{"id":4498,"date":"2025-08-09T21:52:09","date_gmt":"2025-08-09T21:52:09","guid":{"rendered":"https:\/\/uplatz.com\/blog\/?p=4498"},"modified":"2025-08-09T21:52:09","modified_gmt":"2025-08-09T21:52:09","slug":"wiz-pocket-book","status":"publish","type":"post","link":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/","title":{"rendered":"Wiz Pocket Book"},"content":{"rendered":"<p><!-- Wiz Pocket Book \u2014 Uplatz (50 Cards, Wide Layout, Readable Code, Scoped Styles) --><\/p>\n<div style=\"margin:16px 0;\">\n<style>\n    .wp-wiz-pb { font-family: Arial, sans-serif; max-width: 1320px; margin:0 auto; }\n    .wp-wiz-pb .heading{\n      background: linear-gradient(135deg, #e0f2fe, #ecfdf5); \/* light blue -> light green *\/\n      color:#0f172a; padding:22px 24px; border-radius:14px;\n      text-align:center; margin-bottom:18px; box-shadow:0 8px 20px rgba(0,0,0,.08);\n      border:1px solid #cbd5e1;\n    }\n    .wp-wiz-pb .heading h2{ margin:0; font-size:2.1rem; letter-spacing:.2px; }\n    .wp-wiz-pb .heading p{ margin:6px 0 0; font-size:1.02rem; opacity:.9; }<\/p>\n<p>    \/* Wide, dense grid *\/\n    .wp-wiz-pb .grid{\n      display:grid; gap:14px;\n      grid-template-columns: repeat(auto-fill, minmax(400px, 1fr));\n    }\n    @media (min-width:1200px){\n      .wp-wiz-pb .grid{ grid-template-columns: repeat(3, 1fr); }\n    }<\/p>\n<p>    .wp-wiz-pb .section-title{\n      grid-column:1\/-1; background:#f8fafc; border-left:8px solid #06b6d4; \/* cyan *\/\n      padding:12px 16px; border-radius:10px; font-weight:700; color:#0f172a; font-size:1.08rem;\n      box-shadow:0 2px 8px rgba(0,0,0,.05); border:1px solid #e2e8f0;\n    }\n    .wp-wiz-pb .card{\n      background:#ffffff; border-left:6px solid #06b6d4;\n      padding:18px; border-radius:12px;\n      box-shadow:0 6px 14px rgba(0,0,0,.06);\n      transition:transform .12s ease, box-shadow .12s ease;\n      border:1px solid #e5e7eb;\n    }\n    .wp-wiz-pb .card:hover{ transform: translateY(-3px); box-shadow:0 10px 22px rgba(0,0,0,.08); }\n    .wp-wiz-pb .card h3{ margin:0 0 10px; font-size:1.12rem; color:#0f172a; }\n    .wp-wiz-pb .card p{ margin:0; font-size:.96rem; color:#334155; line-height:1.62; }<\/p>\n<p>    \/* Color helpers *\/\n    .bg-blue { border-left-color:#0ea5e9 !important; background:#eef6ff !important; }\n    .bg-green{ border-left-color:#10b981 !important; background:#f0fdf4 !important; }\n    .bg-amber{ border-left-color:#f59e0b !important; background:#fffbeb !important; }\n    .bg-violet{ border-left-color:#8b5cf6 !important; background:#f5f3ff !important; }\n    .bg-rose{ border-left-color:#ef4444 !important; background:#fff1f2 !important; }\n    .bg-cyan{ border-left-color:#06b6d4 !important; background:#ecfeff !important; }\n    .bg-lime{ border-left-color:#22c55e !important; background:#ecfdf5 !important; }\n    .bg-orange{ border-left-color:#f97316 !important; background:#fff7ed !important; }\n    .bg-indigo{ border-left-color:#6366f1 !important; background:#eef2ff !important; }\n    .bg-emerald{ border-left-color:#059669 !important; background:#ecfdf5 !important; }\n    .bg-slate{ border-left-color:#334155 !important; background:#f8fafc !important; }<\/p>\n<p>    \/* Utilities & code *\/\n    .tight ul{ margin:0; padding-left:18px; }\n    .tight li{ margin:4px 0; }\n    .mono{ font-family: ui-monospace, SFMono-Regular, Menlo, Monaco, Consolas, monospace; }\n    .wp-wiz-pb code{ background:#f1f5f9; padding:0 4px; border-radius:4px; border:1px solid #e2e8f0; }\n    .wp-wiz-pb pre{\n      background:#f5f5f5; color:#111827; border:1px solid #e5e7eb;\n      padding:12px; border-radius:8px; overflow:auto; font-size:.92rem; line-height:1.55;\n    }\n    .q{font-weight:700;}\n    .qa p{ margin:8px 0; }\n  <\/style>\n<div class=\"wp-wiz-pb\">\n<div class=\"heading\">\n<h2>Wiz Pocket Book \u2014 Uplatz<\/h2>\n<p>50 in-depth cards \u2022 Wide layout \u2022 Readable examples \u2022 20-question interview Q&amp;A included<\/p>\n<\/p><\/div>\n<div class=\"grid\">\n      <!