WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING AI CONNECTIVITY: THE ROAD AHEAD DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • [Why Kong](/company/why-kong)Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/products/kong-insomnia/api-design)
          API Design
        • [
          API Mocking](/products/kong-insomnia/api-mocking)
          API Mocking
        • [
          API Testing and Debugging](/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • [
          MCP Client](/products/kong-insomnia/mcp-client)
          MCP Client
        • RUN APIs
        • [
          API Gateway](/products/kong-gateway)
          API Gateway
        • [
          Context Mesh](/products/kong-konnect/features/context-mesh)
          Context Mesh
        • [
          AI Gateway](/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • [
          MCP Registry](/products/mcp-registry)
          MCP Registry
        • GOVERN APIs
        • [
          Metering and Billing](/products/kong-konnect/features/usage-based-metering-and-billing)
          Metering and Billing
        • [
          APIOps and Automation](/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Considering AI Gateway alternatives? ](/performance-comparison/ai-gateway-alternatives)Considering AI Gateway alternatives?
      • [Kong vs. Postman](/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [AI Connectivity](/ai-connectivity)AI Connectivity
      • [Open Banking](/solutions/open-banking)Open Banking
      • [Legacy Migration](/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [API Monetization](/solutions/api-monetization)API Monetization
      • [AI Monetization](/solutions/ai-monetization)AI Monetization
      • [AI FinOps](/solutions/ai-cost-governance-finops)AI FinOps
      • FOR AI TEAMS
      • [AI Governance](/solutions/ai-governance)AI Governance
      • [AI Security](/solutions/ai-security)AI Security
      • [AI Cost Control](/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic Infrastructure](/solutions/agentic-ai-workflows)Agentic Infrastructure
      • [MCP Production](/solutions/mcp-production-and-consumption)MCP Production
      • [MCP Traffic Gateway](/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/solutions/financial-services-industry)Financial Services
      • [Healthcare](/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/solutions/insurance)Insurance
      • [Manufacturing](/solutions/manufacturing)Manufacturing
      • [Retail](/solutions/retail)Retail
      • [Software & Technology](/solutions/software-and-technology)Software & Technology
      • [Transportation](/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/solutions)See all Solutions
  • [Pricing](/pricing)Pricing
      • DOCUMENTATION
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Event Gateway](https://developer.konghq.com/event-gateway/)Kong Event Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • EXPLORE
      • [Blog](/blog)Blog
      • [Learning Center](/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Customer Stories](/customer-stories)Customer Stories
      • [Videos](/resources/videos)Videos
      • EVENTS
      • [API + AI Summit](/events/conferences/api-ai-summit)API + AI Summit
      • [Agentic Era World Tour](/agentic-era-world-tour)Agentic Era World Tour
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • FOR DEVELOPERS
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
      • COMPANY
      • [About Us](/company/about-us)About Us
      • [We're Hiring!](/company/careers)We're Hiring!
      • [Press Room](/company/press-room)Press Room
      • [Contact Us](/company/contact-us)Contact Us
      • [Kong Partner Program](/partners)Kong Partner Program
      • [Enterprise Support Portal](https://support.konghq.com/s/)Enterprise Support Portal
      • [Documentation](https://developer.konghq.com/?_gl=1*tphanb*_gcl_au*MTcxNTQ5NjQ0MC4xNzY5Nzg4MDY0LjIwMTI3NzEwOTEuMTc3MzMxODI2MS4xNzczMzE4MjYw*_ga*NDIwMDU4MTU3LjE3Njk3ODgwNjQ.*_ga_4JK9146J1H*czE3NzQwMjg1MjkkbzE4OSRnMCR0MTc3NDAyODUyOSRqNjAkbDAkaDA)Documentation
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Book Demo](/contact-sales)Book Demo
  • [Get Started](/products/kong-konnect/register)Get Started
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Engineering
  4. OWASP API Security Top 10: Mitigating Risks with Kong
[Engineering](/blog/engineering)Engineering
August 10, 2023
10 min read

# OWASP API Security Top 10: Mitigating Risks with Kong

Kong
Youtube thumbnail
**This content contains a video which can not be displayed in Agent mode**

The Open Web Application Security Project (OWASP for short) is a not-for-profit entity devoted to improving the security of software. Founded in 2001, OWASP is a global organization that supports thousands of volunteers globally to produce freely available articles, documentation, tutorials, and tooling.

OWASP is best known for its "Top 10" lists, which represent a broad consensus about the most critical security risks to web applications. These lists, updated every few years, serve as a vital benchmark for web application security, used by developers and security teams worldwide to ensure that their applications do not suffer from the most egregious, common, and dangerous vulnerabilities.

OWASP also publishes an [API Security Top 10](https://owasp.org/www-project-api-security/)API Security Top 10, focusing primarily on the top security risks to APIs. [APIs are mission critical](https://konghq.com/blog/enterprise/apis-are-mission-critical)APIs are mission critical and they’re increasing under attack, with a forecasted 996% surge in attacks by 2030.

