Wiz Cloud Security Intelligence Engine Integration User Guide
  • 30 Sep 2025
  • 25 Minutes to read
  • Dark
    Light
  • PDF

Wiz Cloud Security Intelligence Engine Integration User Guide

  • Dark
    Light
  • PDF

Article summary

Software Version
This guide applies to the Wiz Cloud Security Intelligence Engine App version 1.0.0.

Overview

The Wiz Cloud Security integration with ThreatConnect® leverages Wiz’s vulnerability scanning capabilities to help you identify, prioritize, and act on vulnerability findings in ThreatConnect.

The volume of the vulnerability findings in a dataset can be daunting. The Wiz Cloud Security Intelligence Engine App provides a simple, action-focused solution to this challenge. First, it ingests the Wiz Cloud Security set of Common Vulnerabilities and Exposures (CVE®) and related asset, source, and other data into a dedicated feed in ThreatConnect. The CVEs are created as Vulnerability Group objects and enriched with Attributes containing key metrics and other data from Wiz Cloud Security. For each ingested Vulnerability Group, the App creates, associates, and assigns a Workflow Case, ensuring that each CVE is tracked for further investigation and action in ThreatConnect. Each Case is enriched with a set of Attributes representing asset and other information, including severity count data from Wiz and links to corresponding sources in the Wiz Cloud Security UI. You can use this information to identify vulnerabilities with significant numbers of high-risk assets.

In addition to creating a feed of enriched vulnerability data from Wiz and corresponding Cases, the Wiz Cloud Security Intelligence Engine App can also cross-reference the CVE Identifiers (CVE-IDs) for the ingested Wiz Cloud Security dataset against the Tags on Groups and/or Indicators in a set of ThreatConnect owners. Each Group or Indicator with a matched Tag is then associated to the corresponding Vulnerability Group in the Source feed and to its Case and enriched with the Attributes with Wiz findings.

Dependencies

ThreatConnect Dependencies

  • Active ThreatConnect Application Programming Interface (API) key
  • ThreatConnect instance with 7.9.0 or newer installed
Note
All ThreatConnect dependencies will be provided by default to subscribing ThreatConnect Cloud customers. Customers on Dedicated Cloud and On-Premises instances can enable these settings on the Account Settings screen within their ThreatConnect instance.

Wiz Cloud Security Dependencies

  • Wiz subscription
  • Wiz Service Account with read:vulnerabilities permission
  • Wiz Client ID
  • Wiz Client Secret
    Important
    Each ThreatConnect Organization using the Wiz Cloud Security Intelligence Engine App on a ThreatConnect instance must have its own Wiz Client ID and Wiz Client Secret. Wiz authentication credentials cannot be shared between Organizations.

Application Setup and Configuration

The Wiz Cloud Security Intelligence Engine App must be deployed and configured for each Organization that will use it on a ThreatConnect instance. The configuration must be done by a user account in that Organization, either in the Feed Deployer by a user account with a System role of Administrator (“System Administrator”) in the Organization or, after feed deployment, on the Services screen by a user account in the Organization with an Organization role of Organization Administrator (“Organization Administrator”).

Warning
It is essential that you follow the installation and configuration procedure in this section carefully to preserve authentication security and data ownership and to ensure that the Wiz Cloud Security Intelligence Engine App will run properly for all Organizations that will use it on a ThreatConnect instance.

Follow these steps to install, deploy, and configure the Wiz Cloud Security Intelligence Engine App for an Organization on your ThreatConnect instance:

  1. Install the Wiz Cloud Security Intelligence Engine App. Skip this step if the Wiz Cloud Security Intelligence Engine App has already been installed on your ThreatConnect instance.
  2. Deploy the Wiz Cloud Security Intelligence Engine App.
  3. Configure the Wiz Cloud Security Intelligence Engine App.

