combination only retrieves findings with an ERROR or FAIL result status.
severityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter configuration findings based on severity.Key: severity,
Value: HIGH,CRITICAL.
This key and value combination only retrieves findings with a severity of HIGH or CRITICAL.
statusOPEN, RESOLVED, REJECTEDA comma-separated list to filter configuration findings by their status.Key: status,
Value: OPEN,REJECTED.
This key and value combination only retrieves findings that are in the OPEN or REJECTED status.
Control

Table 15: Control operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
ControlframeworkCategoryAny Wiz framework category ID(s).A comma-separated list to filter controls by their associated framework category.Key: frameworkCategory,
Value: wct-id-4,wct-id-7.
This key and value combination only retrieves controls for framework categories wct-id-4 and wct-id-7.
includeDeletedtrue or falseInclude or exclude deleted controls in the results. Leave the value blank to indicate all controls.Key: includeDeleted,
Value: false.
This key and value combination excludes deleted controls from the results.
resourceTypeAny string identifying a resource type.A comma-separated list to filter controls by the specified resource type.Key: resourceType,
Value: type1,type2.
This key and value combination only retrieves controls for resources of type Server.
ruleNameAny string identifying a rule name.A comma-separated list to filter controls by the specified rule names.Key: ruleName,
Value: ruleName1,ruleName2.
This key and value combination only retrieves controls related to the ruleName1 and ruleName2 rules.
resultERROR, FAIL, NOT_ASSESSED, PASSEDA comma-separated list to filter controls based on their result status. Leave the value blank to indicate all result statuses.Key: result,
Value: ERROR,FAIL.
This key and value combination only retrieves controls with an ERROR or FAIL result status.
severityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter controls based on severity.Key: severity,
Value: HIGH,CRITICAL.
This key and value combination only retrieves controls with a severity of HIGH or CRITICAL.
statusOPEN, RESOLVED, REJECTEDA comma-separated list to filter controls by their status.Key: status,
Value: OPEN,REJECTED.
This key and value combination only retrieves controls that are in the OPEN or REJECTED status.
Issue & Issue Definition

Table 16: Issue and Issue Definition operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
Issue,
Issue Definition
frameworkCategoryAny Wiz framework category ID(s).A comma-separated list to filter issues by their associated framework category.Key: frameworkCategory,
Value: wct-id-4,wct-id-7.
This key and value combination only retrieves issues for framework categories wct-id-4 and wct-id-7.
Issue,
Issue Definition
hasAutoRemediationtrue or falseFilter issues with or without auto remediation.Key: hasAutoRemediation
Value: true.
This key and value combination only retrieves issues with auto remediation.
Issue,
Issue Definition
hasRemediationtrue or falseFilter issues with or without remediation.Key: hasRemediation
Value: false.
This key and value combination only retrieves issues without a remediation.
Issue,
Issue Definition
hasServiceTickettrue or falseFilter issues with or without a related service ticket.Key: hasServiceTicket
Value: true.
This key and value combination only retrieves issues with related service tickets.
Issue,
Issue Definition
projectIdAny project ID(s).Filter issues associated with the specified project ID. Leave the value blank to indicate all project IDs.Key: projectId
Value: 1234.
This key and value combination only retrieves issues for project ID 1234.
Issue,
Issue Definition
resolutionReasonCONTROL_CHANGED, CONTROL_DISABLED, CONTROL_DELETED, EXCEPTION, FALSE_POSITIVE, ISSUE_FIXED, OBJECT_DELETED, WONT_FIXA comma-separated list to filter issues by resolution reason. Leave the value blank to indicate all resolution reasons.Key: resolutionReason
Value: FALSE_POSITIVE.
This key and value combination only retrieves issues that are false positives.
Issue,
Issue Definition
severityCRITICAL, HIGH, INFORMATIONAL, LOW, MEDIUMA comma-separated list to filter issues based on severity. Leave the value blank to indicate all severities.Key: severity
Value: LOW, MEDIUM.
This key and value combination only retrieves issues of low or medium severity.
Issue,
Issue Definition
stackLayerAPPLICATION_AND_DATA, CI_CD, CLOUD_ENTITLEMENTS, CODE, COMPUTE_PLATFORMS, DATA_STORES, SECURITY_AND_IDENTITYA comma-separated list to filter issues from a specified stack layer. Leave the value blank to indicate all stack layers.Key: stackLayer
Value: ``.
This key and value combination retrieves issues from all stack layers.
Issue,
Issue Definition
statusIN_PROGRESS, OPEN, REJECTED, RESOLVEDA comma-separated list to filter issues by their status. Leave the value blank to indicate all statuses.Key: status
Value: OPEN.
This key and value combination only retrieves open issues.
IssuetypeCLOUD_CONFIGURATION, THREAT_DETECTION, TOXIC_COMBINATIONA comma-separated list of issue types. You can use this option to filter issues by their issue type, as determined by Wiz.Key: type
Value: THREAT_DETECTION,TOXIC_COMBINATION.
This key and value combination only retrieves issues with the specified type.
Vulnerability

