{"id":28931,"date":"2024-06-20T12:00:56","date_gmt":"2024-06-20T16:00:56","guid":{"rendered":"https:\/\/netfoundry.io\/?p=28931"},"modified":"2024-09-17T22:08:23","modified_gmt":"2024-09-18T02:08:23","slug":"api-gateway-security","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/","title":{"rendered":"API Gateway Security"},"content":{"rendered":"\n<p>In today\u2019s interconnected world, <a href=\"https:\/\/netfoundry.io\/solutions\/zero-trust-apis\/\">API Gateway Security<\/a> fuels the lifeblood of business interactions. Yet while fostering connectivity, APIs&#8217; inherent openness creates a double-edged sword. Moreover, APIs become prime targets for cyberattacks, jeopardizing sensitive data and disrupting critical processes. This article explores navigating this zero-trust API security paradox, leveraging API best practices and innovative solutions like private API gateways.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-understanding-the-api-security-landscap-e\"><strong>Understanding the API Security Landscap<\/strong>e<\/h3>\n\n\n\n<p>Galeal Zino\u2019s insightful piece, <a href=\"https:\/\/devops.com\/squaring-the-circle-how-to-make-public-apis-private\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cSquaring the Circle: How to Make Public APIs Private\u201c<\/a>, published February 14, 2024, dives deep into the unique challenges APIs face. Additionally, their public accessibility, a boon for business agility, ironically becomes an attack vector for malicious actors. Zino likens APIs to \u201csnowflakes,\u201d constantly evolving and exposing new vulnerabilities. However, traditional security measures, often effective against known threats, struggle to adapt to zero-day attacks that exploit these changes. This necessitates a paradigm shift towards API gateway security and private API solutions<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-rise-of-zero-trust-api-networking\">The Rise of Zero-Trust API Networking<\/h3>\n\n\n\n<p>Zino proposes a revolutionary approach: Zero-Trust API Networking. This rethinks API accessibility, rendering them invisible to unauthorized entities while maintaining agility. Consequently, this approach eliminates public access, enforces strict identity and authentication measures, and utilizes outbound-only connections. Consider public APIs enjoying the seclusion of private networks without sacrificing the connectivity that fuels modern business. The key lies in private API gateways powered by zero-trust principles.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-api-gateway-security-in-the-software-industry\"><strong>API Gateway Security in the Software Industry<\/strong><\/h3>\n\n\n\n<p>APIs are the backbone of many <a href=\"https:\/\/netfoundry.io\/industries\/\">software applications<\/a>, enabling seamless integration and functionality across various platforms. Ensuring API gateway security is vital to protecting intellectual property and user data and maintaining the integrity of software solutions.&nbsp;<\/p>\n\n\n\n<p><strong>Secure Development Practices<br><\/strong>Software companies adopt secure coding practices and perform regular security assessments to identify and mitigate vulnerabilities in their APIs, especially in <a href=\"https:\/\/netfoundry.io\/solutions\/zero-trust-devops\/\">DevOps<\/a>. This includes following OWASP API Security guidelines to address the top security risks associated with APIs.<\/p>\n\n\n\n<p><strong>Zero-Trust Networking<\/strong><strong><br><\/strong>Implementing zero-trust networking principles allows software providers to create private API gateways that restrict access to authenticated and authorized users only. This reduces the attack surface and protects APIs from external threats.<\/p>\n\n\n\n<p><strong>Comprehensive API Management<\/strong><strong><br><\/strong>API management solutions provide software companies with the tools to monitor, analyze, and secure their APIs in production or in development. These platforms enable rate limiting, access control, and detailed logging, ensuring that API usage is secure and compliant with industry standards.<\/p>\n\n\n\n<p><strong>Example<br><\/strong>Intrusion, a NetFoundry customer,&nbsp; has a <a href=\"https:\/\/www.accesswire.com\/742979\/intrusion-partners-with-netfoundry-to-support-the-us-federal-governments-zero-trust-cybersecurity-standards\" target=\"_blank\" rel=\"noreferrer noopener\">partnership with NetFoundry<\/a> and has built their Zero Trust Network Access Solution using NetFoundry\u2019s platform. <a href=\"https:\/\/www.intrusion.com\/products\/endpoint-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Intrusion Shield Endpoint <\/a>helps businesses protect vital data &#8211; using zero trust architecture.<\/p>\n\n\n\n<p>&#8220;The newly released Federal Cybersecurity Strategy reinforces the Zero Trust Approach and makes it clear that the technology industry must begin to take more responsibility for protecting the public from cybercriminals, and other threat actors,&#8221; said Tony Scott, CEO of <a href=\"https:\/\/www.intrusion.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Intrusion<\/a>. &#8220;The continued vitality of the United States economy and its valuable businesses, institutions, and public services will increasingly depend on a much more secure digital infrastructure. The tech industry must take the lead and help shift the burden of poor cybersecurity from the individual to the builders and operators of our technology infrastructure who have the right skills, long-term economic incentives, and the scale to do so. Intrusion is proud to partner with NetFoundry to help accelerate this transformation.