-- ===================== SECTION 1: FOUNDATIONS (1\u201310) ===================== --><\/p>\n<div class=\"section-title\">Section 1 \u2014 Foundations<\/div>\n<div class=\"card bg-cyan\">\n<h3>1) What is Wiz?<\/h3>\n<p>Wiz is a cloud security platform that builds a unified graph across cloud resources, identities, network paths, runtime signals, and code artifacts to prioritize risks and prevent breaches. It supports AWS, Azure, GCP, Kubernetes, and more.<\/p>\n<pre><code class=\"mono\">Core pillars: CSPM, CNAPP, CIEM, CWPP, Container\/K8s, IaC scanning, SBOM\/VEX.<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-blue\">\n<h3>2) Wiz Security Graph<\/h3>\n<p>All discoveries (assets, vulns, identities, secrets, configs, exposures) are modeled as nodes\/edges. Queries (WSG\/WQL) traverse relationships to surface toxic combinations, e.g., internet \u2192 VM \u2192 secret \u2192 DB.<\/p>\n<pre><code class=\"mono\"># Conceptual\r\nFIND resources WHERE exposed_to = \"internet\" AND has_secret = true AND can_reach = \"db\"<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-green\">\n<h3>3) Connectors &#038; Coverage<\/h3>\n<p>Connect cloud accounts\/subscriptions\/projects via read-only APIs, optional agentless snapshot scanning, and integrations for EDR, ticketing, SIEM. Coverage spans IaaS\/PaaS\/K8s\/Serverless.<\/p>\n<pre><code class=\"mono\">Typical setup: AWS Org, Azure Tenant, GCP Org + K8s clusters + registries<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-amber\">\n<h3>4) Agentless + Runtime<\/h3>\n<p>Agentless analysis inspects disk snapshots, images, and metadata; optional runtime sensors add process\/behavior context for higher-fidelity risk.<\/p>\n<pre><code class=\"mono\">Signals: packages, secrets, keys, CVEs, misconfigs, malware indicators<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-violet\">\n<h3>5) Risk = Context<\/h3>\n<p>Wiz prioritizes by reachability, exploitability, blast radius, data sensitivity, and business tags\u2014not just CVSS scores.<\/p>\n<pre><code class=\"mono\">Priority = (Exposure \u00d7 Identity Power \u00d7 Data Sensitivity) - Compensating Controls<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-rose\">\n<h3>6) Projects, Folders &#038; RBAC<\/h3>\n<p>Group assets by business unit or environment. Use granular roles for read\/triage\/fix. Map to SSO groups for least-privilege access.<\/p>\n<\/p><\/div>\n<div class=\"card bg-indigo\">\n<h3>7) Findings, Issues, Tasks<\/h3>\n<p>Raw findings (signals) become issues after policy evaluation. Tasks route to owners via Jira\/ServiceNow\/Asana with SLA and auto-close on fix.<\/p>\n<\/p><\/div>\n<div class=\"card bg-orange\">\n<h3>8) Benchmarks &#038; Frameworks<\/h3>\n<p>Built-in policies align to CIS, NIST, PCI, ISO, SOC2, HIPAA, and cloud provider best practices. Map controls to compliance views.<\/p>\n<\/p><\/div>\n<div class=\"card bg-lime\">\n<h3>9) Tags &#038; Business Context<\/h3>\n<p>Sync cloud tags\/labels and CMDB metadata to enrich the graph. Use tags (owner, app, tier, data_class) to scope policies and SLAs.<\/p>\n<\/p><\/div>\n<div class=\"card bg-emerald\">\n<h3>10) Q&amp;A \u2014 \u201cWhy Wiz vs classic CSPM?