Table 17: Vulnerability operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
VulnerabilityassetHasAdminPrivilegestrue or falseFilter vulnerabilities for assets with or without admin privileges.Key: assetHasAdminPrivileges Value: true. This key and value combination only retrieves vulnerabilities for assets with admin privileges.
assetHasHighPrivilegestrue or falseFilter vulnerabilities for assets with or without high privileges.Key: assetHasHighPrivileges,
Value: false.
This key and value combination only retrieves vulnerabilities for assets without high privileges.
assetIdAny Wiz asset ID(s).A comma-separated list to filter vulnerabilities by the asset ID. Leave the value blank to indicate all asset IDs.Key: assetId,
Value: 1234,5678.
This key and value combination only retrieves vulnerabilities for asset IDs 1234 and 5678.
assetStatusActive, Error, InactiveA comma-separated list to filter vulnerabilities for assets with the specified status. Leave the value blank to indicate all asset statuses.Key: assetStatus,
Value: Active,Error.
This key and value combination only retrieves vulnerabilities from assets with statuses Active and Error.
assetTypeCONTAINER, CONTAINER_IMAGE, SERVERLESS, VIRTUAL_MACHINEA comma-separated list to filter vulnerabilities by the asset type. Leave the value blank to indicate all asset types.Key: assetType,
Value: CONTAINER,SERVERLESS.
This key and value combination only retrieves vulnerabilities for the asset types CONTAINER and SERVERLESS.
baseContainerImageAny string identifying a base container image.A comma-separated list to filter vulnerabilities by their base container image.Key: baseContainerImage,
Value: ubuntu:latest,alpine:3.15.
This key and value combination only retrieves vulnerabilities for the base container images ubuntu:latest and alpine:3.15.
cnaScoreAny numeric value from 0.1-10.0Retrieve all vulnerabilities with a CVE Numbering Authority (CNA) score of the specified value or higher.Key: cnaScore,
Value: 7.5.
This key and value combination only retrieves vulnerabilities with a CNA score of 7.5 or higher.
cloudPlatformsAny string identifying a cloud platform.A comma-separated list to filter vulnerabilities by their associated cloud platform.Key: cloudPlatforms,
Value: AWS,Azure.
This key and value combination only retrieves vulnerabilities for the cloud platforms AWS and Azure.
containerRegistryAny name identifying a container registry.A comma-separated list to filter vulnerabilities associated with the specified container registry.Key: containerRegistry,
Value: ECR,GCR.
This key and value combination only retrieves vulnerabilities related to the container registries ECR and GCR.
containerRepositoryAny name identifying a container repository.A comma-separated list to filter vulnerabilities associated with the specified container repository.Key: containerRepository,
Value: Azure Container Repository,Docker Hub.
This key and value combination only retrieves vulnerabilities in the repositories Azure Container Repository and Docker Hub.
containerServiceIdAny string identifying a container service ID.A comma-separated list to filter vulnerabilities by their associated container service ID.Key: containerServiceId,
Value: service-123,service-456.
This key and value combination only retrieves vulnerabilities for the container service IDs service-123 and service-456.
detailedNameAny string identifying a detailed name.A comma-separated list to filter vulnerabilities by their detailed name.Key: detailedName,
Value: Critical Vulnerability,High Risk.
This key and value combination only retrieves vulnerabilities with the detailed names Critical Vulnerability and High Risk.
detectionMethodDEFAULT_PACKAGE, FILE_PATH, INSTALLED_PROGRAM, INSTALLED_PROGRAM_BY_SERVICE, LIBRARY, OS, PACKAGEA comma-separated list to filter vulnerabilities found by the specified detection method. Leave the value blank to indicate all detection methods.Key: detectionMethod,
Value: FILE_PATH,PACKAGE.
This key and value combination only retrieves vulnerabilities detected through FILE_PATH and PACKAGE.
effectiveAttackVectorAny string identifying an attack vector.A comma-separated list to filter vulnerabilities by their effective attack vector.Key: effectiveAttackVector,
Value: NETWORK,PHYSICAL.
This key and value combination only retrieves vulnerabilities with the effective attack vectors NETWORK and PHYSICAL.
hasCisaKevExploittrue or falseFilter vulnerabilities with or without an available Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) exploit.Key: hasCisaKevExploit,
Value: true.
This key and value combination only retrieves vulnerabilities with a CISA KEV exploit.
hasExploittrue or falseFilter vulnerabilities with or without an available exploit.Key: hasExploit,
Value: false.
This key and value combination only retrieves vulnerabilities without an exploit.
hasFixtrue or falseFilter vulnerabilities with or without an available fix.Key: hasFix,
Value: true.
This key and value combination only retrieves vulnerabilities with a fix.
hasTriggerableRemediationtrue or falseFilter vulnerabilities by whether they have triggerable remediation.Key: hasTriggerableRemediation,
Value: true.
This key and value combination only retrieves vulnerabilities with triggerable remediation.
isAssetAccessibleFromInternettrue or falseFilter vulnerabilities for assets by whether the associated asset is accessible from the internet, as determined by Wiz.Key: isAssetAccessibleFromInternet,
Value: true.
This key and value combination only retrieves vulnerabilities for assets accessible from the internet.