&#8221;<\/p>\n\n\n\n<p>Another SaaS company uses NetFoundry to embed zero-trust security into its API gateway, protecting its cloud-based applications from unauthorized access. By employing microsegmentation and least-privilege access, the company ensures that only specific applications and users can interact with its APIs, safeguarding its intellectual property and user data.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-api-gateway-security-in-the-banking-industry\"><strong>API Gateway Security in the Banking Industry<\/strong><\/h3>\n\n\n\n<p>The banking industry, with its vast amounts of sensitive financial data, is a prime target for cyberattacks. APIs play a crucial role in modern banking by enabling secure data exchanges between banks, third-party providers, and customers. Ensuring robust API gateway security is essential to protect this data and maintain trust.<\/p>\n\n\n\n<p><strong>Enhanced Security Measures<\/strong><strong><br><\/strong>Banks implement strict API security protocols to protect customer data and comply with regulatory standards such as PSD2 in Europe, which mandates strong customer authentication (SCA) and secure open banking APIs. By leveraging zero-trust principles, banks ensure that every API request is authenticated and authorized, minimizing the risk of data breaches.<\/p>\n\n\n\n<p><strong>Private API Gateways<\/strong><strong><br><\/strong>Banks can shield their APIs from the public internet, making them invisible to unauthorized users. This approach enhances security by enforcing strict access controls and using end-to-end encryption to protect data in transit.<\/p>\n\n\n\n<p><strong>Real-Time Monitoring and Anomaly Detection:<\/strong> Banks employ advanced monitoring tools to detect and respond to suspicious activities in real time. This proactive approach helps prevent unauthorized access and mitigates potential threats before they can cause significant damage.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h3>\n\n\n\n<p>API Gateway Security is paramount in today\u2019s digital landscape, especially in high-stakes industries like banking and software. Organizations can protect their APIs from evolving cyber threats by adopting zero-trust principles and leveraging advanced security solutions like private API gateways. As Galeal Zino emphasizes, the key to securing APIs lies in rendering them invisible to unauthorized entities while maintaining their operational agility. Embracing these strategies will ensure that APIs remain a secure and reliable backbone of modern business interactions.For a deeper dive into how Zero-Trust API Networking can transform the security landscape for APIs without hindering their operational essence, Zino\u2019s article on the <a href=\"https:\/\/netfoundry.io\/solutions\/zero-trust-apis\/\" target=\"_blank\" rel=\"noreferrer noopener\">open-source OpenZiti platform<\/a> offers a beacon of hope. Furthermore, if you take API security seriously, you know the importance of using the right API security tools and following the <a href=\"https:\/\/netfoundry.io\/solutions\/zero-trust-apis\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP API security<\/a> guidelines. In conclusion, it\u2019s a must-read for anyone vested in securing the digital arteries that power today\u2019s interconnected business ecosystems. For complete insights and technical breakdowns, visit <a href=\"https:\/\/devops.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps.com<\/a> to read <a href=\"https:\/\/devops.com\/squaring-the-circle-how-to-make-public-apis-private\/\" target=\"_blank\" rel=\"noreferrer noopener\">Galeal Zino\u2019s enlightening article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s interconnected world, API Gateway Security fuels the lifeblood of business interactions. Yet while fostering connectivity, APIs&#8217; inherent openness creates a double-edged sword. Moreover, APIs become prime targets for cyberattacks, jeopardizing sensitive data and disrupting critical processes. This article explores navigating this zero-trust API security paradox, leveraging API best practices and innovative solutions like [&hellip;]<\/p>\n","protected":false},"author":95,"featured_media":30245,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[541],"tags":[495,544,543,542,545,546],"class_list":["post-28931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops","tag-api-gateway-security","tag-devops","tag-devsecops","tag-owasp","tag-zero-trust","tag-zero-trust-api"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>API Gateway Security<\/title>\n<meta name=\"description\" content=\"Explore the critical role of API Gateway Security in today&#039;s digital world, leveraging Zero-Trust principles and private API gateways to protect sensitive data and maintain agility.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/devops\/api-gateway-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"API Gateway Security\" \/>\n<meta property=\"og:description\" content=\"Explore the critical role of API Gateway Security in today&#039;s digital world, leveraging Zero-Trust principles and private API gateways to protect sensitive data and maintain agility.