Migrating from APIsec to Nessus

What middleBrick covers

  • Import and normalize APIsec findings into middleBrick categories
  • Rebuild scan history using scheduled rescans and manual baseline imports
  • CI/CD gating with CLI and HMAC-SHA256 signed webhooks
  • Map findings to OWASP API Top 10 (2023) and SOC 2 Type II
  • Support authenticated scans with Bearer, API key, Basic, and Cookie auth
  • Black-box scanning without agents or SDK integration

Overview of migration goals

This guide outlines the practical steps and gaps to consider when moving API security scanning from APIsec to middleBrick. The focus is on data export, rebuilding scan history, and preserving CI/CD wiring while setting realistic expectations about feature coverage.

Exporting and normalizing scan data

Begin by exporting findings from APIsec in a structured format such as JSON or CSV. Map severity levels and issue types to middleBrick categories aligned to OWASP API Top 10 (2023), noting that exact taxonomy matches are uncommon. Use scripts to normalize tags like broken authentication and excessive data exposure so that historical dashboards can be rebuilt with consistent groupings.

For authentication-related findings, include method details and affected endpoints. For PII and key exposure findings, preserve confidence indicators and evidence snippets to support downstream triage in the middleBrick dashboard.

Rebuilding scan history and trends

Import normalized findings into middleBrick and create custom labels that correspond to your previous severity scheme. Use the dashboard to recreate trend lines by date, focusing on recurring categories such as BOLA IDOR, BFLA privilege escalation, and unsafe consumption patterns.

Note that middleBrick does not automatically backfill historical scans. You will need to establish a baseline by running initial scans and then rely on scheduled rescans to build a continuous record. Over time, scan accuracy improves as the scanner refines detection signals across your API surface.

Preserving CI/CD integration and automation

Replicate your CI/CD gates by configuring the middleBrick CLI in your pipelines. Use middlebrick scan <url> with JSON output to parse results and fail builds based on score thresholds or specific finding types.

middlebrick scan https://api.example.com/openapi.json --output json | jq '.score, .findings | length'

For environments that used APIsec webhooks, replace those with signed webhooks from middleBrick Pro. Ensure the receiving endpoint validates HMAC-SHA256 signatures and handles retries after transient failures.

Known gaps and alignment considerations

middleBrick focuses on black-box detection and does not perform active SQL injection or command injection testing that APIsec may have supported. Business logic vulnerabilities and blind SSRF are also outside the scope of automated scanning and require human expertise.

Compliance coverage is framed as alignment rather than certification. The scanner helps you prepare for SOC 2 Type II and validates controls from OWASP API Top 10 (2023), but it does not map directly to HIPAA, GDPR, ISO 27001, NIST, or other regulatory frameworks. Use findings as audit evidence where relevant, and apply custom rules in Enterprise tier to address organization-specific requirements.

Frequently Asked Questions

Can I import raw APIsec JSON findings into middleBrick?
Yes, export APIsec results as JSON, map fields to middleBrick categories, and use the dashboard or API to ingest normalized data for historical tracking.
Will my existing CI pipelines break after migration?
They will need updates to use the middleBrick CLI and webhook signatures. Replace APIsec-specific calls with middlebrick scan and HMAC-SHA256 verified webhooks.
Does middleBrick track historical score changes automatically?
Automatic tracking begins once you enable scheduled rescans. Initial backfilling requires manual import of normalized findings to establish a baseline.
Can middleBrick validate compliance with HIPAA or GDPR?
The scanner surfaces findings relevant to security controls described in SOC 2 Type II and OWASP API Top 10 (2023). It does not certify compliance with HIPAA, GDPR, ISO 27001, or similar regulations.
Are destructive payloads used during scans?
No. The scanner uses read-only methods only, and destructive payloads are never sent. Private IPs and localhost are blocked at multiple layers.