isAssetOpenToAllInternettrue or falseFilter vulnerabilities for assets by whether they are publicly accessible over the internet.Key: isAssetOpenToAllInternet,
Value: true.
This key and value combination only retrieves vulnerabilities for assets publicly accessible over the internet.
isBaseLayertrue or falseFilter vulnerabilities for container images by whether they are attributed to a base image.Key: isBaseLayer,
Value: false.
This key and value combination only retrieves vulnerabilities for container images not attributed to a base image.
isEndOfLifetrue or falseFilter vulnerabilities by whether the associated asset is end-of-life.Key: isEndOfLife,
Value: true.
This key and value combination only retrieves vulnerabilities for end-of-life assets.
isOperatingSystemEndOfLifetrue or falseFilter vulnerabilities by whether the associated operating system is end-of-life.Key: isOperatingSystemEndOfLife,
Value: true.
This key and value combination only retrieves vulnerabilities for end-of-life operating systems.
isScannedFromRegistrytrue or falseFilter vulnerabilities by whether they are scanned from a container registry.Key: isScannedFromRegistry,
Value: true.
This key and value combination only retrieves vulnerabilities scanned from a container registry.
isScannedFromWorkloadtrue or falseFilter vulnerabilities by whether they are scanned from a workload.Key: isScannedFromWorkload,
Value: true.
This key and value combination only retrieves vulnerabilities scanned from a workload.
nvdSeverityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter vulnerabilities by their NVD severity.Key: nvdSeverity,
Value: HIGH,CRITICAL.
This key and value combination only retrieves vulnerabilities with NVD severities HIGH and CRITICAL.
projectIdAny Wiz project ID(s).A comma-separated list to filter vulnerabilities associated with the specified project ID(s). Leave the value blank to indicate all project IDs.Key: projectId,
Value: 1234,5678.
This key and value combination only retrieves vulnerabilities for project IDs 1234 and 5678.
relatedIssueSeverityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter vulnerabilities by the severity of related issues.Key: relatedIssueSeverity,
Value: CRITICAL,HIGH.
This key and value combination only retrieves vulnerabilities with related issues of severities CRITICAL and HIGH.
reportNameAny name identifying a report.Filter vulnerabilities matching the specified report name.Key: reportName,
Value: Report A,Report B.
This key and value combination only retrieves vulnerabilities from the reports Report A and Report B.
scoreAny numeric value from 0.1-10.0Retrieve all vulnerabilities with a CVSS3 (Common Vulnerability Scoring System) score of the specified value or higher.Key: score,
Value: 8.0.
This key and value combination only retrieves vulnerabilities with a CVSS3 score of 8.0 or higher.
severityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter vulnerabilities by their severity.Key: severity,
Value: HIGH,CRITICAL.
This key and value combination only retrieves vulnerabilities with severities HIGH and CRITICAL.
statusOPEN, REJECTED, RESOLVEDA comma-separated list to filter vulnerabilities by their status.Key: status,
Value: OPEN,RESOLVED.
This key and value combination only retrieves vulnerabilities with statuses OPEN and RESOLVED.
subscriptionExternalIdAWS Account, Azure Subscription, GCP Project, OCI CompartmentA comma-separated list to filter vulnerabilities by their associated external subscription ID.Key: subscriptionExternalId,
Value: AWS Account,Azure Subscription.
This key and value combination only retrieves vulnerabilities associated with the external subscription IDs AWS Account and Azure Subscription.
validatedInRuntimetrue or falseFilter vulnerabilities by whether they have been validated in runtime.Key: validatedInRuntime,
Value: true.
This key and value combination only retrieves vulnerabilities validated in runtime.
vcsRepositoryIdAny string identifying a VCS repository ID.A comma-separated list to filter vulnerabilities by their associated VCS repository ID.Key: vcsRepositoryId,
Value: repo-123,repo-456.
This key and value combination only retrieves vulnerabilities for the VCS repository IDs repo-123 and repo-456.
vendorScoreAny numeric value from 0.1-10.0Retrieve all vulnerabilities with a vendor score of the specified value or higher.Key: vendorScore,
Value: 8.0.
This key and value combination only retrieves vulnerabilities with a vendor score of 8.0 or higher.
vendorSeverityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter vulnerabilities by their vendor severity.Key: vendorSeverity,
Value: HIGH,CRITICAL.
This key and value combination only retrieves vulnerabilities with vendor severities HIGH and CRITICAL.
vulnerabilityExternalIdAny CVE ID(s)A comma-separated list of CVE IDs to filter vulnerabilities by their associated CVE ID.Key: vulnerabilityExternalId,
Value: CVE-2023-12345,CVE-2023-44487.
This key and value combination only retrieves vulnerabilities with the CVE IDs CVE-2023-12345 and CVE-2023-44487.
vulnerabilityIdAny Wiz vulnerability ID(s).A comma-separated list to filter vulnerabilities by their vulnerability ID.Key: vulnerabilityId,
Value: vuln-123,vuln-456.
This key and value combination only retrieves vulnerabilities with the vulnerability IDs vuln-123 and vuln-456.
weightedSeverityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter vulnerabilities by their weighted severity.Key: weightedSeverity,
Value: MEDIUM,HIGH.
This key and value combination only retrieves vulnerabilities with weighted severities
Vulnerability Definition