\u201d<\/h3>\n<p><span class=\"q\">Answer:<\/span> Classic CSPM flags misconfigs in isolation. Wiz adds identity, network, vuln, and data context in a single graph to prioritize exploitable attack paths and reduce noise.<\/p>\n<\/p><\/div>\n<p>      <!-- ===================== SECTION 2: DISCOVERY & QUERY (11\u201320) ===================== --><\/p>\n<div class=\"section-title\">Section 2 \u2014 Discovery, Queries &#038; Attack Paths<\/div>\n<div class=\"card bg-cyan\">\n<h3>11) Query Language (WQL\/Graph)<\/h3>\n<p>Use UI query builder or text to search the graph. Queries can filter by exposure, identity permissions, CVEs, secrets, networks, and data stores.<\/p>\n<pre><code class=\"mono\">FIND vm\r\nWHERE exposed_to = \"internet\"\r\nAND has_cve(severity &gt;= \"high\")\r\nAND path_to(datastore where classification=\"sensitive\")<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-blue\">\n<h3>12) Attack Path Explorer<\/h3>\n<p>Visualize multi-hop paths (entry \u2192 lateral move \u2192 crown jewels). Break paths by removing exposure, revoking permissions, or patching.<\/p>\n<pre><code class=\"mono\">Path example: 0.0.0.0:22 \u2192 EC2 \u2192 instance profile \u2192 S3 (PII)<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-green\">\n<h3>13) Saved Searches &#038; Boards<\/h3>\n<p>Pin critical queries and build boards per team (e.g., \u201cInternet-exposed + Secret present\u201d, \u201cHigh-priv identities on compute\u201d).<\/p>\n<\/p><\/div>\n<div class=\"card bg-amber\">\n<h3>14) Drilldown &#038; Root Cause<\/h3>\n<p>From any issue, open graph drilldown to see why it\u2019s risky: which security groups, routes, identity roles, and secrets contribute.<\/p>\n<\/p><\/div>\n<div class=\"card bg-violet\">\n<h3>15) Data Classification<\/h3>\n<p>Discover sensitive data stores and link them to compute paths. Raise priority when reachable from exposed assets.<\/p>\n<pre><code class=\"mono\">FIND datastore WHERE classification IN (\"PCI\",\"PHI\",\"PII\") AND reachable_from(exposed)<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-rose\">\n<h3>16) Custom Fields &#038; Enrichment<\/h3>\n<p>Ingest business inventory (owners, tiers, RTO\/RPO) via API to improve triage and routing.<\/p>\n<\/p><\/div>\n<div class=\"card bg-indigo\">\n<h3>17) Exceptions &#038; Waivers<\/h3>\n<p>Document justified exceptions with expiry and compensating controls. Auto-review on expiration.<\/p>\n<\/p><\/div>\n<div class=\"card bg-orange\">\n<h3>18) Alerting &#038; Integrations<\/h3>\n<p>Push real-time alerts to Slack\/MS Teams; stream findings to SIEM (e.g., Splunk) for correlation with logs.<\/p>\n<\/p><\/div>\n<div class=\"card bg-lime\">\n<h3>19) KPIs &#038; Trends<\/h3>\n<p>Track MTTR, open issues by severity, % internet-exposed, identity risk counts, and compliance posture over time.<\/p>\n<\/p><\/div>\n<div class=\"card bg-emerald\">\n<h3>20) Q&amp;A \u2014 \u201cWhat makes a \u2018toxic combo\u2019?\u201d<\/h3>\n<p><span class=\"q\">Answer:<\/span> Multiple low\/medium issues that combine into exploitable risk, e.g., public bucket + access keys in VM + overprivileged role enabling data exfiltration.<\/p>\n<\/p><\/div>\n<p>      <!-- ===================== SECTION 3: VULNS, SECRETS, IMAGES, K8s (21\u201330) ===================== --><\/p>\n<div class=\"section-title\">Section 3 \u2014 Vulnerabilities, Secrets, Containers &#038; Kubernetes<\/div>\n<div class=\"card bg-cyan\">\n<h3>21) Vulnerability Management<\/h3>\n<p>Agentless scanning of OS packages, language deps, images, and functions. Prioritize by exploitability and exposure.