Skip to main content

Integrating with WIZ – Full Guide

Step-by-step guide to setting up and managing your WIZ integration with Hyver.

Updated over 3 months ago

1. Introduction

In this article, we’ll walk you through how to set up and manage your integration with WIZ. WIZ is a leading cloud security platform that continuously scans your cloud environments to detect misconfigurations, vulnerabilities, and potential risks. It helps organizations prioritize what matters most by focusing on the issues and vulnerabilities that pose real threats to business assets.

Cyera and Wiz Partner to Strengthen Cloud Security with Data Security  Posture Management

2. Prerequisites

Before starting the integration, it’s important to make sure you have everything prepared. You’ll need to provide a service account in WIZ with the appropriate permissions, as this account will be used to establish the connection between WIZ and Hyver. The integration relies on an authentication process — a secure way for Hyver to verify that it has permission to access data from your WIZ account. In practice, this means supplying valid credentials so Hyver can safely connect to WIZ and retrieve issues and vulnerabilities.

To get started, you must get the following from WIZ. Please follow the instructions in the WIZ documentation to get the following details*:

  • Client ID from WIZ

  • Client secret from WIZ

  • WIZ API URL (required to configure authentication in Hyver)

*Later in this article, we’ll see exactly how to configure each of these details in practice.

Required IP Addresses

For the integration to work smoothly, you may need to allow traffic from Hyver’s servers in your firewall or network configuration. This ensures that Hyver can securely connect to your environment and perform scans without being blocked.

Depending on your region and the type of scan, add the following IP addresses:

  • General IPs:

    • Europe18.198.79.197

    • America52.1.10.176, 35.171.70.87

  • IPs for Azure and AWS Scans:

    • Europe18.158.77.90

    • America34.206.252.13

In most cases, you only need to add the IPs relevant to your region and use case.

Multi-Company Dashboard and Integrations

This section explains how Hyver’s Multi-Company Dashboard works in general, and how integrations behave when used in a Multi-Company setup.

What is the Multi-Company Dashboard?

Hyver’s Multi-Company Dashboard is designed for large enterprises with multiple subsidiaries. It gives you:

  • A centralized view of cybersecurity risk across the entire organization

  • Key metrics like exposure, cost of breach, and maturity scores

  • The ability to switch between subsidiaries and view their individual data

  • Parent admins and power users can view aggregated and subsidiary-level risk, while detailed findings remain visible only to members of the specific subsidiary

  • Data that updates in real time

To enable Multi-Company, contact your CYE Technical Account Manager.

How Integrations Work in Multi-Company

Here’s the important part:

  • Integrations are created only at the subsidiary level

  • Findings from an integration appear only in that subsidiary’s dashboards and reports

  • Parent companies cannot create integrations — they can only view the aggregated results

Best Practices for Combining Integrations with Multi-Company

To get the most out of Multi-Company with integrations, we recommend:

  • Each subsidiary should create its own integration, using credentials that only grant access to data relevant to that subsidiary

  • In some cases, it’s useful to also have a dedicated “General” company, which holds findings that apply to the entire enterprise and cannot be tied to a single subsidiary

  • The parent company then combines these insights and metrics from all subsidiaries and the General company — but remember, integrations cannot be connected directly to the parent company.


3. Configuring on the WIZ Side

Retrieve the Authentication Details from WIZ

Connection Details from WIZ

At this stage, we’ll focus on how to obtain the connection details you’ll need in Hyver, as outlined in the prerequisites:

  • Client ID from WIZ

  • Client Secret from WIZ

  • WIZ API URL (required for authentication in Hyver)

Client ID and Client Secret

To generate these, you’ll first need to create a service account in WIZ. Here’s how:

  1. Log in to WIZ with a Project Admin role.

  2. Open the Settings menu (top-right corner).

  3. In the left-hand menu, select Service Accounts.

  4. Click Add Service Account.

  5. Enter a name for the service account.

  6. Under Type, choose Custom Integration (GraphQL API).

  7. From the Project drop-down, select the project(s) containing the resources you want to sync issues from.

  8. In the API Scopes, select read:issues only.

  9. Click Add Service Account at the bottom.

Once complete, WIZ will display the Client ID and Client Secret.

WIZ API URL

To find the API URL in WIZ:

  1. Log in to your WIZ account.

  2. Click the User Profile icon (top-right corner) and select User Settings.

  3. From the left-hand menu, select Tenant.

The API Endpoint URL will be displayed on this page.

Assign the correct permissions

To enable the integration, you’ll need to assign the correct permissions to the Hyver service account in WIZ. These permissions ensure that Hyver can securely access the issues and vulnerabilities data required for analysis. Without the right permissions, the integration will not function properly.

Configure a User in WIZ with These Permissions:

  • create:reports

  • read:reports

  • update:reports

  • read:vulnerabilities

  • read:issues

  • read:threat_issues

Important Limitation:

To ensure data collection works properly, the WIZ service account used for the integration must have access to all projects in your WIZ account. If the account is restricted to only certain projects, Hyver’s data requests may fail, and findings will not be retrieved.

Also, ensure that you leave the Projects optional field empty:


4. Configuring in Hyver

On the Hyver side, completing the integration is a simple and straightforward process. All you need to do is take the relevant details from WIZ and enter them into the corresponding fields in Hyver. Once these fields are filled in correctly, the connection between the two platforms is established and ready to use.