Table 18: Vulnerability Definition operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
Vulnerability DefinitionassetHasAdminPrivilegestrue or falseFilter vulnerability definitions for assets with or without admin privileges.Key: assetHasAdminPrivileges,
Value: true.
This key and value combination only retrieves vulnerability definitions for assets with admin privileges.
assetHasHighPrivilegestrue or falseFilter vulnerability definitions for assets with or without high privileges.Key: assetHasHighPrivileges,
Value: false.
This key and value combination only retrieves vulnerability definitions for assets without high privileges.
assetIdAny Wiz asset ID(s).A comma-separated list of asset ID(s) to filter vulnerability definitions by the asset ID(s). Leave the value blank to indicate all asset IDs.Key: assetId,
Value: 1234.
This key and value combination only retrieves vulnerability definitions for asset ID 1234.
assetStatusActive, Error, InactiveA comma-separated list to filter vulnerability definitions for assets with the specified status. Leave the value blank to indicate all asset statuses.Key: assetStatus,
Value: Active.
This key and value combination only retrieves vulnerability definitions from active assets.
assetTypeCONTAINER, CONTAINER_IMAGE, SERVERLESS, VIRTUAL_MACHINEA comma-separated list to filter vulnerability definitions by the asset type. Leave the value blank to indicate all asset types.Key: assetType,
Value: CONTAINER, SERVERLESS.
This key and value combination only retrieves vulnerability definitions for the CONTAINER and SERVERLESS asset type.
containerRegistryAny name identifying a container registry.Filter vulnerability definitions associated with the specified container registry.Key: containerRegistry,
Value: ECR.
This key and value combination only retrieves vulnerability definitions related to the AWS Elastic Container Registry (ECR).
containerRepositoryAny name identifying a container repository.Filter vulnerability definitions associated with the specified container repository.Key: containerRepository,
Value: Azure Container Repository.
This key and value combination only retrieves vulnerability definitions in the Azure Container Repository.
detectionMethodDEFAULT_PACKAGE, FILE_PATH, INSTALLED_PROGRAM, INSTALLED_PROGRAM_BY_SERVICE, LIBRARY, OS, PACKAGEA comma-separated list to filter vulnerability definitions found by the specified detection method. Leave the value blank to indicate all detection methods.Key: detectionMethod,
Value: FILE_PATH.
This key and value combination only retrieves vulnerability definitions detected through file paths.
hasCisaKevExploittrue or falseFilter vulnerability definitions with or without an available Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) exploit.Key: hasCisaKevExploit,
Value: true.
This key and value combination only retrieves vulnerability definitions with a CISA KEV exploit.
hasExploittrue or falseFilter vulnerability definitions with or without an available exploit.Key: hasExploit,
Value: false.
This key and value combination only retrieves vulnerability definitions without an exploit.
hasFixtrue or falseFilter vulnerability definitions with or without an available fix.Key: hasFix,
Value: true.
This key and value combination only retrieves vulnerability definitions with a fix.
isAssetAccessibleFromInternettrue or falseFilter vulnerability definitions for assets by whether the associated asset is accessible from the internet, as determined by Wiz.Key: isAssetAccessibleFromInternet
Value: true. This key and value combination only retrieves vulnerability definitions for assets that are accessible from the internet.
isAssetOpenToAllInternettrue or falseFilter vulnerability definitions for assets by whether they are publicly accessible over the internet.Key: isAssetOpenToAllInternet,
Value: true.
This key and value combination only retrieves vulnerability definitions for assets that are accessible over the internet.
isBaseLayertrue or falseFilter vulnerability definitions for container images by whether they are attributed to a base image.Key: isBaseLayer,
Value: false.
This key and value combination only retrieves vulnerability definitions for container images that aren't attributed to a base image.
isScannedFromRegistrytrue or falseFilter vulnerability definitions by whether they are scanned from a container registry.Key: isScannedFromRegistry,
Value: true.
This key and value combination only retrieves vulnerability definitions scanned from a container registry.
projectIdAny Wiz project ID(s).Filter vulnerability definitions associated with the specified project ID. Leave the value blank to indicate all project IDs.Key: projectId,
Value: 1234.
This key and value combination only retrieves vulnerability definitions for project ID 1234.
reportNameAny name identifying a report.Filter vulnerability definitions matching the specified report name.Key: reportName,
Value: Report A.
This key and value combination only retrieves vulnerability definitions from Report A.
statusOPEN, REJECTED, RESOLVEDA comma-separated list to filter vulnerability definitions by their status. Leave the value blank to indicate all statuses.Key: status,
Value: RESOLVED.
This key and value combination only retrieves resolved vulnerability definitions.
subscriptionExternalIdAWS Account, Azure Subscription, GCP Project, OCI CompartmentA comma-separated list to filter vulnerability definitions by their associated external subscription ID. Leave the value blank to indicate all external subscription IDs.Key: subscriptionExternalId,
Value: AWS Account.
This key and value combination only retrieves vulnerability definitions associated with the AWS Account.
validatedInRuntimetrue or falseFilter vulnerability definitions by whether they have been validated in runtime.Key: validatedInRuntime,
Value: true.
This key and value combination only retrieves vulnerability definitions that have been validated in runtime.
vendorSeverityNONE, LOW, MEDIUM, HIGH, CRITICALA comma-separated list to filter vulnerability definitions by their vendor severity. Leave the value blank to indicate all vendor severities.Key: vendorSeverity,
Value: HIGH.
This key and value combination only retrieves vulnerability definitions deemed high severity by the vendor.
Wiz operation options