Step 1: Install the Wiz Cloud Security Intelligence Engine App

Follow these steps to install the Wiz Cloud Security Intelligence Engine App via TC Exchange™:

  1. Log into ThreatConnect with a System Administrator account.
  2. From the SettingsSettings iconmenu on the top navigation bar, select TC Exchange Settings.
  3. Select the Catalog tab on the TC Exchange Settings screen.
  4. Locate the Wiz Cloud Security Intelligence Engine App on the Catalog tab and click InstallPlus icon_Dark bluein its Options column.
  5. In the Release Notes: Wiz Cloud Security Intelligence Engine window, click INSTALL.
    Warning
    Do not select the Allow all organizations checkbox. If you select this checkbox, then Organization Administrators who do not have a System role of Administrator will not have permission to edit and configure the Wiz Cloud Security Intelligence Engine App on the Services screen.
  6. After you install the Wiz Cloud Security Intelligence Engine App, the Feed Deployer will open automatically. Follow the procedure in Step 2 to deploy the Wiz Cloud Security Intelligence Engine App.

Step 2: Deploy the Wiz Cloud Security Intelligence Engine App

Warning
The Wiz Cloud Security Intelligence Engine App is deployed by a System Administrator using the Feed Deployer. The specific deployment instructions to follow in the Feed Deployer depend on whether the App is being deployed in the System Administrator’s Organization (that is, the Organization that their user account belongs to) or another Organization. You must follow the instructions in Table 1 that apply to your System Administrator account’s Organization and the Organization to which you are deploying the Wiz Cloud Security Intelligence Engine App.

Follow these steps to deploy the Wiz Cloud Security Intelligence Engine App to an Organization:

Note
Skip to the fourth step in this procedure if you just installed the Wiz Cloud Security Intelligence Engine App and are already viewing the Feed Deployer window.
  1. Log into ThreatConnect with a System Administrator account.
  2. From the SettingsSettings iconmenu on the top navigation bar, select TC Exchange Settings.
  3. Locate the Wiz Cloud Security Intelligence Engine App on the Installed tab. Then select Deploy from the Options ⋮ dropdown.
  4. Follow the instructions in Table 1 to fill out the fields in the Feed Deployer window for a deployment of the Wiz Cloud Security Intelligence Engine App’s Feed API Service.

     