In this post, we’ll talk about the 2023 OWASP API Security Top 10 and recommendations from Kong to mitigate the risks around each.

Additionally, with the rise of AI, it is important to familiarize yourself with [OWASP Top 10 LLM Vulnerabilities Guid](https://konghq.com/blog/engineering/owasp-top-10-ai-and-llm-guide)OWASP Top 10 LLM Vulnerabilities Guide as well.

## 2023 OWASP Top 10 API security risks

The 2023 OWASP API Security Top 10 focuses on the most common and most dangerous threats to modern APIs. [APIs](https://konghq.com/blog/learning-center/what-is-api)APIs are fundamental in today’s app-driven world. They're critical to modern mobile, SaaS, and web applications and are foundational to innovation across industries. But because APIs expose sensitive application logic and data, they have therefore (surprising to no one) become an attractive target for attackers.

Ensuring [API security](https://konghq.com/blog/learning-center/what-is-api-security)API security allows for rapid innovation and helps safeguard organizations against potential threats — and security is an essential part of [becoming an API-first company](https://konghq.com/resources/e-book/become-api-first-company)becoming an API-first company.

An API management platform can help improve API security, specifically addressing the high-priority threats described in the OWASP API Top 10 with things like access and authorization control down to the object level, granular rate-limiting and bot control, policy-based routing, and request and response validation and sanitation.

Next, we'll give an overview of each item on the 2023 OWASP Top 10 and discuss how Kong can help drive improved API security around each risk.

### API1:2023 Broken Object Level Authorization

APIs often have endpoints that deal with object identifiers, leading to a broad attack surface for Object Level Access Control concerns. OWASP says it's crucial to incorporate object level authorization checks in every function that interacts with a data source using a user-provided ID.

Example attack scenarios include API endpoints being exposed that allow for accessing sensitive data through a simple script manipulating URLs to vulnerabilities that allow users to delete other users’ documents without proper permission checks.

#### Kong's recommendation

Kong recommends the use of authentication/authorization plugins using protocols and auth flows that prevent clients from accessing resources they’re not permissioned for.

Kong offers a number of authentication/authorization plugins that provide the required level of access control and can integrate with third-party identity providers to allow organizations to implement security best practices without having to write client or server side logic to communicate with the IDP.

Authentication metadata from the IDP is passed along to the upstream service which is then responsible for ensuring the authenticated user has privileges to access the object requested.

**Resources:**

  • - [[Documentation] Kong Authentication Plugins](https://docs.konghq.com/hub/?category=authentication)[Documentation] Kong Authentication Plugins
  • - [[Hands-on Workshop] Kong Authentication and Authorization using OpenID Connect](https://education.konghq.com/courses/course-v1:kong+KGLL-104+Perpetual/about)[Hands-on Workshop] Kong Authentication and Authorization using OpenID Connect

### API2:2023 Broken Authentication

Due to incorrect implementation of authentication mechanisms, attackers can exploit flaws to compromise authentication tokens or assume the identities of other users, either temporarily or permanently. When the system’s ability to identify the client or user is compromised, it undermines the overall security of the API.

An example attack scenario would include using an API that doesn't require identity verification via password to update the email associated with an account — potentially allowing bad actors to steal the auth token and take over an account with a password reset.

#### Kong's recommendation

Kong allows organizations to delegate authentication logic, configuration, and governance to the API gateway layer which significantly limits the scope of authentication logic that could be misconfigured or poorly implemented.

Centralizing authentication in Kong reduces the burden on backend and frontend developers writing secure and bug-free authentication code. This also allows security analysts and compliance officers to easily validate and audit authentication logic.

**Resources:**

  • - [[Documentation] Kong Authentication Plugins](https://docs.konghq.com/hub/?category=authentication)[Documentation] Kong Authentication Plugins
  • - [[Documentation] Kong Authentication Reference Guide](https://docs.konghq.com/gateway/latest/kong-plugins/authentication/reference/#main)[Documentation] Kong Authentication Reference Guide
  • - [[Hands-on Workshop] Kong Authentication and Authorization using OpenID Connect](https://education.konghq.com/courses/course-v1:kong+KGLL-104+Perpetual/about)[Hands-on Workshop] Kong Authentication and Authorization using OpenID Connect

### API3:2023 Broken Object Property Level Authorization

This category combines two previous entries on the list,[ API3:2019 Excessive Data Exposure](https://owasp.org/API-Security/editions/2019/en/0xa3-excessive-data-exposure/) API3:2019 Excessive Data Exposure and[ API6:2019 – Mass Assignment](https://owasp.org/API-Security/editions/2019/en/0xa6-mass-assignment/) API6:2019 – Mass Assignment. But the new addition focuses on the source of the problem: an improper level of authorization validation at the object property level.