<\/p>\n<pre><code class=\"mono\">FIND vm WHERE cve IN (\"CVE-2023-XXXXX\") AND exposed_to=\"internet\"<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-blue\">\n<h3>22) SBOM &#038; Image Scanning<\/h3>\n<p>Generate SBOM for container images and correlate CVEs with runtime deployments. Focus on images actually running in prod paths.<\/p>\n<\/p><\/div>\n<div class=\"card bg-green\">\n<h3>23) Secrets &#038; Keys<\/h3>\n<p>Detect hardcoded secrets in images\/disks, cloud keys on hosts, and public exposure. Auto-rotate guidance and revocation checks.<\/p>\n<pre><code class=\"mono\">FIND vm WHERE has_secret=true AND reachable_from(\"internet\")<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-amber\">\n<h3>24) Container Runtime Risks<\/h3>\n<p>Flag privileged pods, hostPath mounts, CAP_SYS_ADMIN, and exposed NodePorts. Tie to identity permissions and network reach.<\/p>\n<pre><code class=\"mono\">FIND k8s.pod WHERE securityContext.privileged=true<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-violet\">\n<h3>25) K8s Posture<\/h3>\n<p>Audit cluster config: API server flags, etcd encryption, RBAC, network policies, and admission controls.<\/p>\n<\/p><\/div>\n<div class=\"card bg-rose\">\n<h3>26) Serverless &#038; PaaS<\/h3>\n<p>Scan Lambda\/Functions, App Services, Cloud Run: env secrets, broad IAM, public endpoints, and egress to sensitive stores.<\/p>\n<\/p><\/div>\n<div class=\"card bg-indigo\">\n<h3>27) Exploit Intelligence<\/h3>\n<p>Prioritize actively exploited CVEs and those with public POCs. Defer low-risk packages not in attack paths.<\/p>\n<\/p><\/div>\n<div class=\"card bg-orange\">\n<h3>28) Patch &#038; Remediation<\/h3>\n<p>Integrate with patch systems; for containers, fix in base image and redeploy. Use exceptions for vendor delays with compensations.<\/p>\n<\/p><\/div>\n<div class=\"card bg-lime\">\n<h3>29) Malware Indicators<\/h3>\n<p>Correlate suspicious binaries\/processes from snapshot\/runtime with exposure and credentials to prioritize incident response.<\/p>\n<\/p><\/div>\n<div class=\"card bg-emerald\">\n<h3>30) Q&amp;A \u2014 \u201cAgentless accuracy?\u201d<\/h3>\n<p><span class=\"q\">Answer:<\/span> Snapshot scans see installed packages\/files but not ephemeral runtime behavior. Combine with optional runtime sensors for process\/traffic context when needed.<\/p>\n<\/p><\/div>\n<p>      <!-- ===================== SECTION 4: IDENTITY, NETWORK & DATA (31\u201340) ===================== --><\/p>\n<div class=\"section-title\">Section 4 \u2014 Identity, Network Exposure &#038; Data Security<\/div>\n<div class=\"card bg-cyan\">\n<h3>31) CIEM (Identity)<\/h3>\n<p>Inventory human and machine identities, enumerate effective permissions, and find overprivileged roles and unused rights.<\/p>\n<pre><code class=\"mono\">FIND identity WHERE privilege = \"admin\" AND last_used &gt; 90d<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-blue\">\n<h3>32) Network Paths<\/h3>\n<p>Model ingress\/egress from internet\/VPN\/peers to workloads and data. Highlight open management ports and flat networks.<\/p>\n<pre><code class=\"mono\">FIND vm WHERE port IN (22,3389) AND exposed_to = \"internet\"<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-green\">\n<h3>33) Data Stores<\/h3>\n<p>Track S3\/Blob\/GCS, RDS\/SQL, NoSQL, and secret managers. Detect public access, weak encryption, and cross-account sharing.