Migrating from 42Crunch to Apigee

What middleBrick covers

  • Black-box API scanning with read-only methods
  • Risk scoring from A to F with prioritized findings
  • Authentication support for Bearer, API key, Basic, Cookie
  • OWASP API Top 10 (2023) coverage and mapping to PCI-DSS 4.0, SOC 2
  • Programmatic access via CLI and API client
  • Scheduled monitoring and diff detection in Pro tier

Overview of migration goals

This guide outlines the practical steps and expected gaps when moving API security scanning from a specialized vendor to middleBrick. The objective is to preserve continuous monitoring, understand data differences, and align CI wiring while recognizing that middleBrick is a scanner, not an auditor or remediation platform.

Data and scan history migration

Migrating historical scan data requires exporting records from the source platform and mapping them to middleBrick capabilities. Scan summaries, risk scores, and finding details can be imported manually via CSV or integrated programmatically using the middleBrick API client. Note that raw evidence such as exact request/response pairs may not be recreated if the source tool does not retain full payloads, and middleBrick does not store historical diffs prior to integration.

  • Export scan reports and asset inventories from the source system.
  • Map risk ratings and tags to middleBrick scores and custom tags.
  • Use the API client to create or update assets and push normalized findings.
  • Preserve timestamps externally if you require long-term audit trails.

Rebuilding exact scan history is not supported; treat the migration as a point-in-time snapshot and rely on ongoing monitoring for future tracking.

CI/CD and workflow integration

Preserving CI wiring involves replicating gate logic and notification paths. The middleBrick GitHub Action can fail builds based on a score threshold, similar to many CI plugins. You will need to recreate the job configuration and supply authentication via environment variables or a configuration file. For other CI systems, use the CLI or API client to invoke scans and parse JSON output to enforce policies.

middlebrick scan https://api.example.com --format json --output result.json

Email and Slack alert routing must be reconfigured in the middleBrick dashboard or via webhooks. If the source tool used custom headers or authentication schemes not supported by middleBrick, adjust the API calls or authentication flow accordingly. The dashboard allows per-API thresholds and scheduled rescans to approximate prior automation cadence.

Feature coverage and gaps

middleBrick covers the OWASP API Top 10 (2023), maps findings to PCI-DSS 4.0, SOC 2 Type II controls, and related regulatory alignment where applicable. It performs black-box scanning using read-only methods and supports authentication via Bearer, API key, Basic auth, and cookies. Detection includes authentication bypass, IDOR, privilege escalation, input validation, rate limiting, data exposure, encryption issues, SSRF indicators, inventory issues, unsafe consumption patterns, and LLM/AI adversarial probes.

Compared to a specialized vendor, gaps may include deeper business logic testing, custom mutation payloads, or proprietary detection signatures. middleBrick does not perform active injection attacks, fix code, or replace human pentesters for high-stakes audits. Continuous monitoring and compliance reporting are available in Pro and Enterprise tiers, but organizations should validate that the tool’s detection set matches their specific API surface and risk appetite.

Operational considerations and limitations

Plan for differences in scan scope and reporting formats. middleBrick only uses read-only methods and blocks destructive payloads, private IPs, localhost, and cloud metadata endpoints. Customer data can be deleted on demand and is never sold or used for model training. Authentication domains must be verified before credentials are accepted, and header forwarding is limited to allowlisted names.

When migrating CI pipelines, ensure that threshold values, scan frequency, and alert recipients are reconfigured. Use the API client to integrate findings into existing ticketing or SIEM systems if native integrations are not required. Regularly review the dashboard’s score trends and diff views to monitor improvements and regressions over time.

Frequently Asked Questions

Can I import historical scan data from 42Crunch?
You can manually import summaries and metadata via CSV or the API client, but detailed evidence and exact timestamps may not be preserved.
Does middleBrick support the same authentication methods?
Yes, it supports Bearer, API key, Basic auth, and cookies, with domain verification to ensure only owners can scan with credentials.
Will my CI gates work the same after migration?
You can replicate gate logic using the GitHub Action or CLI with JSON output; thresholds and schedules can be adjusted in the dashboard.
Is business logic testing covered?
No, business logic vulnerabilities require human expertise; the scanner focuses on implementation-level issues aligned to OWASP API Top 10.
How is compliance mapping handled?