Migrating from APIsec to Qualys
What middleBrick covers
- Compare risk scores across scans to track remediation progress
- Export structured scan data for archival and mapping
- Rebuild historical trends via scheduled snapshot imports
- Preserve CI gate behavior with exit codes and thresholds
- Run parallel scans to validate coverage and detect gaps
- Document limitations to guide manual review and controls
Overview of migration goals
Moving from a traditional scanner to a self-service API security tool involves changes in workflow, data ownership, and timing expectations. This guide focuses on how to handle data export, rebuild scan history in the new environment, and preserve existing CI integrations without assuming feature parity.
Data export and import considerations
Export scan records from your previous platform in a structured format such as JSON or CSV, ensuring timestamps, severity levels, and endpoint paths are preserved. When ingesting into another system, map source fields to the new tool’s schema, normalizing risk ratings and deduplicating findings across scans. Because each platform stores metadata differently, validate coverage by comparing counts of unique findings per API before decommissioning the old setup.
Rebuilding scan history and trends
Historical trend lines cannot be automatically imported; you will rebuild them by importing consistent snapshots over time. Store exported scan artifacts with versioned filenames and run regular imports on a fixed schedule to create a comparable baseline. Use the new tool’s dashboard or an external datastore to visualize score drift, recurring findings, and remediation progress across weeks and months.
Preserving CI wiring and automation
Review existing CI pipelines to identify how the previous scanner gates merges, blocks deployments, or sends notifications. Replicate similar behavior using the new platform’s CLI flags, API endpoints, or native integrations. For example, configure the new tool to return non-zero exit codes when the risk score drops below a defined threshold, and ensure pipeline logs contain enough context to triage failures without exposing sensitive payloads.
middlebrick scan https://api.example.com --threshold C --output jsonKnown gaps and operational adjustments
Not every capability from the previous solution will map 1:1, especially around scan scheduling precision, custom rule definitions, or proprietary detection logic. Plan for a parallel run period where both tools execute against staging environments to compare coverage and tune thresholds. Document any findings that remain undetected so that compensating controls or manual review steps are clearly recorded.