    NameDescriptionRequired?
    Source Tab
    Sources to CreateEnter the name of the Source for the feed.
    Important
    Replace the default name (Wiz Cloud Security Threat Intelligence) with the name of a Source that is unique on your ThreatConnect instance and specific to the name of the Organization in which it is being deployed. The recommended format is Wiz Cloud Security Threat Intelligence - <Organization name> (e.g., Wiz Cloud Security Threat Intelligence - Demo Organization).
    Required
    OwnerSelect the Organization in which the Source will be created—that is, the Organization to which you are deploying the Wiz Cloud Security Intelligence Engine App.
    Important
    Workflow must be enabled in the selected Organization so that the Wiz Cloud Security Intelligence Engine App can create Workflow Cases in it. To enable Workflow, select the Enable Workflow checkbox on the Permissions tab of the Organization Information window for the Organization on the Organizations tab of the Account Settings screen (must be a System Administrator, Operations Administrator, or Accounts Administrator to perform this action).
    Required
    Activate DeprecationSelect this checkbox to allow confidence deprecation rules to be created and applied to Indicators in the Source.Optional
    Create AttributesSelect this checkbox to allow custom Attribute Types to be created in the Source.Optional
    Parameters Tab
    Launch ServerSelect tc-job as the launch server for the Service corresponding to the Feed API Service App.Required
    Tenant Data CenterSelect the regional data center for your Wiz account. Available choices include the following:
    • us1
    • us2
    • eu1
    • eu2
    • demo
    Note
    To identify your Tenant Data Center, log into Wiz, click the User icon at the upper right of your Wiz portal, and then select Tenant Info. On the left, click Data Center and Regions.
    Required
    EnvironmentSelect your Wiz environment. Available choices include the following:
    • app.wiz.io
    • app.wiz.us
    • gov.wiz.io
    Required
    Owners to Scan
    Important
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to an Organization that is not your user account’s Organization, do not make any selections from this dropdown. Instead, an Organization Administrator for the Organization will configure this parameter from the Services screen.
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to your Organization, then you should select owners from this dropdown if you want it to scan Groups and Indicators for Tags matching CVE-IDs from Wiz Cloud Security and associate those objects to ingested Vulnerability Groups and the Cases created for them. If you do not select any owners, then the Wiz Cloud Security Intelligence Engine App will only ingest vulnerability findings and create Cases.
    Select the owners in which the Wiz Cloud Security Intelligence Engine App will scan for Tags that match the CVE data ingested from Wiz. The owners in this dropdown are your user account’s Organization and the Communities and Sources in which your Organization is a member.
    Optional
    Group Types to Scan
    Important
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to an Organization that is not your user account’s Organization, do not make any selections from this dropdown. Instead, an Organization Administrator for the Organization will configure this parameter from the Services screen.
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to your Organization, then you should select the Group types from this dropdown that you want the Wiz Cloud Security Intelligence Engine App to scan.
    Select the Group types that the Wiz Cloud Security Intelligence Engine App will scan for Tags that match the CVE data ingested from Wiz Cloud Security.
    Optional
    Indicator Types to Scan
    Important
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to an Organization that is not your user account’s Organization, do not make any selections from this dropdown. Instead, an Organization Administrator for the Organization will configure this parameter from the Services screen.
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to your Organization, then you should select the Indicator types from this dropdown that you want the Wiz Cloud Security Intelligence Engine App to scan.
    Select the Indicator types that the Wiz Cloud Security Intelligence Engine App will scan for Tags that match the CVE data ingested from Wiz Cloud Security.
    Optional
    Assignee
    Important
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to an Organization that is not your user account’s Organization, do not make any selections from this dropdown. Instead, an Organization Administrator for the Organization will configure this parameter from the Services screen.
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to your Organization, then you should select an assignee from this dropdown. If you do not select an assignee, then the Cases created by Wiz Cloud Security Intelligence App in your Organization will be unassigned.
    Select the ThreatConnect user to assign to Workflow Cases created to track matched CVEs from Wiz Cloud Security. Cases will be created in your Organization. The Assignee dropdown options are all user accounts in your Organization.
    Optional
    Enable hasExploit filterSelect this checkbox to limit Tag matching only to CVEs that have a known exploit—that is, CVEs listed in the U.S. Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog. The checkbox is selected by default.
    Note
    If the Enable hasExploit filter checkbox is unselected, the daily run time of the Wiz Cloud Security Intelligence Engine App will be much longer than if the checkbox is selected.
    Optional
    Variables Tab
    Wiz Client IDEnter the Client ID for the Wiz Cloud Security account.
    Important
    The Wiz Client ID must be unique to the Organization for which the Wiz Cloud Security Intelligence Engine App is being deployed. If another Organization on your ThreatConnect instance has deployed the Wiz Cloud Security Intelligence Engine App, you may not use its Wiz Client ID for this Organization’s deployment.
    Required
    Wiz Client SecretEnter the Client Secret for the Wiz Cloud Security account.
    Important
    The Wiz Client Secret must be unique to the Organization for which the Wiz Cloud Security Intelligence Engine App is being deployed. If another Organization on your ThreatConnect instance has deployed the Wiz Cloud Security Intelligence Engine App, you may not use its Wiz Client Secret for this Organization’s deployment.
    Required
    Confirm Tab
    Run Feeds after deployment
    Important
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to an Organization that is not your user account’s Organization, do not select this checkbox. The feed should be run after an Organization Administrator for the Organization finishes the App’s configuration from the Services screen
    • If you are deploying the Wiz Cloud Security Intelligence Engine App to your Organization and have configured all parameters in the Feed Deployer, then selecting this dropdown is recommended.
    Select this checkbox to run the Wiz Cloud Security Intelligence Engine App immediately after the deployment configuration is complete (i.e., after you click DEPLOY on the Feed Deployer window).
    Optional
    Confirm Deployment Over Existing SourceThis checkbox will be displayed if the Source entered in the Sources to Create field has previously been deployed to the Organization selected in the Owner dropdown on the Source tab. Select this checkbox to confirm that you want the Wiz Cloud Security Intelligence Engine App to write data to the same Source. This process will create a new Service for the Wiz Cloud Security Intelligence Engine App. As such, it is recommended that you delete the old Service associated with the Wiz Cloud Security Intelligence Engine App after the new one is created.
    Important
    If you do not select this checkbox, the DEPLOY button will be grayed out, and you will not be able to deploy the Service. Return to the Source tab and enter a different Source or select a different Organization and then proceed through the tabs of the Feed Deployer window again.
    Optional
  5. If you configured the Wiz Cloud Security Intelligence Engine App for your Organization in the Feed Deployer, then your application setup and configuration are complete. You should not perform Step 3. If you configured the Wiz Cloud Security Intelligence Engine App for an Organization that is not your user account’s Organization in the Feed Deployer, then an Organization Administrator in that Organization must follow the procedure in Step 3 to complete configuration of the Wiz Cloud Security Intelligence Engine App’s Feed API Service.

