Wiz Threats
Wiz threat data is sent to RunReveal via a webhook configured in your Wiz environment using Automation Rules.

Setup
To setup your Wiz Threats source, start by creating the source in RunReveal to fetch your WebhookURL that you’ll configure in Wiz. You’ll be given a webhook after creating the source via a popup.
Configure Wiz Webhook Integration
In your Wiz environment, you’ll need to setup a webhook integration and create an Automation Rule to send threat data to RunReveal.
Create a Wiz Webhook Integration
To set up your webhook integration in Wiz, follow these steps:
- Navigate to your Wiz console
- In the left hand sidebar, navigate to Settings → Integrations
- In the upper right corner, click ”+ Add Integration” and select “Webhook”
- Name the integration something memorable, such as “RunReveal”
- Under “Scope”, if you wish to limit project access to RunReveal, assign the Webhook to a selected project. Otherwise, click “All Projects”
- Under “URL”, paste in your RunReveal webhook URL (you’ll get this when creating the source in RunReveal)
- Click “Save”

Setup Automation Rule
To create an automation rule in Wiz, follow these steps:
- In the left sidebar of your Wiz console, navigate to Policies → Automation Rules
- In the upper right corner, click ”+ Add Rule”
- Name the automation rule something memorable, such as “Wiz Detections to RunReveal”
- You may choose to add a description, such as “RunReveal Threat Forwarding Rule”
- Under “Scope”, if you wish to limit project access to RunReveal, assign the Automation rule to a selected project. Otherwise, click “All Projects”
- In the “Rule Conditions” section, set the “When” condition to “Detection is Created”
- In the “If” section, you may choose the severity levels you wish RunReveal to ingest. Set the “If” condition to “Severity is “Critical” or “High” or “Medium” (or your desired severity level)
- In the “Then” section, click ”+ Add action”
- Select “POST a Webhook”
- Select the webhook integration you created earlier (e.g., “RunReveal”)
- In the “Request Body” section, replace the default action template with the JSON template provided below
- Click “Add Action”
- Once returned to the New Automation Rule page, click “Save”
Once this step has been committed, Wiz will start sending its alerts directly to RunReveal.
Action Template
Configure your Automation Rule with the following action template:
{
"trigger": {
"source": "{{triggerSource}}",
"type": "{{triggerType}}",
"ruleId": "{{ruleId}}",
"ruleName": "{{ruleName}}",
"updatedFields": "{{#changedFields}}{{name}} field was changed from {{previousValuePrettified}} to {{newValuePrettified}} {{/changedFields}}",
"changedBy": "{{changedBy}}"
},
"threat": {
"id": "{{issue.id}}",
"title": "{{issue.enrichedMainDetection.rule.name}}",
"description": "{{issue.enrichedMainDetection.description}}",
"status": "{{issue.status}}",
"severity": "{{issue.severity}}",
"created": "{{issue.createdAt}}",
"resolutionNote": "{{issue.resolutionNote}}",
"projects": "{{#issue.projects}}{{name}}, {{/issue.projects}}",
"threatURL": "https://{{wizDomain}}/threats#~(issue~'{{issue.id}})",
"resolvedAt": "{{issue.resolvedAt}}",
"updatedAt": "{{issue.updatedAt}}",
"cloudPlatform" : "{{issue.entitySnapshot.cloudPlatform}}",
"cloudAccounts": {{issue.enrichedCloudAccounts}},
"cloudOrganizations": {{issue.enrichedCloudOrganizations}},
"actors": {{issue.enrichedThreatActors}},
"resources": {{issue.enrichedThreatResources}},
"tdrSources": "{{#issue.enrichedDetections}}{{rule.name}}, {{/issue.enrichedDetections}}",
"detectionIds": "{{#issue.enrichedDetections}}{{id}}, {{/issue.enrichedDetections}}",
"mitreTechniques": {{issue.enrichedThreatMitreTechniques}}{{^issue.enrichedThreatMitreTechniques}}null{{/issue.enrichedThreatMitreTechniques}},
"mitreTactics": {{issue.enrichedThreatMitreTactics}}{{^issue.enrichedThreatMitreTactics}}null{{/issue.enrichedThreatMitreTactics}},
"notes": "{{#issue.notes}}{{user.email}}-{{text}}, {{/issue.notes}}"
}
}