<\/p>\n<pre><code class=\"mono\">FIND datastore WHERE public=true OR encryption=disabled<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-amber\">\n<h3>34) Lateral Movement<\/h3>\n<p>Find pivot opportunities: same VPC\/subnet, shared instance profiles, shared keys, or peered networks connecting tiers.<\/p>\n<\/p><\/div>\n<div class=\"card bg-violet\">\n<h3>35) Conditional Access Gaps<\/h3>\n<p>Detect identities without MFA, keys older than policy, or no session constraints\u2014especially when they can reach sensitive data.<\/p>\n<\/p><\/div>\n<div class=\"card bg-rose\">\n<h3>36) Public Exposures<\/h3>\n<p>Internet-exposed compute, databases, buckets, and services. Validate WAF, auth, and network ACLs.<\/p>\n<\/p><\/div>\n<div class=\"card bg-indigo\">\n<h3>37) Privilege Escalation<\/h3>\n<p>Identify roles with iam:PassRole, policy attachment rights, or wildcard permissions enabling escalation chains.<\/p>\n<\/p><\/div>\n<div class=\"card bg-orange\">\n<h3>38) Secrets Hygiene<\/h3>\n<p>Keys in user data, AMIs, images, or repos. Enforce rotation and least-privilege access. Prefer secret managers.<\/p>\n<\/p><\/div>\n<div class=\"card bg-lime\">\n<h3>39) Data Egress Control<\/h3>\n<p>Detect public egress routes from sensitive subnets, unrestricted NATs, and missing VPC endpoints with policies.<\/p>\n<\/p><\/div>\n<div class=\"card bg-emerald\">\n<h3>40) Q&amp;A \u2014 \u201cFix first: identity, network, or CVE?\u201d<\/h3>\n<p><span class=\"q\">Answer:<\/span> Break attack paths in order of least effort\/highest risk reduction: 1) close public exposure or block path; 2) remove overprivileged access; 3) patch remaining exploitable vulns.<\/p>\n<\/p><\/div>\n<p>      <!-- ===================== SECTION 5: GOVERNANCE, DEVSECOPS & INTERVIEW (41\u201350) ===================== --><\/p>\n<div class=\"section-title\">Section 5 \u2014 Governance, DevSecOps, Remediation &#038; Interview Q&amp;A<\/div>\n<div class=\"card bg-cyan\">\n<h3>41) Policy-as-Code &#038; Custom Controls<\/h3>\n<p>Create custom controls to enforce org standards (naming, tags, encryption). Map to frameworks and SLAs by environment.<\/p>\n<pre><code class=\"mono\">CONTROL: \"S3 must be encrypted\"\r\nIF resource.type=\"s3\" THEN REQUIRE encryption=enabled<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-blue\">\n<h3>42) Shift Left (CI\/CD)<\/h3>\n<p>Scan IaC (Terraform, ARM\/Bicep, CloudFormation) and container images in CI. Break build on critical misconfigs\/CVEs with approved gates.<\/p>\n<pre><code class=\"mono\">Gate: fail if internet_exposed AND has_secret AND critical_cve<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-green\">\n<h3>43) Ticketing &#038; Ownership<\/h3>\n<p>Auto-assign issues by tag\/owner, set SLAs by severity and data class, and sync status bidirectionally with Jira\/ServiceNow.<\/p>\n<\/p><\/div>\n<div class=\"card bg-amber\">\n<h3>44) Runbooks &#038; Autofix<\/h3>\n<p>Attach step-by-step remediation (CLI\/Terraform) and safe automation (e.g., close SG port, detach role). Guardrails and approvals required.<\/p>\n<pre><code class=\"mono\">aws ec2 revoke-security-group-ingress --group-id sg-... --port 22 --protocol tcp --cidr 0.0.0.0\/0<\/code><\/pre>\n<\/p><\/div>\n<div class=\"card bg-violet\">\n<h3>45) Reporting &#038; Audits<\/h3>\n<p>Export posture reports per framework, evidence trails for auditors, and executive dashboards highlighting risk burn-down.<\/p>\n<\/p><\/div>\n<div class=\"card bg-rose\">\n<h3>46) M&#038;A &#038; Third-Party Risk<\/h3>\n<p>Quickly onboard new cloud estates, baseline posture, and identify critical exposures before integration.