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/devops\/api-gateway-security\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-20T16:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T02:08:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-api-gateway-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tod Burtchell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tod Burtchell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/\"},\"author\":{\"name\":\"Tod Burtchell\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/99496e2f83b5e50e49ca95e93672ed44\"},\"headline\":\"API Gateway Security\",\"datePublished\":\"2024-06-20T16:00:56+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/\"},\"wordCount\":960,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-api-gateway-security.jpg\",\"keywords\":[\"API Gateway Security\",\"DevOps\",\"DevSecOps\",\"OWASP\",\"Zero Trust\",\"Zero Trust API\"],\"articleSection\":[\"DevOps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/\",\"name\":\"API Gateway Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-api-gateway-security.jpg\",\"datePublished\":\"2024-06-20T16:00:56+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"description\":\"Explore the critical role of API Gateway Security in today's digital world, leveraging Zero-Trust principles and private API gateways to protect sensitive data and maintain agility.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-api-gateway-security.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-api-gateway-security.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | API Gateway Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/api-gateway-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"API Gateway Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/99496e2f83b5e50e49ca95e93672ed44\",\"name\":\"Tod Burtchell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ba0aa04846702c3f22c86fe34bdb0d03380bec8f196aacac93d064fd71014c5a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ba0aa04846702c3f22c86fe34bdb0d03380bec8f196aacac93d064fd71014c5a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ba0aa04846702c3f22c86fe34bdb0d03380bec8f196aacac93d064fd71014c5a?s=96&d=mm&r=g\",\"caption\":\"Tod Burtchell\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/tod-burtchell\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"API Gateway Security","description":"Explore the critical role of API Gateway Security in today's digital world, leveraging Zero-Trust principles and private API gateways to protect sensitive data and maintain agility.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/","og_locale":"en_US","og_type":"article","og_title":"API Gateway Security","og_description":"Explore the critical role of API Gateway Security in today's digital world, leveraging Zero-Trust principles and private API gateways to protect sensitive data and maintain agility.","og_url":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-06-20T16:00:56+00:00","article_modified_time":"2024-09-18T02:08:23+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-api-gateway-security.jpg","type":"image\/jpeg"}],"author":"Tod Burtchell","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Tod Burtchell","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/"},"author":{"name":"Tod Burtchell","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/99496e2f83b5e50e49ca95e93672ed44"},"headline":"API Gateway Security","datePublished":"2024-06-20T16:00:56+00:00","dateModified":"2024-09-18T02:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/"},"wordCount":960,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-api-gateway-security.jpg","keywords":["API Gateway Security","DevOps","DevSecOps","OWASP","Zero Trust","Zero Trust API"],"articleSection":["DevOps"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/","url":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/","name":"API Gateway Security","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-api-gateway-security.jpg","datePublished":"2024-06-20T16:00:56+00:00","dateModified":"2024-09-18T02:08:23+00:00","description":"Explore the critical role of API Gateway Security in today's digital world, leveraging Zero-Trust principles and private API gateways to protect sensitive data and maintain agility.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/devops\/api-gateway-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-api-gateway-security.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-api-gateway-security.jpg","width":1536,"height":804,"caption":"NetFoundry | API Gateway Security"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/devops\/api-gateway-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"API Gateway Security"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/99496e2f83b5e50e49ca95e93672ed44","name":"Tod Burtchell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ba0aa04846702c3f22c86fe34bdb0d03380bec8f196aacac93d064fd71014c5a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ba0aa04846702c3f22c86fe34bdb0d03380bec8f196aacac93d064fd71014c5a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ba0aa04846702c3f22c86fe34bdb0d03380bec8f196aacac93d064fd71014c5a?s=96&d=mm&r=g","caption":"Tod Burtchell"},"url":"https:\/\/netfoundry.io\/author\/tod-burtchell\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/28931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=28931"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/28931\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/30245"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=28931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=28931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=28931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}