Step 3: Configure the Wiz Cloud Security Intelligence Engine App

Warning
If a System Administrator in your Organization deployed the Wiz Cloud Security Intelligence Engine App for your Organization in the Feed Deployer in Step 2, then you should skip this section. If a System Administrator who is not in your Organization deployed the feed for the Wiz Cloud Security Intelligence Engine App for your Organization in the Feed Deployer in Step 2, then you must follow the instructions in this section to complete configuration of the Wiz Cloud Security Intelligence Engine App’s Feed API Service in this section.

Follow these steps to configure the Wiz Cloud Security Intelligence Engine App for your Organization:

  1. Log into ThreatConnect with an Organization Administrator account in the Organization for which you are configuring the Wiz Cloud Security Intelligence Engine App.
  2. From the Automation & Feeds dropdown on the top navigation bar, select Services.
  3. Locate the Feed Service for the Wiz Cloud Security Intelligence Engine App’s deployment for your Organization, which is likely formatted as Wiz Cloud Security Intelligence Engine - <Organization name>).
    Note
    See the “Frequently Asked Questions (FAQ)” section for instructions on what to do if you do not see a Feed Service for your Organization’s deployment of the Wiz Cloud Security Intelligence Engine App.
  4. Select Edit from the Options ⋮ dropdown.
    Note
    See the “Frequently Asked Questions (FAQ)” section for instructions on what to do if the Options ⋮ dropdown is not available.
  5. On Step 1 (Select) of the Edit Service window, click NEXT. Do not change any parameters.
  6. On Step 2 (Configure) of the Edit Service window, click NEXT.
    Important
    Do not change the value of the Launch Server parameter. It is not recommended to change the value of the API Path parameter. It is optional to change the values of the Enable Notifications, Email Address, and Max restart attempts on failure parameters. If your user account has a System role of Administrator, you will see a Permissions dropdown and an Allow all checkbox. If more than one Organization on your ThreatConnect instance is using the Wiz Cloud Security Intelligence Engine App, it is crucial that only your Organization is selected in the Permissions checkbox and that the Allow all checkbox is unselected.
  7. Fill out the fields on Step 3 (Parameters) of the Edit Service window (Figure 1) as follows:Figure 1_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

     

    • Wiz Client ID: Do not change the value of this parameter unless it is currently incorrect.
    • Wiz Client Secret: Do not change the value of this parameter unless it is currently incorrect.
    • Tenant Data Center: Do not change the value of this parameter unless it is currently incorrect.
    • Environment: Do not change the value of this parameter unless it is currently incorrect.
    • Owners to Scan: Select the owners in which the Wiz Cloud Security Intelligence Engine App will scan for Tags that match the CVE data ingested from Wiz. The owners in this dropdown are your user account’s Organization and the Communities and Sources in which your Organization is a member.
      Note
      You should select owners from this dropdown if you want the Wiz Cloud Security Intelligence Engine App to scan Groups and Indicators for Tags matching CVE-IDs from Wiz Cloud Security and associate those objects to ingested Vulnerability Groups and the Cases created for them. If you do not select any owners, then the Wiz Cloud Security Intelligence Engine App will only ingest vulnerability findings and create Cases.
    • Group Types to Scan: Select the Group types that the Wiz Cloud Security Intelligence Engine App will scan for Tags that match the CVE data ingested from Wiz Cloud Security.
    • Indicator Types to Scan: Select the Indicator types that the Wiz Cloud Security Intelligence Engine App will scan for Tags that match the CVE data ingested from Wiz Cloud Security.
    • Assignee: Select the ThreatConnect user to assign to Workflow Cases created to track matched CVEs from Wiz Cloud Security. Cases will be created in your Organization. The Assignee dropdown options are all user accounts in your Organization.
      Note
      If you do not select an assignee, then the Cases created by Wiz Cloud Security Intelligence Engine App in your Organization will be unassigned.
  8. Click SAVE to save the configuration for the Wiz Cloud Security Intelligence Engine App for your Organization.

