42Crunch for Compliance officers

What middleBrick covers

  • Black-box API scanning with a risk score in under a minute
  • Detection of twelve OWASP API Top 10 categories
  • OpenAPI 3.x and Swagger 2.0 parsing with ref resolution
  • Authenticated testing with strict header allowlists
  • Compliance evidence mapping to PCI-DSS and SOC 2
  • Continuous monitoring with diff-based alerting

Workflow for compliance officers

Compliance officers need evidence that security controls align with regulatory expectations. The scanner supports this by mapping findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), providing artifacts that can be reviewed during audits. You submit an API endpoint, receive a risk score from A to F with prioritized findings, and obtain a detailed report that highlights which controls are covered and where gaps exist.

Authenticated scanning and domain verification

When credentials are provided, the scanner validates domain ownership through a DNS TXT record or an HTTP well-known file before testing authenticated surfaces. Only approved headers, including Authorization, X-API-Key, Cookie, and X-Custom-*, are forwarded. This approach supports compliance activities by ensuring scans reflect authenticated configurations while maintaining a strict read-only posture with no patch or modification capabilities.

OpenAPI spec validation and runtime correlation

The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents, resolving recursive $ref references and cross-referencing spec definitions against runtime behavior. It flags undefined security schemes, deprecated operations, and sensitive fields that may contribute to over-exposure. These checks help you prepare for audits by surfacing findings relevant to API design integrity and control implementation.

Reporting, monitoring, and integration options

Findings are delivered through a web dashboard with trend tracking and the ability to download branded compliance PDFs. For ongoing governance, Pro tier includes scheduled rescans and diff detection that highlights new findings, resolved findings, and score drift. Integration options such as the CLI, GitHub Action, and MCP Server allow embedding checks into development workflows, while HMAC-SHA256 signed webhooks and email alerts support operational oversight without replacing human judgment.

Limitations and appropriate use

The scanner does not fix, patch, block, or remediate issues, nor does it perform active SQL injection or command injection testing. Business logic vulnerabilities and blind SSRF scenarios are outside scope, and the tool is not a substitute for a human pentester in high-stakes engagements. It aligns with security controls described in standards and supports audit evidence, but it does not certify or guarantee compliance with any regulatory framework.

Frequently Asked Questions

Does middleBrick certify compliance with HIPAA or GDPR?
No. The tool aligns with security controls described in regulations such as HIPAA and GDPR and supports audit evidence, but it does not certify compliance.
How are scans scheduled and alerted?
Pro tier allows scheduled rescans at intervals such as every 6 hours, daily, weekly, or monthly. Alerts are rate-limited to one per hour per API.
Can authenticated scans be run against internal APIs?
Yes, authenticated scanning is available at Starter tier and above, provided domain verification is completed and credentials are limited to approved headers.
What happens to scan data after account cancellation?
Customer scan data is deletable on demand and purged within 30 days of cancellation. Data is never sold and is not used for model training.