<\/p>\n<\/p><\/div>\n<div class=\"card bg-indigo\">\n<h3>47) Cost-Aware Security<\/h3>\n<p>Tag fixes with business value; prioritize \u201ccheap big wins\u201d (security groups, identity trims) before heavy refactors.<\/p>\n<\/p><\/div>\n<div class=\"card bg-orange\">\n<h3>48) Common Pitfalls<\/h3>\n<p>Chasing CVEs without context, disabling controls for speed, stale connectors, no owners\/tags, and unmanaged exceptions.<\/p>\n<\/p><\/div>\n<div class=\"card bg-lime\">\n<h3>49) Quick Start Checklist<\/h3>\n<p>Connect all clouds \u2192 import tags\/owners \u2192 enable key policies \u2192 create boards &#038; alerts \u2192 integrate ticketing \u2192 run fix sprint on top 20 attack paths.<\/p>\n<\/p><\/div>\n<div class=\"card bg-emerald qa\">\n<h3>50) Interview Q&amp;A \u2014 20 Practical Questions (Expanded)<\/h3>\n<p><b>1) How does Wiz differ from CSPM-only tools?<\/b> It fuses misconfigs, identities, network exposure, and vulns into a single graph to find exploitable paths.<\/p>\n<p><b>2) What is a \u2018toxic combination\u2019?<\/b> Multiple benign issues that together enable breach (e.g., public SG + secret on disk + admin role chain).<\/p>\n<p><b>3) Prioritization logic?<\/b> Exposure + identity power + data sensitivity + exploit intel, adjusted by compensating controls.<\/p>\n<p><b>4) Agentless vs agented?<\/b> Agentless gives broad coverage fast; agents\/sensors add runtime depth. Many start agentless, add runtime where needed.<\/p>\n<p><b>5) CIEM examples?<\/b> Identities with admin, wildcard actions, PassRole, or unused keys; map effective permissions across assume-role chains.<\/p>\n<p><b>6) How are network paths computed?<\/b> From SGs\/NSGs, routes, load balancers, peering, endpoints; evaluated against internet\/public sources.<\/p>\n<p><b>7) K8s risks to watch?<\/b> Privileged pods, broad RBAC, open API server, missing network policies, secrets in env vars.<\/p>\n<p><b>8) Handling secrets discovered?<\/b> Rotate keys, move to secret manager, remove from AMIs\/images\/user-data, and restrict IAM usage.<\/p>\n<p><b>9) SBOM value?<\/b> Inventory deps, map CVEs to running images, enforce base image hygiene, and support compliance.<\/p>\n<p><b>10) What is data classification used for?<\/b> Elevates priority of issues that can reach sensitive data; drives stricter SLAs.<\/p>\n<p><b>11) How to reduce alert fatigue?<\/b> Use attack-path context; suppress noisy standalone CVEs; focus on exploitable combos and ownership routing.<\/p>\n<p><b>12) Common misconfig examples?<\/b> Public buckets, unencrypted DBs, 0.0.0.0\/0 on SSH\/RDP, default creds, disabled logging.<\/p>\n<p><b>13) Exceptions lifecycle?<\/b> Time-bound with justification; auto-revalidation on expiry; monitor compensating controls.<\/p>\n<p><b>14) Shift-left integration?<\/b> Scan IaC and images in CI; block deploys creating known attack paths; feed results back to PR owners.<\/p>\n<p><b>15) Evidence for audit?<\/b> Control tests, issue history, remediation tasks, screenshots\/exports of compliant resources.<\/p>\n<p><b>16) Multi-cloud normalization?<\/b> Abstracts provider-specific fields into common graph entities and edges.<\/p>\n<p><b>17) How to measure program success?<\/b> Fewer exploitable paths, lower time-to-remediate, reduced public exposure, and improved control coverage.<\/p>\n<p><b>18) What\u2019s \u2018effective permission\u2019?<\/b> Real permissions after policy evaluation and role assumptions, not just attached policies.<\/p>\n<p><b>19) Typical first month plan?<\/b> Connect clouds \u2192 quick wins on public exposures &#038; secrets \u2192 identity right-sizing \u2192 top attack paths sprint.<\/p>\n<p><b>20) Biggest gotcha?