Wiz Cloud Security Intelligence Engine UI

After installing, deploying, and configuring the Wiz Cloud Security Intelligence Engine App, you can access the Wiz Cloud Security Intelligence Engine user interface (UI), where you can manage data ingestion from Wiz Cloud Security into ThreatConnect.

Follow these steps to access the Wiz Cloud Security Intelligence Engine UI:

  1. Log into ThreatConnect with a System Administrator or an Organization Administrator account.
  2. From the Automation & Feeds dropdown on the top navigation bar, select Services.
  3. Locate and turn on the Wiz Cloud Security Intelligence Engine Feed Service.
    Important
    If there are multiple versions of the Wiz Cloud Service Intelligence Engine Feed Service on your ThreatConnect instance, make sure to access the Service configured for your Organization.
  4. Click the link in the Service’s API Path field. The Wiz Cloud Security Intelligence Engine UI will open in a new browser tab.

The following screens are available in the Wiz Cloud Security Intelligence Engine UI:

Dashboard

The Dashboard screen (Figure 2) provides an overview of the total number of Vulnerability Findings retrieved from Wiz Cloud Security, where a Vulnerability Finding is a CVE or an asset for a CVE. This number is a cumulative count of all Vulnerability Findings collected over the life of the App’s deployment in ThreatConnect.

Figure 2_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

 

Jobs

The Jobs screen (Figure 3) breaks down the ingestion of Wiz Cloud Security data into manageable Job-like tasks, displaying all processes that are pending, in progress, complete, and failed. The menu in a Job’s row provides the following options:

  • Details: View details for the Job, such as download, convert, and upload start and complete times and counts of downloaded and batched Groups and Indicators.
  • Download Files: Download metadata files for all Jobs and data (convert, download, and upload) files for completed Jobs.
  • Batch Errors: View errors that have occurred for the Job on the Batch Errors screen.

Figure 3_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

 

You can filter Wiz Cloud Security Intelligence Engine App Jobs by the following elements:

  • Job ID: Enter text into this box to search for a Job by its Job ID.
  • Job Type: Select Job types to display on the Jobs screen.
  • Status: Select Job statuses to display on the Jobs screen.

Add a Job

You can add ad-hoc Jobs on the Jobs screen. Follow these steps to create a request for an ad-hoc Job for the Wiz Cloud Security Intelligence Engine App:

  1. Click Add Job (Figure 3).
  2. Fill out the fields on the Add Job drawer (Figure 4) as follows:Figure 4_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

     

    • Start Time: (Optional) Enter the time at which the Job should start.
    • End Time: (Optional) Enter the time by which the Job should end.
  3. Click Submit to submit the request for the ad-hoc Job.

Tasks

The Tasks screen (Figure 5) displays all Tasks that may be part of a Job, including each step of the download, convert, and upload processes, as well as Tasks for the Wiz Cloud Security Intelligence Engine App, such as Monitor, Scheduler, and Cleaner. The current status (Idle, Paused, or Running), name, description, and heartbeat timeout length, in minutes, are displayed for each Task. The menu in a Task’s row provides the following options, depending on the Task’s status:

  • Run (idle and paused Tasks only)
  • Pause (idle and running Tasks only)
  • Resume (paused Tasks only)
  • Kill (running Tasks only)

Under the table is a dashboard where you can view runtime analytics.

Figure 5_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

 

Batch Errors

The Batch Errors screen (Figure 6) displays an overview of the batch error types that have occurred for Job requests. You can enter keywords to filter by Job ID.