Now, authenticate to WIZ:

  1. Go to Settings > Integrations and click Add integration on the WIZ integration tile:

  2. Enter an integration name.

  3. Enter the WIZ API URL.

  4. Enter the client ID from WIZ.

  5. Enter the client secret from WIZ.

Then:

  1. Click Verify connection to test the connection to WIZ.

  2. Click Save to save your configuration. This also tests the connection by default when you save.


5. Viewing Results

Once the integration is up and running, the findings collected from WIZ appear on the Findings page in Hyver. From there, you can review the issues and vulnerabilities detected, track their status, and explore how they connect to your business assets. This view lets you easily manage and prioritize findings as part of your overall risk analysis.

Search for Findings by Source

Use the findings filter to filter by various finding fields such as sources or creation date:

For example:

  • Select a source such as WIZ (if it exists).

  • Add a creation date filter to refine the output.

If you do not see findings populated after some time, please verify connectivity to Wiz.

Collected Endpoints in WIZ

When Hyver integrates with WIZ, it collects data from specific WIZ “endpoints.” These endpoints are simply categories of information that WIZ makes available through its API. For this integration, the relevant endpoints are:

  1. Vulnerabilities (VM, container, container image, repo branch, serverless)
    These are security weaknesses detected in different types of cloud resources. For example:

    • Virtual machines (VMs): traditional compute resources in the cloud.

    • Containers and container images: lightweight application packages and the base images they’re built from.

    • Repo branches: branches of source code repositories, where vulnerabilities in dependencies may appear.

    • Serverless: functions or applications running without dedicated servers, which can also contain security flaws.

  2. Issues
    These are broader security findings reported by WIZ, often covering misconfigurations or risks that aren’t strictly software vulnerabilities. For example, overly permissive access settings or unencrypted storage.


6. Auto-Fix Statuses

When possible, Hyver automatically updates the status of remediation assets (such as servers or settings) once they are fixed or removed in the source system — no manual updates needed. The status of a finding is determined by the status of its remediation assets. This integration supports Auto-fix for WIZ issues findings only (which make up most of the findings). It does not support Auto-fix for WIZ vulnerabilities.


7. Types of Fetched Entities

In this section, we will understand what types of findings are involved in the WIZ integration. We will also review the mapping logic behind the integration mechanism, and see how Hyver handles the findings it receives from WIZ.

WIZ Findings

WIZ vulnerabilities and misconfigurations are added as findings in Hyver. Findings are added to the Integration with external tools engagement.

Mapping Logic

  • Some WIZ findings are mapped to findings in Hyver.

  • Some are added directly to Hyver.

Hyver maps CVEs (from the "vulnerabilities" API) from WIZ to the Usage of Outdated and Vulnerable Technologies finding.

How Hyver Handles WIZ Findings (and Why)

Hyver’s goal is to map incoming findings to its own taxonomy whenever possible.

  • CVEs retrieved via WIZ’s “vulnerabilities” API are mapped to the Usage of Outdated and Vulnerable Technologies finding in Hyver.

    • This category is intended to centralize all CVEs across the organization.

  • Findings from WIZ’s “issues” API are:

    • Ingested directly

    • Enriched with NIST mapping

When no direct Hyver match exists, the finding is still useful by aligning it with the NIST Cybersecurity Framework.

  • Adding NIST mapping helps findings contribute to your organization's:

    • Maturity score

    • Overall risk analysis

This approach:

  • Maintains consistency across dashboards, risk models, and reports

  • Ensures every finding is actionable

You should continue to follow Hyver's Recommended Priority for triaging findings.
The prioritization logic remains consistent—regardless of whether a finding is mapped to a native Hyver category or added directly from WIZ.


8. Deleting the Integration

You can delete or edit this integration:

Deleting the Integration

Following the setup of an integration, you can delete an integration:

  • Click the Delete integration button, and confirm that you want to delete the integration.

When you delete an integration in Hyver, the connection is immediately terminated. No new data from the deleted integration is ingested or processed, and the existing data in Hyver is retained.

Note on Deleting the WIZ Integration:

WIZ is a unique integration in that it leaves behind what we call a "residue" even after it’s been deleted from Hyver. Specifically, this refers to two reports that were created as part of the data collection process.

Hyver gathers information from WIZ using these two reports, which are generated and stored on the WIZ side, under the Reports section. The reports are named:

  • Hyver Vuln report

  • Hyver Issues report

Once you delete the integration from Hyver, you can go ahead and delete these reports from WIZ if you choose to — but this step is entirely optional.

Not deleting the reports has no impact or consequences, but it’s still useful to be aware that they remain in your WIZ account unless removed manually.

Editing the Integration

Following the setup of an integration, you can edit an integration:

  • Click the Edit Integration button, make changes, and click Save.


9. FAQ

  • If a WIZ integration finding is manually changed from Open to Fixed or Acceptable Risk, what status will it have after the next run?
    The finding’s status will be automatically updated during the next run.

  • If a remediation asset in the WIZ integration is manually changed from Open to Fixed or Acceptable Risk, what status will it have after the next run?
    The remediation asset’s status will be automatically updated during the next run.


Wrap-up

In this guide, we walked through the full process of integrating WIZ with Hyver — from setting up the connection with the correct service account and permissions, to understanding the specific data collected. We also covered what happens when the integration is deleted and what to do with the remaining reports on the WIZ side. With everything in place, your integration should run smoothly and support your security analysis with accurate, relevant data.

Did this answer your question?