How to Recreate Wiz's Security Graph Using PuppyGraph
This demo showcases how to analyze and visualize cloud network security configurations using PuppyGraph’s real-time graph query engine.
By modeling your cloud infrastructure as a graph, PuppyGraph enables you to:
- Identify public IPs exposed to the internet
- Detect network interfaces lacking security group protection
- Uncover roles with excessive permissions
- Flag overly permissive ingress rules in security groups
Using Gremlin & Cypher queries, you’ll explore a graph of network entities—including VMs, security groups, and roles—to surface security risks and improve your overall posture.
The demo uses randomly generated sample data and walks through how to:
- Build a virtual graph schema with PuppyGraph
- Run interactive Gremlin queries for security auditing
All services are spun up using Docker Compose, and setup requires only Docker, Python 3, and Docker Compose.
This is a practical starting point for anyone interested in proactive cloud security analysis using graph techniques—no ETL or data duplication required.
Want to try it yourself?
We've open-sourced the sample dataset, graph schema, and graph queries on GitHub, so you can recreate this demo in your own environment.