Migrating from Nessus to middleBrick

What middleBrick covers

  • Risk scoring from A to F with prioritized findings
  • Black-box scanning without agents or SDKs
  • Authentication support for Bearer, API key, Basic, and Cookie
  • OWASP API Top 10 aligned detection across 12 categories
  • CI/CD integration via GitHub Action and MCP Server
  • Continuous monitoring with HMAC-SHA256 signed webhooks

Planning the migration

Moving from Nessus to middleBrick starts with aligning expectations. Nessus produces highly detailed asset and vulnerability data; middleBrick focuses on API-specific risk scoring and prioritized findings. Plan a phased cutover where you run middleBrick in parallel with Nessus for a defined period, compare results for the same APIs, and validate that your critical endpoints are covered.

  • Inventory all public-facing APIs and the Nessus scan IDs that map to them.
  • Define the risk score threshold that will trigger remediation work in middleBrick.
  • Confirm authentication methods for each API so middleBrick can test with appropriate credentials (Bearer, API key, Basic, Cookie).

Exporting and normalizing Nessus data

Nessus exports in multiple formats. Use the CSV or XML export to extract host lists, ports, plugin IDs, severity ratings, and descriptions. Because middleBrick does not import Nessus findings directly, normalize the export into a canonical list of endpoints with method, path, and authentication requirements. This normalized inventory becomes the baseline you will retest with middleBrick and track score changes over time.

import csv

endpoints = []
with open('nessus-export.csv') as f:
    reader = csv.DictReader(f)
    for row in reader:
        if row['severity'] in ('Critical', 'High', 'Medium'):
            endpoints.append({
                'host': row['host'],
                'port': row['port'],
                'method': row.get('method', 'GET'),
                'path': row['uri'],
                'severity': row['severity']
            })
print(f'Normalized {len(endpoints)} findings')

Rebuilding scan history and tracking progress

middleBrick replaces Nessus scan history with its own scoring model and trend tracking. Import your normalized endpoint list into middleBrick via the dashboard or CLI, and run an initial scan on each API. Use the score trend view to compare early results with your later scans. For continuity, map Nessus severity to middleBrick risk categories and note which Nessus plugin families align with authentication, input validation, data exposure, and rate limiting findings.

  • Leverage the CLI to automate repeated scans during migration: middlebrick scan https://api.example.com --auth-token YOUR_TOKEN.
  • Use the Pro tier's diff detection to highlight new findings and resolved items across scan cycles.

Keeping CI wired up during cutover

If Nessus is integrated into CI/CD, transition those gates to middleBrick gradually. Start by adding a non-blocking check that reports the score without failing the build. Use the GitHub Action to enforce a threshold once you are confident in the scan coverage. During the transition, keep Nessus runs for a limited set of endpoints as a safety net, and route alerts to a dedicated channel for review before turning off legacy notifications.

name: API Security Gate
on: [push]
jobs:
  security:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - name: middleBrick scan
        uses: middlebrick/github-action@v1
        with:
          url: https://api.example.com
          threshold: C
          fail-on-below: true

What you will miss and what you will gain

You will not find low-level host vulnerabilities, operating system weaknesses, or some network-layer issues that Nessus covers; these are out of scope for API security scanning. What you gain is focused detection aligned to the OWASP API Top 10, with clear risk scores, prioritized remediation guidance, and built-in compliance mappings for PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10. middleBrick also reduces noise through read-only scanning, blocks unsafe targets, and provides continuous monitoring options that keep your team alerted to regressions without manual sweeps.

  • Direct mappings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10.
  • Black-box scanning that requires no agents or SDKs.
  • Automated monitoring and alerting with HMAC-SHA256 signed webhooks.

Frequently Asked Questions

Can I import Nessus scan results directly into middleBrick?
No, middleBrick does not import Nessus files. Normalize your Nessus export into a list of endpoints and retest them with middleBrick to rebuild your history.
Will middleBrick fail my CI build if the score is poor?
Yes, when you configure the GitHub Action with a threshold and enable fail-on-below, the build fails if the score drops below your defined level.
Does middleBrick detect the same vulnerabilities Nessus does?
No. Nessus covers host and network vulnerabilities; middleBrick covers API-specific risks such as authentication misconfigurations, IDOR, and LLM security probes.
How do I ensure only the domain owner can run authenticated scans?
Enable the domain verification gate, which requires a DNS TXT record or an HTTP well-known file that only the domain owner can control.