Migrating from Tenable to middleBrick
What middleBrick covers
- Submit URLs and receive A–F risk scores with prioritized findings
- Black-box scanning with no agents, code access, or SDK integration
- Covers OWASP API Top 10 (2023) with 12 detection categories
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with spec-to-runtime diff
- Authenticated scans with Bearer, API key, Basic, and Cookie auth
- CI/CD integration via CLI and GitHub Action with configurable gates
Planning the migration from Tenable
Moving from a network-focused scanner to an API security tool starts with clarifying scope. middleBrick targets API endpoints, not hosts or containers, so map your existing Tenable assets to the API surfaces you own. Export asset lists and ownership details from Tenable, then prioritize APIs by traffic and risk profile so you can phase cutover without losing coverage of critical services.
Exporting data from Tenable and rebuilding scan history
Export findings from Tenable as CSV or XML and normalize fields such as IP address, port, plugin ID, severity, and status. Because middleBrick does not import Tenable scan data, use these exports to recreate a baseline: list endpoints, methods, and expected behaviors manually or via code inspection, then run initial scans and store results in your dashboard. Rebuild historical trends by saving each scan run and comparing scores over time; this replaces Tenable’s historical views with API-centric evidence.
Keeping CI wired up during the cutover
During migration, retain your Tenable CI gates until middleBrick is proven in the same pipelines. Add the middleBrick CLI to your workflows using middlebrick scan <url> and output JSON; gate on a score threshold only after your team validates detection quality. Use feature flags to route a subset of services to middleBrick first, compare results with Tenable, and adjust thresholds before switching all CI jobs. This minimizes false positives blocking deployments while you tune coverage.
What you will miss and what you will gain
You will lose network-level visibility into infrastructure vulnerabilities and host-based findings that Tenable provides; middleBrick focuses exclusively on API behavior and does not perform intrusive payload testing. In return, you gain continuous, developer-friendly scanning aligned to OWASP API Top 10, quick feedback in under a minute, and dashboard-driven tracking of risk scores across versions. The tool supports authenticated scans, OpenAPI contract analysis, and CI/CD integrations while enforcing read-only safety posture and data deletion on demand.
Operational checklist and ongoing governance
Finalize the migration with a checklist: inventory APIs, configure authentication for scans, onboard stakeholders for alert routing, and set retention policies for findings. Use Pro-tier continuous monitoring to get diffs between scans, email alerts at controlled rates, and signed webhooks for automated ticket creation. Periodically review uncovered paths and business logic risks with security experts, since automated scanning cannot replace domain-aware analysis for complex workflows.