The Wiz connector operation options were developed in collaboration with Wiz and adheres to their supported API filters. If you require an operation option that isn’t listed in the above tables, please refer to the Wiz API documentation, or contact your Wiz Support team. They can coordinate with Brinqa Support to determine whether the Wiz API supports the request and whether it can be added to the connector.

note

The option keys and possible values are case-sensitive as they are shown in this documentation.

APIs

The Wiz connector uses the Wiz API. Specifically, it executes the following GraphQL queries to retrieve data:

Table 19: Wiz API GraphQL queries

Connector ObjectGraphQL Query
Backup ServiceReports GraphQL queries
BucketReports GraphQL queries
CI/CD ServiceReports GraphQL queries
Compute Instance GroupReports GraphQL queries
Configuration FindingCloud Configuration Findings GraphQL queries
ContainerReports GraphQL queries
Container ImageReports GraphQL queries
Container RegistryReports GraphQL queries
Container ServiceReports GraphQL queries
ControlCloud Configuration Findings GraphQL queries
Daemon SetReports GraphQL queries
Database ServerReports GraphQL queries
DeploymentReports GraphQL queries
Encryption KeyReports GraphQL queries
File System ServiceReports GraphQL queries
FirewallReports GraphQL queries
IssueIssue GraphQL queries
Issue DefinitionIssue GraphQL queries
Kubernetes ClusterReports GraphQL queries
Raw Access PolicyReports GraphQL queries
Resource GroupReports GraphQL queries
ServerlessReports GraphQL queries
Storage AccountReports GraphQL queries
SubscriptionReports GraphQL queries
Virtual MachineReports GraphQL queries
Virtual Machine ImageReports GraphQL queries
Virtual NetworkReports GraphQL queries
VulnerabilityReports GraphQL queries
Vulnerability GraphQL query
Vulnerability DefinitionReports GraphQL queries
Vulnerability GraphQL query
Vulnerability Definition GraphQL query
Web ServiceReports GraphQL queries

Cloud Configuration Finding queries

Click to expand

The following query retrieves information about cloud configuration findings:

query CloudConfigurationFindingsPage($filterBy: ConfigurationFindingFilters, $first: Int, $after: String, $orderBy: ConfigurationFindingOrder) {  
page: configurationFindings(filterBy: $filterBy, first: $first, after: $after, orderBy: $orderBy) {
nodes {
id
targetExternalId
deleted
targetObjectProviderUniqueId
firstSeenAt
severity
result
status
remediation
resource {
id
providerId
name
nativeType
type
region
subscription {
id
name
externalId
cloudProvider
}
projects {
id
name
riskProfile {
businessImpact
}
}
tags {
key
value
}
}
rule {
id
graphId
name
description
remediationInstructions
functionAsControl
}
securitySubCategories {
id
title
category {
id
name
framework {
id
name
}
}
}
ignoreRules {
id
name
enabled
expiredAt
}
}
pageInfo {
hasNextPage
endCursor
}
}
}

Issue GraphQL queries

Click to expand

The following query retrieves information about issue and issue definition:

query issueFindings($filterBy: IssueFilters, $first: Int, $after: String $orderBy: IssueOrder) {  
page: issuesV2(filterBy: $filterBy, first: $first, after: $after, orderBy: $orderBy) {
nodes {
id
status
severity
type
openReason
resolutionReason
suggestions
resolvedAt
createdAt
updatedAt
dueAt
statusChangedAt
rejectionExpiredAt
sourceRule {
__typename
... on Control {
id
name
description
severity
resolutionRecommendation
securitySubCategories {
id
title
category {
id
name
framework {
id
name
}
}
}
}
... on CloudEventRule {
id
name
description
sourceType
type
cloudEventRuleSeverity: severity
securitySubCategories {
id
title
category {
id
name
framework {
id
name
}
}
}
}
... on CloudConfigurationRule {
id
name
description
remediationInstructions
serviceType
severity
securitySubCategories {
id
title
category {
id
name
framework {
id
name
}
}
}
}
}
entity: entitySnapshot {
id
type
nativeType
name
status
cloudPlatform
cloudProviderURL
providerId
region
resourceGroupExternalId
subscriptionExternalId
subscriptionName
subscriptionTags
tags
externalId
}
projects {
id
name
description
slug
businessUnit
riskProfile {
businessImpact
}
}
serviceTickets {
id
externalId
name
url
}
notes {
id
createdAt
updatedAt
text
user {
id
name
email
}
serviceAccount {
id
name
type
}
}
}
pageInfo {
hasNextPage
endCursor
}
}
}

Reports GraphQL queries

Click to expand

The first query retrieves data for the Backup Service, Bucket, CI/CD Service, Compute Instance Group, Container, ContainerImage, Container Registry, Container Service, Daemon Set, Database Server, Deployment, Encryption Key, File System Service, Firewall, Kubernetes Cluster, Raw Access Policy, Resource Group, Serverless, Storage Account, Subscription, Virtual Machine Image, Virtual Network, Vulnerability, Vulnerability Definition, or Web Service connector objects from the reports endpoint. The rest of the queries create a report and generates the URL to download the report:

query ReportsSearch($filterBy: ReportFilters, $first: Int, $after: String) {
page: reports(first: $first, after: $after, filterBy: $filterBy) {
nodes {
id
name
createdBy {
id
email
}
lastRun {
id
runAt
}
lastSuccessfulRun {
id
runAt
}
type {
id
name
}
}
pageInfo {
hasNextPage
endCursor
}
}
}

mutation CreateReport($input: CreateReportInput!) {
operation: createReport(input: $input) {
node: report {
id
}
}
}

mutation RerunReport($reportId: ID!) {
operation: rerunReport(input: {id: $reportId}) {
node: report {
id
}
}
}

query ReportDownloadUrl($reportId: ID!) {
node: report(id: $reportId) {
id
name
lastRun {
id
url
status
}
}
}