Figure 6_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

 

Click on an error type to open a drawer containing a table with details on all batch errors of that type (Figure 7). You can enter keywords to filter by reason for error.

Figure 7_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

 

Data Mappings

The data mappings in Table 2 and Table 3 illustrate how data are mapped from Wiz Cloud Security API endpoints to the ThreatConnect data model.

Vulnerability Finding

ThreatConnect object type: Vulnerability Group

 

Wiz Cloud Security API FieldThreatConnect Field
idxid
name
  • Name/Summary
  • Tag: "Vulnerability: <name>"
CVEDescriptionDescription
firstDetectedAtExternal Date Added
lastDetectedAtExternal  Last Modified
severityAttribute: "Severity"
nvdSeverityAttribute: "NVD Severity"
weightedSeverityAttribute: "Weighted Severity"
impactScoreAttribute: "CVSS v3 Impact Score"
dataSourceNameAttribute: "Data Source Name"
hasExploitAttribute: "Has Exploit"
hasCisaKevExploitAttribute: "Has CISA KEV Exploit"
statusAttribute: "Status"
isHighProfileThreatAttribute: "Is High Profile Threat"
vendorSeverityAttribute: "Vendor Severity"
resolvedAtAttribute: "Resolved"
detectionMethodAttribute: "Detection Method"
locationPathAttribute: "Location Path"
resolutionReasonAttribute: "Resolution Reason"
epssSeverityAttribute: "EPSS Severity"
epssPercentileAttribute: "EPSS Percentile"
epssProbabilityAttribute: "EPSS Probability"
validatedInRuntimeAttribute: "Validated In Runtime"
layerMetadataAttribute: "Layer Metadata"
cvssv2/attackVectorAttribute: "CVSS v2 Attack Vector"
cvssv2/attackComplexityAttribute: "CVSS v2 Attack Complexity"
cvssv2/confidentialityImpactAttribute: "CVSS v2 Confidentiality Impact"
cvssv2/integrityImpactAttribute: "CVSS v2 Integrity Impact"
cvssv2/privilegesRequiredAttribute: "CVSS v2 Privileges Required"
cvssv2/userInteractionRequiredAttribute: "CVSS v2 User Interaction Required"
cvssv3/attackVectorAttribute: "CVSS v3 Attack Vector"
cvssv3/attackComplexityAttribute: "CVSS v3 Attack Complexity"
cvssv3/confidentialityImpactAttribute: "CVSS v3 Confidentiality Impact"
cvssv3/integrityImpactAttribute: "CVSS v3 Integrity Impact"
cvssv3/privilegesRequiredAttribute: "CVSS v3 Privileges Required"
cvssv3/userInteractionRequiredAttribute: "CVSS v3 User Interaction Required"
cnaScoreAttribute: "CNA Score"

ThreatConnect object type: Workflow Case

 

Wiz Cloud Security API FieldThreatConnect Field
name
  • Name (format: “Wiz - Finding - <name>”)
  • Tag: "Vulnerability: <name>"
portalUrlAttribute: "Source"
Severity Count Summary

Attribute: "Severity Count Summary"

See the “Frequently Asked Questions (FAQ)” section for more information.

Total Asset CountAttribute: "Total Asset Count"
Total Issues CountAttribute: "Total Issues Count"
Average Critical Severity CountAttribute: "Average Critical Severity Count"
Average High Severity CountAttribute: "Average High Severity Count"
Average Medium Severity CountAttribute: "Average Medium Severity Count"
Average Low Severity CountAttribute: "Average Low Severity Count"
Average Informational Severity CountAttribute: "Average Informational Severity Count"
Max Critical Severity CountAttribute: "Max Critical Severity Count"
Max High Severity CountAttribute: "Max High Severity Count"
Max Medium Severity CountAttribute: "Max Medium Severity Count"
Max Low Severity CountAttribute: "Max Low Severity Count"
Max Informational Severity CountAttribute: "Max Informational Severity Count"

Leveraging Wiz Cloud Security Vulnerability Findings in ThreatConnect

Wiz Cloud Security identifies a high volume of vulnerabilities at varying severity levels across a large number of cloud resources like virtual machines, container images, and serverless instances. The Wiz Cloud Security Intelligence Engine App ingests these vulnerabilities and their context into ThreatConnect, making it convenient to cross-reference them against your other ThreatConnect data and correlate them to known vulnerability details from other threat intelligence sources like Flashpoint® and VulnCheck.

