Alternatives to Noname Security for Customer SOC 2 questionnaire prep

What middleBrick covers

  • Black-box API scanning with no agents or code access
  • Detection of authentication and data exposure risks
  • LLM security testing with adversarial probe tiers
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with ref resolution
  • CI/CD integration via GitHub Action and MCP Server
  • Continuous monitoring with scheduled rescans and diff alerts

Purpose and scope for SOC 2 preparation

This tool is positioned as a scanner to help collect evidence for SOC 2 Type II control areas related to system security and availability. It supports audit evidence by surfacing findings such as weak authentication, data exposure, and encryption issues in publicly reachable APIs. The scanner does not perform active exploits or simulate advanced persistent threats; it focuses on detection and reporting aligned to a defined set of technical controls.

Mapping to SOC 2 and OWASP controls

middleBrick maps findings directly to SOC 2 Type II control objectives and OWASP API Top 10 (2023). Detected issues can be used as audit evidence for access control, data protection, and monitoring requirements. Coverage includes authentication bypass risks, insecure data transmission, PII exposure, and unsafe default configurations. Note that the tool does not map to frameworks outside this scope and is not positioned as a compliance certification mechanism.

Black-box scanning approach

The scanner operates as a black-box solution with no agents, SDKs, or code access required. It runs read-only methods (GET and HEAD) plus text-only POST for LLM probes, which minimizes operational risk. This approach suits environments where intrusive testing is restricted. Organizations can run scans without impacting application code or infrastructure state, while still obtaining prioritized findings with remediation guidance.

Authenticated scanning and safety controls

Authenticated scanning (Bearer, API key, Basic auth, Cookie) is available in tiers above Starter. A domain verification gate ensures only domain owners can submit credentials. The scanner limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-*, and blocks private IPs, localhost, and cloud metadata endpoints at multiple layers. Scan data is deletable on demand and is not used for model training.

LLM security and developer workflow integration

The scanner includes LLM / AI Security testing with adversarial probes across Quick, Standard, and Deep tiers, covering prompt injection, data exfiltration attempts, and token smuggling. It supports integration into developer workflows via CLI, GitHub Action, MCP Server, and a web dashboard. Continuous monitoring options provide scheduled rescans, diff detection, and alerting to track score trends over time.

Limitations and responsible use

middleBrick does not fix, patch, or block findings; it reports with remediation guidance. It does not test business logic, perform active SQL or command injection, or detect blind SSRF relying on out-of-band channels. The tool is not a replacement for human-led penetration tests or formal audits. Security teams should use these findings as part of a broader assessment strategy.

Frequently Asked Questions

Can middleBrick validate SOC 2 controls directly?
The tool surfaces findings relevant to SOC 2 control areas, such as access management and data protection. It provides evidence but does not certify compliance or validate controls independently.
What authentication methods are supported for authenticated scans?
Bearer tokens, API keys, Basic authentication, and cookies. Domain verification is required to ensure only authorized owners scan with credentials.
Does the scanner perform active exploitation like SQL injection?
No. It focuses on detection of misconfigurations and exposures using read-only methods. Intrusive payloads for SQL injection or command injection are outside scope.
How does continuous monitoring work in the Pro tier?
Pro tier enables scheduled rescans, diff detection across runs, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks that auto-disable after five consecutive failures.
Is customer scan data retained or used for training?
No. Scan data is deletable on demand and purged within 30 days of cancellation. It is never sold and is not used for model training.