Wiz

Prev Next
Self Service Ingestion

Connect this data source on your own, using the Hunters platform.

TL;DR

Supported data types

3rd party detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Wiz Events

✅

✅

wiz_events

NDJSON

Webhook

Wiz EKS Runtime Log

✅

wiz_eks_runtime_logs

NDJSON

S3


Overview

imageWiz is a cloud security platform designed to help organizations secure their cloud environments by providing visibility, risk management, and compliance monitoring. It offers continuous scanning of cloud infrastructure to detect vulnerabilities, misconfigurations, and security risks across services such as AWS, Azure, and Google Cloud. Wiz provides real-time risk assessments, highlighting threats in areas like data exposure, access control, and misconfigured services. By offering deep security insights and automation, Wiz helps businesses identify and remediate risks, ensuring their cloud infrastructure is secure and compliant with industry standards.

Supported data types

Wiz Events

📘Note

Connecting this data type requires the involvement of Hunters Support.

Overview

Table name: wiz_events

Wiz event logs are an integral part of the platform, capturing detailed information about security events, configuration changes, and user activities within cloud environments. These logs offer valuable insights into potential security risks, misconfigurations, and compliance violations, enabling organizations to proactively identify and remediate issues to enhance their overall security posture.

Send data to Hunters

Hunters supports the collection of logs from Wiz using webhook. The webhook is created by Hunters. Once Hunters has created the webhook, we will share the following details:

  • URL

  • Bearer Authorization Key


To connect Wiz Events:

  1. Contact Hunters support to retrieve the URL and Bearer Authorization Key.

  2. Once you receive this information, log into your Wiz account and navigate to New Automation Action.

  3. Supply the relevant details:

    • Action - Call a webhook

    • Authentication - Token

    • Token (Supplied by Hunters). Example: ab830751cbdf4fe9a20f3b46af0ebb40c91099b121e842fe8438c6d01d80fe0b

    • URL (Supplied by Hunters). Example: <https://sampledomain.execute-api.us-west-2.amazonaws.com/webhook/v1/e96b2531-de2c-442a-9d85-912165eff354>

      image

  4. Configure a rule in Wiz to send the Issues to the Webhook (specifically, Created, Opened, Closed, Reopened).

  5. Complete the process on the Hunters platform, following this guide.

Expected format

The logs are expected to be in JSON format.

{"trigger": {"source": "ISSUE", "type": "Created", "ruleId": "dddddddd-1260-1260-1260-dddddddd", "ruleName": "hunters-rule", "updatedFields": " status field was changed from <nil> to OPEN,  severity field was changed from <nil> to HIGH, ", "changedBy": "Wiz"}, "issue": {"id": "aaaaaaaaa-6767-6767-6767-aaaaaaaaa", "status": "OPEN", "severity": "HIGH", "created": "2022-08-03T05:34:44.000000Z", "projects": "AWS Prod related accounts, all aws accts, "}, "resource": {"id": "arn:aws:ec2:us-east-1:88888888:instance/i-88888888", "name": "Builder", "type": "virtualMachine", "cloudPlatform": "AWS", "subscriptionId": "888888888", "subscriptionName": "888888888 AWS 888888888", "region": "us-east-1", "status": "Active", "cloudProviderURL": "https://us-east-1.console.aws.amazon.com/ec2/v2/home?region=us-east-1#InstanceDetails:instanceId=i-888888888"}, "control": {"id": "wc-id-888888888", "name": "Critical/High severity network vulnerability with a known exploit was detected on a publicly exposed VM instance", "description": "This VM has Critical/High severity vulnerabilities with known and public exploits and is remotely exploitable. Furthermore, this VM is also widely exposed to the internet. This might allow an attacker to compromise the affected instance in your environment remotely exfiltrating data or disrupting workflows. All these factors make this a Critical severity Issue.", "severity": "HIGH"}}

Wiz EKS Runtime Log

Overview

Table name: wiz_eks_runtime_logs

Wiz's EKS Runtime logs contain monitoring and security insights provided for Amazon Elastic Kubernetes Service (EKS) workloads. Wiz enhances cloud-native security by analyzing runtime logs to detect misconfigurations, vulnerabilities, and runtime threats within EKS clusters. These logs provide real-time visibility into containerized applications, helping organizations identify suspicious behavior, such as unauthorized access or privilege escalation. By integrating runtime logs with Wiz’s broader cloud security platform, teams can ensure compliance and maintain a robust security posture across Kubernetes environments.

Send data to Hunters

Hunters supports the collection of Wiz EKS Runtime logs via an intermediary S3 bucket.


To connect Wiz EKS Runtime logs:

  1. Route your Wiz EKS Runtime logs into an AWS S3 bucket.

  2. Once the export is completed and the logs are collected to S3, follow the steps in this section.

Expected format

The logs are expected to be in JSON format.

{
    "containerId": "asijf9ivojq23908ruvj139urionvwerv",
    "containerImageExternalId": "ecr-host.us-east-1.amazonaws.com##test@sha256:rv2k39r0gk230irong32r",
    "containerImageRef": "ecr-host.us-east-1.amazonaws.com/test@sha256:rv2k39r0gk230irong32r",
    "eventType": "Incoming connection",
    "exeAtime": 1551480292,
    "exeCtime": 1726715495,
    "exeInWritableLayer": false,
    "exeMtime": 1551480292,
    "exeSha1": "rk1g09rjg129irnog123rg12",
    "exeSize": 15252432,
    "kubernetesClusterExternalId": "kgjr0192jr9g12rgi01j2nrg",
    "kubernetesNamespace": "api-core",
    "lastSeenExe": "2024-10-13T23:46:22.817Z",
    "podName": "test-6d668fbd78-7l47n",
    "programName": "/usr/bin/test",
    "resourceExternalId": "test/g1r92ng91i2rngio12ngr",
    "sourceIP": "10.11.240.16",
    "sourcePort": 11211,
    "time": "2024-10-14T09:42:05.612Z"
}