ThreatConnect captures vulnerability findings from Wiz Cloud Security in two object types:

  • Vulnerability Group: Each Vulnerability Group object in the Source feed ingested from Wiz Cloud Security captures a known vulnerability (i.e., CVE) and, in the Vulnerability Group’s Attributes, its details and context.
  • Workflow Case. A Workflow Case is created in your Organization for each Vulnerability Group created in the Source feed ingested from Wiz Cloud Security. The Vulnerability’s assets identified by Wiz and related source information are captured in the Case’s Attributes.
    Note
    If the Enable hasExploit filter is turned on in the Wiz Cloud Security Intelligence Engine App’s configuration, then Cases will be created only for CVEs that have a known exploit—that is, CVEs listed in the U.S. Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog. This setup is recommended to limit the daily runtime of the Wiz Cloud Security Intelligence Engine App, as well as to limit the Cases created to the CVEs most likely to pose a threat to your organization.

Wiz Cloud Security Vulnerability Groups

The vulnerability findings ingested from Wiz Cloud Security are collected as Vulnerability Groups in the Source feed created in the Wiz Cloud Security Intelligence Engine App’s configuration. Each Vulnerability includes a set of Attributes representing all the available data on that Vulnerability from Wiz Cloud Security. You can use the unified view for Vulnerabilities introduced in ThreatConnect 7.10, including Common Vulnerability Scoring System (CVSS) and Known Exploited Vulnerabilities (KEV) data, to find additional threat intelligence context for a vulnerability finding from Wiz Cloud Security and use this information to determine whether your organization may be susceptible to it.

Wiz Cloud Security Workflow Cases

A Workflow Case is created for each ingested Vulnerability Group, allowing you to track and triage Wiz Cloud Security vulnerability findings for further research and operationalization. Each Case includes a set of Attributes aggregating information on every asset identified by Wiz Cloud Security as having that known vulnerability finding, including the Max and Average of each identified severity type (Critical, High, Medium, and Informational). In addition, each Case has a Severity Count Summary Attribute that summarizes all Wiz Cloud Security issue severity counts (Figure 8).

Figure 8_Wiz Cloud Security Intelligence Engine Integration User Guide_Software Vesrion 1.0.0

 

Recommended Wiz Cloud Security Intelligence Engine Workflow

The following steps are a recommended workflow for using the Wiz Cloud Security Intelligence Engine App to identify, analyze, and act on vulnerability findings in your ThreatConnect data:

