42Crunch for ISO 27001 API control evidence
What middleBrick covers
- Risk scoring aligned to OWASP API Top 10 for prioritization
- OpenAPI parsing with recursive reference resolution
- Read-only testing to avoid production impact
- Authenticated scans with strict header allowlists
- Continuous monitoring and diff detection across scans
- Programmatic access via CLI and API client
ISO 27001 control evidence for APIs
ISO 27001 requires systematic identification and control of information security risks, including for API interfaces. middleBrick maps findings to this framework to help you assemble audit evidence for API-related controls. The scanner reviews authentication mechanisms, encryption settings, and data exposures, surfacing issues that can be linked to specific control objectives. You receive a risk score and prioritized findings that can be referenced in risk assessments and treatment plans.
Mapping methodology and scope
middleBrick is a black-box scanner that evaluates runtime behavior without requiring code access or SDK integration. It supports OpenAPI 3.0, 3.1, and Swagger 2.0 specifications with recursive $ref resolution, cross-referencing the spec against live responses. The tool checks the OWASP API Top 10 (2023) and related control families, helping you prepare evidence for security reviews while clearly stating what it does not do, such as fixing issues or testing business logic.
Authenticated scanning for evidence depth
With Starter tier and above, authenticated scans verify controls around identity verification and access management. Supported methods include Bearer tokens, API keys, Basic auth, and cookies, enforced through a domain verification gate to ensure only domain owners can submit credentials. The scanner forwards a restricted set of headers and avoids destructive payloads, operating read-only to support evidence collection without impacting production behavior.
Integration and workflow considerations
Results integrate into existing workflows via a web dashboard, CLI, and CI/CD options. The GitHub Action can gate builds based on score thresholds, while scheduled rescans and diff detection highlight new findings or regressions over time. HMAC-SHA256 signed webhooks support automated evidence collection, and email alerts provide recurring status updates aligned with operational cadence.
Limitations and complementary controls
middleBrick does not detect business logic vulnerabilities, blind SSRF, or perform intrusive injection testing, and it should not replace a human pentester for high-stakes ISO 27001 audits. The tool highlights areas where manual review or additional tooling is required, such as complex authorization logic or environment-specific configurations. Use its output as one stream of evidence within a broader assessment program.