Cloud security is a complex undertaking. Contributing to that complexity is the need to monitor a constantly changing environment — without taking a toll on development teams or slowing them down.
This is one of the reasons that agentless scanning approaches to securing the cloud — approaches that are cloud native and API-based — have taken over the cloud security market, replacing legacy agent-based practices. At Wiz, we see this firsthand: from the pain of customers who want certainty and context, to the relief they feel when they gain that much-needed visibility. As the CISO of Fox said, “Wiz came into the picture to allow us to feel secure and confident in how fast we’re moving, even as our cybersecurity challenges keep changing.”
Agentless scanning approaches are based on assigning privileges to security vendors to access and scan an environment using cloud APIs. When selecting an agentless scanning technology, it’s important to assess the privileges assigned to the security vendor, to ensure least privileges and secure access to your data. In addition, it’s important to understand exactly which data is being shared with the vendor and how that data is shared across cloud environments.
At Wiz, this is the cornerstone of our scanning technology: ensuring that customer data remains private and secure, and that we take the “least-privilege access” approach. It’s one of the reasons many of the world’s largest organizations put their trust in Wiz, including 35% of Fortune 100 companies and some of the world’s largest financial institutions. These customers use Wiz to power their own mission-critical security programs.
In this post, we’ll outline our approach to secure agentless scanning. In upcoming posts, we'll provide a deeper dive into the unique security measures we leverage within the workload scanner environment.
Traditional cloud security posture management tools are focused on the configuration layer only. When we started Wiz, we understood that in order to analyze an end-to-end risk, we would need to analyze multiple layers, including network, identity, data, and the workloads themselves. This is why we built a workload scanner that is designed for the cloud and uses cloud APIs, instead of relying on older agent-based approaches.
The Wiz workload scanner is built to be secure, highly resilient, scalable, and multi-cloud. The Wiz workload scanner adheres to the following principles:
Wiz offers customers flexible deployment options to match the needs of any organization, at any size, in any environment. Organizations choose the deployment model that best suits their needs and have granular control to scan different environments using different scanning modes. In both deployment models, the scanner sends its results to the Wiz backend only after they are redacted and hashed. Hence Wiz stores only customer metadata and risk information, minimizing overall risk by ensuring that sensitive customer data is never sent to or stored in the Wiz backend.
Offering both deployment models supports our core belief that security must be straightforward, with seamless coverage and easy-to-use interfaces. By offering these options, Wiz allows customers to move quickly and tailor the right solution for each environment. Since reducing risk immediately is crucial, any delay puts the entire environment at risk; speed and simplicity are of the essence. Some customers may choose to mix-and-match, using the SaaS model for most environments and the hosted model for specific sensitive environments (for example, a PCI-controlled environment). Others may choose to scan everything immediately via SaaS to start reducing risk right away, and then, over time, migrate specific sensitive environments to the customer-hosted scanner. The flexibility of the design enables customers to optimize their security efforts to be as efficient as possible in reducing risk.
Customers can use Wiz as they need it, where they need it, at the speed of the cloud.