The Wiz Code integration enables security and compliance teams to connect Drata with Wiz for automated access to resource, vulnerability, and issue data. It connects Drata to Wiz Code so your team can continuously monitor cloud environments and gather compliance evidence from vulnerability scans and configurations.
Key Capabilities
Automated Data Retrieval: Connect to Wiz’s API to retrieve information about resources, vulnerabilities, and issues.
Granular Access Control: Configure service accounts with scoped permissions to limit data exposure to specific projects.
Secure Authentication: Authenticate through OAuth2 credentials (Client ID and Client Secret) for secure communication between Drata and Wiz.
Prerequisites & Data Access
You must have one of the following Drata roles: Admin, Information Security Lead, DevOps Engineer, or Workspace Manager.
Access to the Wiz dashboard and permission to create Service Accounts.
Required Wiz permissions:
read:resourcesread:vulnerabilitiesread:issues
Base URL: Wiz Code Base URL (API endpoint in the format such as
https://api.us44.app.wiz.io/graphql)
https://api.<TENANT_DATA_CENTER>.<ENVIRONMENT>
Client ID and Client Secret from Wiz (OAuth2 credentials).
Record the Client Secret securely. It cannot be viewed again after the credential window is closed.
Permissions & Data Table
Permission / Scope | Why It’s Needed | Data Accessed (Read Only) |
| Allows Drata to retrieve the list of assets or resources scanned. | Asset and resource metadata. |
| Enables Drata to import vulnerability findings. | Vulnerability data including unique ID, title, description, severity level, discovery date, status (open/resolved), affected resource, and remediation due date. |
| Allows Drata to access related issue or ticket information. | Issue or ticket data such as issue ID, title, description, status, assignee, creation and update timestamps, due date, and link (URL) to the ticket. |
Step-by-Step Setup
Step 1: Obtain Wiz Code Base URL
In the Wiz dashboard, navigate to your user profile.
Locate and copy the API Endpoint URL.
Step 2: Obtain Client ID and Client Secret
In the Wiz dashboard, go to Settings → Service Accounts.
Click Add Service Account.
Enter a name for the new service account.
(Optional) Narrow the service account’s scope to specific projects.
Select the following permissions:
read:resourcesread:vulnerabilitiesread:issues
Click Add Service Account.
Copy the Client ID and Client Secret, and store the Client Secret securely (it cannot be viewed again once the window closes).
Complete the Connection
In Drata’s Connections page, search for the Wiz Code connection and then:
Select the following configurations:
Severity of vulnerabilities: Choose the severity levels you want to import (Critical, High, Medium, Low).
Date: Select the date from which vulnerabilities should be pulled.
Enter the following information:
Drata Field | Wiz Code Value |
Base URL |
|
Client ID | Your Wiz OAuth2 Client ID |
Client Secret | Your Wiz OAuth2 Client Secret |
For steps on accessing and using the Connections page in Drata, refer to The Connections Page in Drata.
