When Customer asked for SOC 2
What middleBrick covers
- Map findings to SOC 2 and OWASP API Top 10 (2023).
- Black-box scanning with no agents or SDKs.
- OpenAPI 3.x and Swagger 2.0 spec parsing with $ref resolution.
- Authenticated scans with domain verification.
- Continuous monitoring and diff detection (Pro).
- Programmatic access via CLI and API client.
How middleBrick maps to SOC 2
middleBrick is a scanner, not an assessor. It surfaces findings that align with security controls described in SOC 2 Type II, giving you items to review and remediate. The scanner does not issue a SOC 2 opinion or attestation.
- Logical access controls: detection of weak authentication, exposed secrets, and over-permissive headers.
- System monitoring: evidence of scan runs, alert delivery, and change tracking via dashboard and webhooks.
- Configuration and change management: OpenAPI spec parsing and runtime cross-checks to identify undefined or deprecated operations.
Detection coverage for common SOC 2-relevant findings
By design, the scanner covers patterns frequently relevant to SOC 2 control criteria, including authentication issues, data exposure, and input validation gaps. It does not test intrusive exploit paths.
- Authentication and session management: JWT misconfigurations, missing security headers, unsafe token handling.
- Data protection: exposed PII, API keys, and error leakage; HTTPS enforcement and HSTS presence.
- Input validation and error handling: CORS misconfigurations, debug endpoints, verbose stack traces.
- Access control and authorization: BOLA-like enumeration, privilege escalation hints, role/permission field exposure.
- Server and dependency footprint: server fingerprinting and deprecated path patterns.
OpenAPI spec analysis and runtime cross-check
The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents and resolves recursive $ref chains. Findings are compared against the spec to highlight mismatches that are often relevant to audit evidence.
openapi: 3.0.3
info:
title: Example API
version: 1.0.0
paths:
/users/{id}:
get:
summary: Get user
securitySchemes:
bearerAuth:
type: http
scheme: bearer
responses:
'200':
description: OK
If the runtime response leaks internal fields not declared in the schema, or if security schemes are undefined for an operation, the scanner reports the divergence.
Authenticated scanning and domain verification
With Starter tier and above, you can add authenticated scans for Bearer, API key, Basic auth, and Cookie-based access. Domain verification is enforced so only the domain owner can scan with credentials.
- Verification methods: DNS TXT record or an HTTP well-known file placed at the domain root.
- Header allowlist: only Authorization, X-API-Key, Cookie, and X-Custom-* headers are forwarded.
- Read-only methods only; no destructive payloads are sent.
Continuous monitoring and evidence collection
Pro tier adds scheduled rescans and diff detection to support ongoing control monitoring. Alerts are rate-limited and webhooks are HMAC-SHA256 signed to help with evidence integrity.
- Schedule options: every 6 hours, daily, weekly, or monthly.
- Diff detection: new findings, resolved findings, and score drift are surfaced via dashboard and email.
- Retention: customer data is deletable on demand and purged within 30 days of cancellation.