Is 42Crunch good for DORA ICT risk evidence?

What middleBrick covers

  • Risk scoring with OWASP API Top 10 (2023) mapping
  • Authenticated scans with header allowlisting
  • Continuous monitoring and diff detection
  • Read-only methods with private IP blocking
  • Webhook and CLI integrations for automation

Scope and approach to DORA ICT risk evidence

DORA ICT risk evidence requires verifiable artifacts that demonstrate how risks are identified, assessed, and monitored across the technology stack. middleBrick maps findings to OWASP API Top 10 (2023) and supports audit evidence for controls related to service availability and incident response, but it does not cover all DORA domains such as supplier risk or major incident reporting workflows. The scanner focuses on technical indicators like authentication bypass, data exposure, and input validation issues that can be correlated to specific ICT risk scenarios.

Detection coverage relevant to DORA categories

The scanner surfaces findings relevant to DORA categories that depend on API and web interface security. It detects authentication misconfigurations, broken access control, and data exposure that align with risk indicators used in supplier and security risk assessments. Enumeration patterns and sensitive data leakage support evidence for risk identification and treatment tracking, helping teams demonstrate due diligence.

  • Authentication bypass and JWT misconfigurations that indicate weak access control.
  • Data exposure through PII and API key patterns that highlight confidentiality risks.
  • Input validation issues such as CORS wildcard usage and dangerous HTTP methods.
  • Rate limiting and oversized responses that relate to availability risk indicators.
  • SSRF and unsafe consumption patterns relevant to service integrity.

Limitations against full DORA compliance

middleBrick is a scanning tool and does not replace the governance, supplier assessment, or major incident procedures required by DORA. It does not detect business logic vulnerabilities, blind SSRF, or supply chain risks that often require human domain context. Organizations must complement automated scans with manual reviews, contractual controls, and operational monitoring to build a complete risk evidence set.

Authenticated scanning and scope definition

Authenticated scans in Starter and higher tiers allow deeper coverage of endpoints that require Bearer, API key, Basic auth, or cookie-based access. Domain verification via DNS TXT record or HTTP well-known file ensures that only the domain owner can scan with credentials. Header allowlisting limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-* to reduce noise and scope creep.

middlebrick scan https://api.example.com --auth-type bearer --auth-value "token_value"

Continuous monitoring and reporting for risk tracking

Pro tier continuous monitoring enables scheduled rescans every 6 hours, daily, weekly, or monthly to track risk trends across API changes. Diff detection highlights new findings, resolved findings, and score drift, which can be used as evidence of ongoing risk management. HMAC-SHA256 signed webhooks and email alerts help integrate scan outcomes into incident response and audit trails without exposing raw data to external systems.

Alternatives and complementary approaches

For comprehensive DORA ICT risk evidence, consider a dedicated API security platform that includes business logic testing and supply chain analysis. An alternative that emphasizes intrusive testing and compliance mapping is a professional penetration test aligned with PCI-DSS 4.0 and SOC 2 Type II objectives, which can validate controls in environments where active exploitation is in scope.

Frequently Asked Questions

Does middleBrick provide DORA compliance certification?
No. The scanner detects technical findings and helps you prepare evidence, but it does not certify compliance.
Can authenticated scans cover internal APIs behind authentication?
Yes, Starter and higher tiers support Bearer, API key, Basic auth, and cookies with domain verification.
Does the scanner test for business logic or blind SSRF?
No. These require human-led testing and out-of-band infrastructure that are outside the scanner scope.
How are findings mapped to compliance frameworks?
Findings map directly to OWASP API Top 10 (2023) and support audit evidence for SOC 2 Type II and PCI-DSS 4.0.
Can scan results be integrated into CI/CD or monitoring tools?
Yes. The GitHub Action gates builds by score, webhooks provide signed alerts, and the CLI supports JSON output for custom pipelines.