  1. Identify a vulnerability that you want to investigate and resolve (e.g., CVE-2025-27363).
  2. Search for the Vulnerability Group for that vulnerability in ThreatConnect. For example, from the Search: Groups screen, filter the owners dropdown to only your Organization’s Source for the Wiz Cloud Security Intelligence Engine App, and then search for CVE-2025-27363.
  3. Open the Vulnerability Group’s Details screen.
  4. Explore the information in the unified view to identify any relevant CVSS, KEV, or other data that provide insight into the Vulnerability’s severity.
    Hint
    If the unified view is not your default view for the Vulnerability Details screen, select Unified View from the owner dropdown in the Details screen header.
  5. Select your Organization’s Source for the Wiz Cloud Security Intelligence Engine App in the owner dropdown in the Vulnerability Group’s Details screen header to view only that Source’s data on the Vulnerability Group.
  6. Select the Associations tab. The Case Associations card shows the associated Workflow Case created in your Organization for the Vulnerability.
    Hint
    If you do not see a Case Associations card on the Associations tab of the Details screen, make sure that your Organization’s Source for the Wiz Cloud Security Intelligence Engine App is selected in the owner dropdown in the screen’s header. The Case Associations card is not displayed on the Associations tab for the unified view.
  7. Click the link in the Name column for the associated Case to open the Case.
  8. Scroll to the Attributes card and, if necessary, increase the number of results shown per page.
  9. Find the Severity Count Summary Attribute. The Max and Average counts for the Critical severity level are the most important to resolve first. The Max count for the Critical severity level is the highest number of critical issues found on any cloud asset that has this vulnerability. The Average count for the Critical severity level is the average number of critical issues found on each asset that has this vulnerability. If the difference between the Max count and the Average count is less than 1, then Wiz has identified issues on nearly 100% of the assets, and it is crucial to address the vulnerability.
  10. Each Source Attribute has a Critical Severity Count. Find the Source Attributes with the highest Critical Severity Count, which represent the assets with the most critical issues found. Follow the link in these Attributes to the Wiz Cloud Security UI for more details.
    Hint
    The Max count for the Critical severity level in the table in the Severity Count Summary Attribute provides the highest Critical Severity Count for the Vulnerability. Search for all Source Attributes with that count. For example, if the Max count for the Critical severity level is 2, as in Figure 8, use the Find (Ctrl-F or command-F) feature to search for Critical Severity Count: 2 to identify all Source Attributes with the highest Critical Severity Count.
    Note
    The Wiz Cloud Security Intelligence Engine App stores the 50 most recent Source links to the Wiz Cloud Security UI.
  11. Take appropriate action on the cloud assets with Wiz-identified issues, such as by adding Tasks to the Case to carry out an investigation or remediation, or by closing the Case if no further action is required.
Hint
When viewing a Case created by the Wiz Cloud Security Intelligence Engine  App, you can find its associated Vulnerability Group in the ingested Source feed on the Case’s Associations card in the Vulnerabilities subsection of the Groups section. Click the link in the Summary column of the Vulnerabilities table view the Vulnerability’s Details drawer. Note that you cannot access the unified view for Vulnerabilities from this version of the Details drawer. Click View full detailsView full details_Details drawerto open the Vulnerability’s Details screen and access the unified view.
Hint
You can create dashboard query cards that use ThreatConnect Query Language (TQL) to query on Cases if you want to filter and track data on the Cases created by the Wiz Cloud Security Intelligence Engine App.

Frequently Asked Questions (FAQ)

How much data does the Wiz Cloud Security Intelligence Engine App ingest during its initial run?

The Wiz Cloud Security Intelligence Engine App ingests the past 30 days of vulnerability findings data from Wiz Cloud Security.


After its initial run, how frequently does the Wiz Cloud Security Intelligence Engine App ingest data?

The Wiz Cloud Security Intelligence Engine App runs on an hourly schedule. If any run takes longer than an hour to complete, which the initial run is likely to do, the next run will start an hour after the prior run completes and collect data from when the prior run started.


Why don’t I see a Service for the Wiz Cloud Security Intelligence Engine App for my Organization on the Services screen?

If you are an Organization Administrator attempting to configure a Service for the Wiz Cloud Security Intelligence Engine App for your Organization, but you do not see a Service for the App on the Services screen, then your System Administrator has not deployed the App for your Organization.


Why can’t I edit the Service for the Wiz Cloud Security Intelligence Engine App for my Organization on the Services screen? I see the Service, but the Options  dropdown is not there.

If you are an Organization Administrator attempting to configure a Service for the Wiz Cloud Security Intelligence Engine App for your Organization and you see the Service on the Services screen, but there is no Options ⋮ dropdown for the Service, a System Administrator has configured the Service to allow all Organizations permission to access the Service. If your user account does not have a System role of Administrator, Operations Administrator, or Accounts Administrator, then you will not be able to access the Service’s configuration because your System role does not provide you with the permissions for editing other Organizations’ access to the Service. To solve this problem, a System Administrator needs to edit the Service for your Organization’s deployment of the Wiz Cloud Security Intelligence Engine App and, on Step 2 (Configure), clear the Allow All checkbox, select only your Organization from the Permissions dropdown, and save the updated configuration.


ThreatConnect® is a registered trademark, and TC Exchange™ is a trademark, of ThreatConnect, Inc.
 Flashpoint® is a registered trademark of Flashpoint.
 CVE® is a registered trademark of The MITRE Corporation.

30093-01 EN Rev. A


Was this article helpful?