📋 Compliance
Supported Frameworks

Supported Compliance Frameworks

NAT maps scan findings to 4 major security frameworks. Each framework section below shows exactly which requirements NAT covers, which checks are automated, and where manual review is still needed.


OWASP API Security Top 10 (2023)

What it covers: The 10 most critical API security risks, published by OWASP and updated in 2023.

CategoryNameNAT checkAuto-detected
API1:2023Broken Object Level AuthorizationBOLA detection via sequential/guessable ID enumeration✅ Yes
API2:2023Broken AuthenticationToken expiry, refresh rotation, brute-force protection✅ Yes
API3:2023Broken Object Property Level AuthorizationMass assignment and over-exposure of object properties✅ Yes
API4:2023Unrestricted Resource ConsumptionRate limiting and quota enforcement checks✅ Yes
API5:2023Broken Function Level AuthorizationPrivilege escalation via endpoint enumeration✅ Yes
API6:2023Unrestricted Access to Sensitive Business FlowsBusiness logic abuse (e.g., coupon stacking, account takeover flows)✅ Yes
API7:2023Server-Side Request ForgerySSRF payload injection on URL parameters✅ Yes
API8:2023Security MisconfigurationTLS, CORS, verbose errors, default credentials⚠️ Partial
API9:2023Improper Inventory ManagementShadow endpoint discovery via fuzzing and spec diffing✅ Yes
API10:2023Unsafe Consumption of APIsThird-party API trust and input validation✅ Yes

Coverage: 9/10 categories fully automated. API8 (Security Misconfiguration) is partial — NAT checks TLS and CORS automatically but server-level configuration (e.g., firewall rules, OS hardening) requires manual review.


PCI-DSS v4.0

What it covers: The Payment Card Industry Data Security Standard — security requirements for any system that stores, processes, or transmits cardholder data.

NAT covers API-layer security requirements. Network and physical security requirements are out of scope.

RequirementDescriptionNAT check
6.2Bespoke and custom software are developed securelyInjection, auth, and data exposure checks on all endpoints
6.3Security vulnerabilities are identified and addressedAutomated vulnerability scanning with severity classification
6.5Changes to all system components are managed securelySpec diffing to detect unintended API surface changes
11.3External and internal vulnerabilities are regularly identified and addressedScheduled scan support with CI/CD integration
11.4External and internal penetration testing is regularly performedBGSTM methodology provides structured penetration test evidence

HIPAA Security Rule

What it covers: The Health Insurance Portability and Accountability Act — technical safeguards for protecting electronic protected health information (ePHI).

NAT validates API-level controls. Administrative and physical safeguards require separate assessment.

SafeguardSectionNAT check
Access Controls§164.312(a)Authentication bypass detection, BOLA/BFLA checks, privilege escalation testing
Audit Controls§164.312(b)Validates that audit log endpoints exist and return appropriate data
Integrity Controls§164.312(c)Input validation, injection prevention, data tampering checks
Transmission Security§164.312(e)TLS enforcement, unencrypted data transmission detection

SOC 2 Type II

What it covers: Service Organization Control 2 — a trust services framework requiring ongoing evidence of security controls over a defined period.

NAT provides evidence for Security and Availability trust principles. Processing Integrity, Confidentiality, and Privacy require additional assessment.

CriteriaNameNAT check
CC6Logical and Physical Access ControlsAuthentication, authorization, and access control testing
CC7System OperationsMonitoring coverage, anomaly detection, incident evidence via scan logs
CC8Change ManagementAPI surface change detection via spec diffing between scans

In a hurry? See Quick Scans

Was this helpful?