Vulnerability GraphQL query

Click to expand

The following query retrieves information about vulnerabilities:

query vulnerabilityFindings($filterBy: VulnerabilityFindingFilters, $first: Int, $after: String) {  
page: vulnerabilityFindings(filterBy: $filterBy, first: $first, after: $after) {
nodes {
id
name
detailedName
CVEDescription
CVSSSeverity
vendorSeverity
score
exploitabilityScore
impactScore
description
remediation
link
locationPath
detectionMethod
version
fixedVersion
portalUrl
firstDetectedAt
lastDetectedAt
vulnerableAsset {
... on VulnerableAssetBase {
id
providerUniqueId
type
name
}
}
}
pageInfo {
hasNextPage
endCursor
}
totalCount
}
}

Vulnerability Definition GraphQL query

Click to expand

The following query retrieves information about vulnerability definition:

query VulnerabilityDefinitions($filterBy: VulnerabilityFilters, $first: Int, $after: String) { 
page: vulnerabilities(filterBy: $filterBy, first: $first, after: $after) {
nodes {
affectedTechnologies {
id
name
}
baseScore
cisaKevDueDate
cisaKevReleaseDate
cvssv2 {
attackComplexity
attackVector
confidentialityImpact
integrityImpact
privilegesRequired
userInteractionRequired
}
cvssv3 {
attackComplexity
attackVector
confidentialityImpact
integrityImpact
privilegesRequired
userInteractionRequired
}
description
exploitabilityScore
exploitable
externalId
hasCisaKevExploit
id
name
publishedAt
severity
sourceFeeds {
id
name
url
}
sourceUrl
}
pageInfo {
endCursor
hasNextPage
}
totalCount
}
}

Changelog

The Wiz connector has undergone the following changes:

