Q1. What do security teams and administrators need to know about the security risks associated with cloud middleware? How should they be using the Cloud Middleware Dataset project that Wiz unveiled recently?
It is essential for cloud organizations to treat cloud middleware software and study its potential risks, as they typically do when installing third-party software. Each cloud middleware software presents different risks. Some expose cloud users to local privilege escalation exploits, and in some cases, cloud middleware software even puts cloud customers at risk for remote command execution by malicious actors. In the absence of visibility into this software, cloud users cannot assess the risk of the cloud middleware installed in their environment. Each cloud service implicitly installs different cloud middleware software, making it tough to track and detect cloud middleware risks in cloud environments.
To immediately address those risks, Wiz recently launched a community-driven cloud middleware dataset detailing the “secret” agents installed by the different cloud services. This way, cloud customers can use this dataset to gain better visibility to cloud middleware software. The next time a new vulnerability pops up in cloud middleware software, customers will immediately know if, and how, they are affected. Mapping all the agents that cloud providers are installing is not an easy task. We ask that the security community help us by contributing and keeping the database updated. It can be found by visiting github.com/wiz-sec/cloud-middleware-dataset.
Q2. Wiz has attracted some $600 million from various funding rounds so far, including one which valued the company at $6 billion. What is the company doing that has attracted so much market attention?
Cloud security is broken. Solutions today are complex, fragmented, and generate too many alerts for security teams. This foundational problem is one that we have seen arise time and again, and why my co-founders and I decided to build Wiz: to provide a cloud security solution that delivers total visibility and lets security teams focus on the real risks. This vision has resonated with customers.
In just two over two years, Wiz has grown to protect hundreds of organizations, including 20 percent of the Fortune 500. And as a result, Wiz has become one of the fastest-growing cybersecurity and SaaS companies in the world. This success can be attributed to, among other things, the fact that Wiz provides visibility and context to cloud risks no other product can. Organizations can deploy Wiz in minutes across all major cloud platforms to seamlessly scan their workloads via a completely agentless, API-centered approach, giving organizations nearly instant coverage of their entire cloud environment – with no blind spots.
Wiz works across the most complex cloud environments to show critical risks and toxic combinations that should be prioritized immediately. It gives developers who are responsible for risk the capabilities to resolve issues before they hit production, helping bridge the gap between cloud builders and cloud defenders. In fact, Wiz is mostly used by engineers, as opposed to members of security teams. At the heart of what sets Wiz apart is the Wiz Security Graph. As opposed to long, contextless lists of siloed alerts and risks, the Wiz Security Graph displays all cloud resources along with their fields and interconnections in near real-time to correlate and find attack vectors no other technology can. It allows security and developer teams to focus on real risks.
Q3. What do you expect customers would want to see and hear from Wiz at Black Hat USA 2022?
The cloud is the most secure environment for organizations but needs to be used correctly. Much of the risk that comes from the cloud is the result of complexity caused by multiple clouds and architectures and thousands of technologies in customer environments. In turn, it’s difficult to operationalize a holistic cloud security strategy, causing gaps in visibility and a lengthy time to resolve critical risks. This doesn’t bode well for helping organizations prevent the top threats in the cloud, namely supply chain risk, including CSP or user-installed software, as well as user-granted third-party permissions.
Secrets exposure is another top risk we commonly see. Attackers can capitalize on secrets that are used insecurely or left in code to gain access to sensitive data, highly privileged roles, product environments, and so on. Breaches via exposed databases are nothing new, but we continue to see the same mistakes that make these possible, such as misconfigurations of databases and storage services, exposure of internal services to the internet, and overly permissive identify policies. We’ve seen a rise in threat actors that target cloud accounts and workloads and leverage cloud native features. In addition, over the past year, Wiz researchers have discovered critical, cross-tenant vulnerabilities in cloud service providers that make clear that platforms still have work to do to ensure they stay ahead of attackers and harden their architectures.
To help cloud customers track, remediate, and gain better visibility into cloud vulnerabilities, researchers from Wiz and others in the community recently launched cloudvulndb.org. The community-driven site catalogs CSP security issues in a new format and lists the exact steps CSP customers can take to detect or prevent these issues in their own environments. The site paves the way to an industry-wide, centralized cloud vulnerability database.