Wiz
Connect TigerIdentity to Wiz for cloud-aware access control, vulnerability-based policies, and risk-driven authorization decisions across your cloud environment.
Key Features
Cloud Posture Signals
Ingest cloud security posture from Wiz into access decisions for risk-aware authorization.
Vulnerability Context
Use vulnerability data from Wiz to enforce access policies based on resource security status.
Attack Path Analysis
Understand identity-related attack paths and toxic combinations detected by Wiz.
Risk-Based Access
Dynamically adjust access privileges based on Wiz risk scores and security findings.
Compliance Signals
Use compliance status from Wiz to enforce access control based on regulatory requirements.
Real-Time Alerts
Automatically respond to Wiz critical alerts by revoking or restricting access.
How It Works
Connect
Configure the Wiz connector with API credentials to access your cloud security platform.
Ingest Cloud Security Data
TigerIdentity continuously ingests cloud posture, vulnerabilities, compliance findings, and attack paths.
Enforce Cloud-Aware Policies
Use Wiz security signals in access policies to make risk-aware authorization decisions across cloud resources.
Configuration Example
connector:
type: wiz
name: "wiz-production"
config:
client_id: "${WIZ_CLIENT_ID}"
client_secret: "${WIZ_CLIENT_SECRET}"
api_endpoint: "https://api.wiz.io/graphql"
sync:
cloud_resources: true
vulnerabilities: true
misconfigurations: true
compliance_findings: true
attack_paths: true
toxic_combinations: true
events:
- issue.critical
- issue.high_severity
- compliance.violation
- attack_path.detected
- resource.exposed
policies:
- name: "block-critical-findings"
condition: "resource.wiz_risk_score > 80"
action: "deny_access"
- name: "restrict-exposed-resources"
condition: "resource.wiz_is_exposed == true"
action: "require_mfa"
mapping:
resource_attributes:
- wiz: cloudResourceId
tiger: cloud_resource_id
- wiz: riskScore
tiger: risk_score
- wiz: vulnerabilityCount
tiger: vulnerability_count
- wiz: complianceStatus
tiger: compliance_statusUse Cases
Cloud Risk-Based Access
Dynamically adjust access to cloud resources based on real-time security posture and risk scores from Wiz.
Vulnerability-Aware Governance
Block access to resources with critical vulnerabilities until remediation is complete.
Attack Path Prevention
Prevent toxic permission combinations and identity-related attack paths identified by Wiz.
Compliance-Driven Access
Enforce access policies based on compliance status, automatically restricting non-compliant resources.
Ready to connect Wiz?
See how TigerIdentity integrates with your Wiz environment in a personalized demo.
Schedule Your Demo