Table 20: Wiz connector changelog

VersionDescriptionDate Published
3.3.14Added a new additional setting to make the report timeout configurable: Report timeoutJuly 31st, 2025
3.3.13Added the ENTITY_EXTERNAL_ID, ENTITY_ID, ENTITY_NAME, ENTITY_STATUS, ENTITY_TYPE, SUBSCRIPTION_EXTERNAL_ID, and SUBSCRIPTION_ID attributes to the Issue object.July 30th, 2025
3.3.12Added the ASSET_HAS_LIMITED_INTERNET_EXPOSURE and ASSET_HAS_WIDE_INTERNET_EXPOSURE attributes to the Vulnerability object.June 11th, 2025
3.3.11- Fixed an issue where dates were appearing in the future due to the date parser not handling nanoseconds correctly. As a result, the date parser has been updated to accurately reflect the source data from Wiz.
- Added the NAMESPACE_EXTERNAL_ID attribute to the Container object.
- Code cleanup and general maintenance.
May 20th, 2025
3.3.8Updated the schema to include the CLUSTER_EXTERNAL_ID and CLUSTER_NAME attributes on the Container object. This change ensures that the attributes are recognized by the Brinqa Platform and properly ingested.April 29th, 2025
3.3.7- Added the ADDITIONAL_IDS attribute to the API Gateway object.
- Added the CLUSTER_EXTERNAL_ID and CLUSTER_NAME attributes to the Container object to support Kubernetes context.
April 16th, 2025
3.3.6- Added a new operation option for the Issue object to filter by issue type: type.
- Added the CATEGORIES attribute to the Issue object.
- Added support for ticketing information from Wiz to help prevent duplicate ticket creation and improve issue tracking. As a result, the following attributes were added to the Issue object:
  • TICKET_EXTERNAL_ID
  • TICKET_ID
  • TICKET_NAME
  • TICKET_URL
March 11th, 2025
3.3.5Fixed an issue where the TARGETS attribute on the Vulnerability object included empty string values. The connector now prevents empty values from being added to the targets list.February 19th, 2025
3.3.4Fixed an issue where configuration findings were not correctly associating with assets. The connector now imports RESOURCE_EXTERNAL_ID and RESOURCE_PROVIDER_ID on the Configuration Finding object to establish proper relationships between findings and their associated assets.February 12th, 2025
3.3.3Fixed an issue where the connector was incorrectly mapping IP addresses and private DNS names to both the IP_ADDRESSES and PRIVATE_IP_ADDRESSES attributes on the Virtual Machine object. The connector now properly distinguishes between these attributes.February 6th, 2025
3.3.2- The Configuration Finding object is no longer required and now maps to Violation.
- Added the RECOMMENDATION, TARGETS, and TYPE attributes to the Configuration Finding object.
January 15th, 2025
3.3.1The connector now retrieves the Configuration Finding object from Wiz.January 7th, 2025
3.3.0Replaced the deprecated vulnerabilityParams.type attribute on the Vulnerability object with columnSelection to support Wiz's updated export behavior. This improves CSV parsing by no longer relying on the Content-Length header, which may be 0 even when data is present.December 24th, 2024
3.2.6The connector now retrieves the Secret Container object from Wiz.December 6th, 2024
3.2.5Fixed an issue where attributes from Wiz were not being mapped correctly to the Host data model. To support out-of-the-box relationships between Hosts and Container Images, the connector now maps the EXTERNAL_ID attribute to the SOURCE_UIDS attribute.December 3rd, 2024