<\/b> Not assigning owners\/tags, so issues can\u2019t route; fix tagging first to unlock automation.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Wiz Pocket Book \u2014 Uplatz 50 in-depth cards \u2022 Wide layout \u2022 Readable examples \u2022 20-question interview Q&amp;A included Section 1 \u2014 Foundations 1) What is Wiz? Wiz is a <span class=\"readmore\"><a href=\"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/\">Read More &#8230;<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2462,2478],"tags":[],"class_list":["post-4498","post","type-post","status-publish","format-standard","hentry","category-pocket-book","category-wiz"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wiz Pocket Book | Uplatz Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wiz Pocket Book | Uplatz Blog\" \/>\n<meta property=\"og:description\" content=\"Wiz Pocket Book \u2014 Uplatz 50 in-depth cards \u2022 Wide layout \u2022 Readable examples \u2022 20-question interview Q&amp;A included Section 1 \u2014 Foundations 1) What is Wiz? Wiz is a Read More ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/\" \/>\n<meta property=\"og:site_name\" content=\"Uplatz Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Uplatz-1077816825610769\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-09T21:52:09+00:00\" \/>\n<meta name=\"author\" content=\"uplatzblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uplatz_global\" \/>\n<meta name=\"twitter:site\" content=\"@uplatz_global\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"uplatzblog\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/\"},\"author\":{\"name\":\"uplatzblog\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ecae69a21d0757bdb2f776e67d2645e\"},\"headline\":\"Wiz Pocket Book\",\"datePublished\":\"2025-08-09T21:52:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/\"},\"wordCount\":1446,\"publisher\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Pocket Book\",\"Wiz\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/\",\"name\":\"Wiz Pocket Book | Uplatz Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-08-09T21:52:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wiz-pocket-book\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wiz Pocket Book\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\",\"name\":\"Uplatz Blog\",\"description\":\"Uplatz is a global IT Training &amp; Consulting company\",\"publisher\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\",\"name\":\"uplatz.com\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Uplatz-Logo-Copy-2.png\",\"contentUrl\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Uplatz-Logo-Copy-2.png\",\"width\":1280,\"height\":800,\"caption\":\"uplatz.com\"},\"image\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Uplatz-1077816825610769\\\/\",\"https:\\\/\\\/x.com\\\/uplatz_global\",\"https:\\\/\\\/www.instagram.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/7956715?trk=tyah&amp;amp;amp;amp;trkInfo=clickedVertical:company,clickedEntityId:7956715,idx:1-1-1,tarId:1464353969447,tas:uplatz\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ecae69a21d0757bdb2f776e67d2645e\",\"name\":\"uplatzblog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"caption\":\"uplatzblog\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wiz Pocket Book | Uplatz Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/","og_locale":"en_US","og_type":"article","og_title":"Wiz Pocket Book | Uplatz Blog","og_description":"Wiz Pocket Book \u2014 Uplatz 50 in-depth cards \u2022 Wide