42Crunch for FedRAMP moderate prep

What middleBrick covers

  • Black-box API scanning without agents or code access
  • Detection of authentication misconfigurations and JWT issues
  • OpenAPI parsing with recursive reference resolution
  • Authenticated scans with strict domain verification
  • CI/CD integration via GitHub Action and CLI
  • Continuous monitoring with signed webhook alerts

Scope and approach for FedRAMP moderate preparation

middleBrick is a black-box API security scanner designed to support security assessment workflows rather than serve as an audit authority. It maps findings to security controls described in FedRAMP moderate baselines through detection of common misconfigurations and data exposures relevant to those controls. The scanner operates without agents, SDKs, or code access, submitting read-only requests to surface observable runtime behaviors.

Detection coverage aligned to FedRAMP-relevant concerns

The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023), many of which intersect with FedRAMP moderate controls, including authentication bypass, excessive data exposure, and input validation gaps. It also detects insecure transport, missing security headers, PII leakage such as emails and context-aware SSN patterns, exposed API key formats, and SSRF indicators. For authentication, it identifies JWT misconfigurations like alg=none, weak algorithms, expired tokens, and missing claims. For data exposure, it surfaces over-exposed fields, internal attributes, and sensitive patterns that can inform data protection controls.

OpenAPI and runtime cross-validation

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution, cross-referencing spec definitions against runtime findings. This highlights discrepancies such as undefined security schemes, deprecated operations, missing pagination, and unexpected sensitive field exposure. The comparison supports audit evidence for control validation by documenting how declared behavior differs from observed responses, which is valuable when demonstrating due diligence for FedRAMP moderate preparation.

Authenticated scanning and operational constraints

Authenticated scanning is available from the Starter tier and above, supporting Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through DNS TXT records or an HTTP well-known file to ensure only domain owners can submit credentials. The scanner forwards a limited header allowlist and uses read-only methods only, avoiding destructive payloads. Note that the tool detects and reports issues but does not fix, patch, block, or remediate; it provides guidance to assist internal teams in addressing findings.

Reporting, monitoring, and integration considerations

The Web Dashboard centralizes scan results, score trends, and downloadable compliance PDFs, while the CLI and GitHub Action enable integration into CI/CD pipelines. The action can fail builds when scores drop below defined thresholds, providing early warnings during development. Continuous monitoring (Pro tier) supports scheduled rescans, diff detection across scans, and HMAC-SHA256 signed webhooks. For FedRAMP moderate workflows, these features help track posture over time and generate artifacts for review, though the tool does not replace human-led audits or penetration tests.

Frequently Asked Questions

Does middleBrick certify FedRAMP compliance?
middleBrick is a scanning tool and does not certify compliance. It surfaces findings relevant to FedRAMP moderate controls and helps you prepare documentation, but it cannot audit or certify any system.
Can authenticated scans validate identity controls?
Authenticated scans verify that provided credentials are accepted and map access surfaces, but they do not validate the strength or governance of identity processes required by FedRAMP moderate.
Does the scanner perform intrusive exploitation like SQL injection?
No. The scanner limits testing to read-only methods and does not perform active SQL injection or command injection, which fall outside its scope.
How does continuous monitoring support FedRAMP workflows?
Continuous monitoring enables scheduled rescans and diff detection to track score and finding changes over time, producing alerts and signed webhooks that can supplement evidence collection for ongoing control monitoring.
Can the tool replace a human pentester for FedRAMP?
No. The tool does not detect business logic vulnerabilities or blind SSRF, and it should not replace a human pentester for high-stakes audits aligned to FedRAMP moderate.