
Wiz integration
Prioritize Wiz's cloud risks using exploit data and attack path context.
Integration details
Primary category
Cloud Security
Sync direction
Wiz ↔ Konvu
Findings are ingested from Wiz into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Wiz.
Status
Available
What is Wiz?
Wiz is an agentless cloud security platform providing CSPM, CWPP, and CIEM capabilities with graph-based risk analysis that connects vulnerabilities to identities, data, and internet exposure across AWS, Azure, and GCP.
Why connect Wiz to Konvu
- Layer exploitability analysis onto Wiz's toxic combinations to separate theoretical risks from exploitable vulnerabilities.
- Reduce CSPM finding fatigue by triaging misconfigurations based on whether they expose exploitable vulnerabilities.
- Document risk acceptance decisions for Wiz's critical attack paths with evidence of mitigating controls or low exploit probability.
How it works
Scan
Wiz produces findings from scans or assessments.
Ingest & enrich
Konvu ingests those findings and enriches them with code, configuration, and deployment context.
Assess exploitability
Konvu determines exploitability and recommended action with evidence attached.
Sync decisions
Based on your workflow, Konvu can push context, status updates, and severity adjustments back into Wiz.
Quick setup
Configure Wiz from the integrations list in Konvu.
- 1Go to /configuration/integrations in Konvu and choose Wiz.
- 2Authorize access and confirm the data sources you want to sync.
- 3Save the configuration to start syncing.
Sync direction
Wiz ↔ Konvu
Findings are ingested from Wiz into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Wiz.
More integrations
View allAWS Inspector
Focus Inspector scans on exploitable CVEs in EC2, Lambda, and container images.
AWS Security Hub
Prioritize Security Hub aggregated findings using centralized exploitability analysis.

Check Point CloudGuard
Filter CloudGuard posture findings to focus on exploitable security gaps.
Datadog Cloud Security
Prioritize Datadog CSM findings with environment-specific exploitability analysis.
Google Cloud Security Command Center
Triage SCC findings with exploit data across GCP assets and vulnerabilities.

Lacework
Focus Lacework anomaly alerts on hosts with exploitable vulnerabilities.