layout \u2022 Readable examples \u2022 20-question interview Q&amp;A included Section 1 \u2014 Foundations 1) What is Wiz? Wiz is a Read More ...","og_url":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/","og_site_name":"Uplatz Blog","article_publisher":"https:\/\/www.facebook.com\/Uplatz-1077816825610769\/","article_published_time":"2025-08-09T21:52:09+00:00","author":"uplatzblog","twitter_card":"summary_large_image","twitter_creator":"@uplatz_global","twitter_site":"@uplatz_global","twitter_misc":{"Written by":"uplatzblog"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/#article","isPartOf":{"@id":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/"},"author":{"name":"uplatzblog","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/person\/8ecae69a21d0757bdb2f776e67d2645e"},"headline":"Wiz Pocket Book","datePublished":"2025-08-09T21:52:09+00:00","mainEntityOfPage":{"@id":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/"},"wordCount":1446,"publisher":{"@id":"https:\/\/uplatz.com\/blog\/#organization"},"articleSection":["Pocket Book","Wiz"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/","url":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/","name":"Wiz Pocket Book | Uplatz Blog","isPartOf":{"@id":"https:\/\/uplatz.com\/blog\/#website"},"datePublished":"2025-08-09T21:52:09+00:00","breadcrumb":{"@id":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uplatz.com\/blog\/wiz-pocket-book\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uplatz.com\/blog\/wiz-pocket-book\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uplatz.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Wiz Pocket Book"}]},{"@type":"WebSite","@id":"https:\/\/uplatz.com\/blog\/#website","url":"https:\/\/uplatz.com\/blog\/","name":"Uplatz Blog","description":"Uplatz is a global IT Training &amp; Consulting company","publisher":{"@id":"https:\/\/uplatz.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uplatz.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uplatz.com\/blog\/#organization","name":"uplatz.com","url":"https:\/\/uplatz.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uplatz.com\/blog\/wp-content\/uploads\/2016\/11\/Uplatz-Logo-Copy-2.png","contentUrl":"https:\/\/uplatz.com\/blog\/wp-content\/uploads\/2016\/11\/Uplatz-Logo-Copy-2.png","width":1280,"height":800,"caption":"uplatz.com"},"image":{"@id":"https:\/\/uplatz.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Uplatz-1077816825610769\/","https:\/\/x.com\/uplatz_global","https:\/\/www.instagram.com\/","https:\/\/www.linkedin.com\/company\/7956715?trk=tyah&amp;amp;amp;amp;trkInfo=clickedVertical:company,clickedEntityId:7956715,idx:1-1-1,tarId:1464353969447,tas:uplatz"]},{"@type":"Person","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/person\/8ecae69a21d0757bdb2f776e67d2645e","name":"uplatzblog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","caption":"uplatzblog"}}]}},"_links":{"self":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/4498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/comments?post=4498"}],"version-history":[{"count":1,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/4498\/revisions"}],"predecessor-version":[{"id":4499,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/4498\/revisions\/4499"}],"wp:attachment":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/media?parent=4498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/categories?post=4498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/tags?post=4498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}