42Crunch for ISO 27001 API control evidence

What middleBrick covers

  • Risk scoring aligned to OWASP API Top 10 for prioritization
  • OpenAPI parsing with recursive reference resolution
  • Read-only testing to avoid production impact
  • Authenticated scans with strict header allowlists
  • Continuous monitoring and diff detection across scans
  • Programmatic access via CLI and API client

ISO 27001 control evidence for APIs

ISO 27001 requires systematic identification and control of information security risks, including for API interfaces. middleBrick maps findings to this framework to help you assemble audit evidence for API-related controls. The scanner reviews authentication mechanisms, encryption settings, and data exposures, surfacing issues that can be linked to specific control objectives. You receive a risk score and prioritized findings that can be referenced in risk assessments and treatment plans.

Mapping methodology and scope

middleBrick is a black-box scanner that evaluates runtime behavior without requiring code access or SDK integration. It supports OpenAPI 3.0, 3.1, and Swagger 2.0 specifications with recursive $ref resolution, cross-referencing the spec against live responses. The tool checks the OWASP API Top 10 (2023) and related control families, helping you prepare evidence for security reviews while clearly stating what it does not do, such as fixing issues or testing business logic.

Authenticated scanning for evidence depth

With Starter tier and above, authenticated scans verify controls around identity verification and access management. Supported methods include Bearer tokens, API keys, Basic auth, and cookies, enforced through a domain verification gate to ensure only domain owners can submit credentials. The scanner forwards a restricted set of headers and avoids destructive payloads, operating read-only to support evidence collection without impacting production behavior.

Integration and workflow considerations

Results integrate into existing workflows via a web dashboard, CLI, and CI/CD options. The GitHub Action can gate builds based on score thresholds, while scheduled rescans and diff detection highlight new findings or regressions over time. HMAC-SHA256 signed webhooks support automated evidence collection, and email alerts provide recurring status updates aligned with operational cadence.

Limitations and complementary controls

middleBrick does not detect business logic vulnerabilities, blind SSRF, or perform intrusive injection testing, and it should not replace a human pentester for high-stakes ISO 27001 audits. The tool highlights areas where manual review or additional tooling is required, such as complex authorization logic or environment-specific configurations. Use its output as one stream of evidence within a broader assessment program.

Frequently Asked Questions

Does middleBrick provide ISO 27001 certification?
No. The tool surfaces findings relevant to control evidence and helps you prepare documentation, but it does not certify compliance or replace audit activities.
Can authenticated scans validate access controls?
Yes. Authenticated scans test role and permission field leakage, over-exposed endpoints, and authorization bypass risks where domain verification is enforced.
How are scan results tied to ISO 27001 controls?
Findings map to control families such as access control and cryptography, enabling you to reference specific evidence when documenting risk treatment and residual risk.
Is sensitive customer data stored from scans?
Customer scan data is deletable on demand and purged within 30 days of cancellation. It is never sold and is not used for model training.