3.2.4Added the NAME attribute to the Vulnerability Definition object.November 14th, 2024
3.2.3Code cleanup and general maintenance to help improve error handling.November 13th, 2024
3.2.2Fixed an issue where the Issue and Issue Definition object syncs were failing.November 13th, 2024
3.2.1Fixed an issue where the Resource Group and Storage Account object syncs were failing due to an "Empty header line: cannot bind data" error.November 11th, 2024
3.2.0Enhanced the Vulnerability object sync process to improve efficiency by using regular reports with the updateAt date filter, as recommended by Wiz. The Wiz connector now retrieves all vulnerabilities with detection support via the GraphQL API, rather than creating vulnerability definitions from vulnerability data.November 1st, 2024
3.1.18Code cleanup and maintenance.October 2nd, 2024
3.1.17- Fixed an issue where the Issue and Issue Definition object syncs were failing.
- Added the SOURCE_SEVERITY_SCORE attribute to the Vulnerability object.
- Code cleanup and maintenance.
October 2nd, 2024
3.1.16- Added remediation instructions to the Issue Definition object.
- Addressed a potential NullPointerException (NPE) on the Issue object.
September 25th, 2024
3.1.15Enhanced the method for retrieving vulnerability status by splitting "New" from "Active" status. The Wiz connector now uses the FIRST_SEEN_AT filter for "New" vulnerabilities and the UPDATED_AT filter for "Active" vulnerabilities to ensure more accurate reporting.July 22nd, 2024
3.1.14Added the IS_CONTAINER_HOST attribute to the Virtual Machine object.June 14th, 2024
3.1.13Code cleanup and general maintenance.May 21st, 2024
3.1.12Fixed an issue where the CVSS_V2_BASE_SCORE and CVSS_V3_BASE_SCORE attributes on the Vulnerability Definition object were not populating.April 11th, 2024
3.1.11Revised the logic of getting asset type information from the source data.February 22nd, 2024
3.1.10- Updated to fetch vmId as the Instance ID for Azure assets.
- Switched the order of adding attributes to allow native or specific attributes to take higher precedence.
- Updated dependencies.
February 5th, 2024
3.1.9- Fixed an issue where an Empty header line error occurred when reports returned by Wiz were empty.
- Fixed an issue related to the Missing 1 header column: ["uid"] error.
January 30th, 2024
3.1.8Added a new additional setting to help manage API throttling: Maximum retriesOctober 28th, 2023
3.1.7- Updated to the new Wiz logo.
- Enhanced handling for missing UID in objects retrieved from Wiz.
September 19th, 2023
3.1.6Code cleanup and general maintenance.September 14th, 2023
3.1.5Code cleanup and general maintenance.September 7th, 2023
3.1.4- The connector now retrieves the image name for Container Image objects.
- The connector now maps the provider ID to the TARGETS attribute on the Issue object.
July 26th, 2023
3.1.3Code cleanup and general maintenance.July 21st, 2023
3.1.2Fixed an issue where Targets were not being received for Vulnerabilities with Container Image assets.July 10th, 2023
3.1.1The connector now retrieves the Database Server, Issue, and Issue Definition objects from Wiz.June 15th, 2023
3.1.0Initial Integration+ release.June 14th, 2023