Example attack scenarios include accelerating brute-force logging into an account with GraphQL query batching to get around request rate limiting.

#### Kong's recommendation

While the determination of what content to include in an API response is primarily the responsibility of the backend service, Kong can perform response transformation to obfuscate and remove data that doesn’t need to be sent back to the client. Kong’s independence from the API service implementation allows administrators to apply this transformation logic at the gateway layer without relying on the service implementation team.

Kong can also prevent inadvertent acceptance of unpublished parameters and fields of backend data models by enforcing API requests to adhere to a schema using the Request Validator plugin.

This plugin provides the ability to:

  • - enforce a JSON request body schema using the JSON Schema spec
  • - enforce a parameter schema based on the OpenAPI specification
  • - and/or enforce specific allowed content types

**Resources:**

  • - [[Documentation] Kong Response Transformation Plugin](https://docs.konghq.com/hub/kong-inc/response-transformer-advanced/)[Documentation] Kong Response Transformation Plugin
  • - [[Documentation] Kong XML Threat Detection Plugin](https://docs.konghq.com/hub/kong-inc/xml-threat-protection/)[Documentation] Kong XML Threat Detection Plugin
  • - [[Documentation] Kong Request Validator Plugin](https://docs.konghq.com/hub/kong-inc/request-validator/)[Documentation] Kong Request Validator Plugin

### API4:2023 Unrestricted Resource Consumption

API request processing takes a lot of resources, including network bandwidth, CPU, memory, and storage. And resources like email and SMS or biometric validation are made thanks to APIs and are paid on a per-request basis. Attacks can lead to Denial of Service or increased costs.

An example attack scenario could include an organization getting hit by an unexpected massive bill due to a lack of consumption cost alerts or max cost allowances on cloud storage and a cache service mixup that has all clients pull a new version of a large file.

#### Kong's recommendation

Kong provides a number of mechanisms for preventing clients from inadvertently or maliciously requesting too many resources.

Kong offers a Rate Limiting plugin with numerous options for controlling the rate of requests made to backend services. Rate limiting can be applied at a global, service, route, or consumer level. Rate limiting counters can be tracked by consumer, IP address, credential, service, and header, regardless of what object level the plugin is configured at.

The rate limiting plugin is highly performant, offering integration with Redis to efficiently store and track counters. These options are essential in allowing the system to distinguish excessive rates of use from specific sources vs an overall spike in traffic.

Kong also offers a Request Size Limiting plugin to prevent unexpectedly large request payloads from overwhelming Kong and backend services. It offers options for specifying the payload size limit and requiring a Content-Length header.

**Kong Resources:**

  • - [[Documentation] Kong Rate Limiting plugin](https://docs.konghq.com/hub/kong-inc/rate-limiting-advanced/)[Documentation] Kong Rate Limiting plugin
  • - [[Documentation] Kong Request Size Limiting plugin](https://docs.konghq.com/hub/kong-inc/request-size-limiting/)[Documentation] Kong Request Size Limiting plugin
  • - [[Hands-on Workshop] Getting Started with Rate Limiting](https://education.konghq.com/courses/course-v1:kong+KGLL-101+Perpetual/about)[Hands-on Workshop] Getting Started with Rate Limiting

### API5:2023 Broken Function Level Authorization

The complexity of access control policies can lead to authorization issues that may be used to gain unauthorized access.

An example attack would include an attacker with knowledge of an API's structure making an educated guess and accessing an endpoint intended only for admin use that returns user details and doesn't use function level authorization checks.

#### Kong's recommendation

Kong can enforce endpoint/route level authentication and authorization so in addition to validating a client is accessing the API with a known identity, authorization rules can also be added to prevent any consumer without the proper role from accessing a route. This is implemented with the Kong authentication/authorization Plugins.

In the case of an organization offering user vs admin APIs, a route can be defined specifically for the user APIs that allow authenticated users with user API permissions to access those resources. A separate route or set of routes can be defined for admin APIs that allow authenticated users with admin API permissions to access those routes.

**Kong Resources:**

  • - [[Documentation] Kong ACL Plugin](https://docs.konghq.com/hub/kong-inc/acl/)[Documentation] Kong ACL Plugin
  • - [[Blog] Access Control Lists with Kong](https://konghq.com/blog/access-control-lists-with-kong/)[Blog] Access Control Lists with Kong
  • - [[Hands-on Workshop] Kong Authentication and Authorization using OpenID Connect](https://education.konghq.com/courses/course-v1:kong+KGLL-104+Perpetual/about)[Hands-on Workshop] Kong Authentication and Authorization using OpenID Connect

### API6:2023 Unrestricted Access to Sensitive Business Flows

Business flows can expose a risk without accounting for how a function could be abused via automation to hurt the business.

An example of this could include an airline offering purchases with no cancellation fees. A bad actor could book a majority of seats on a flight and then cancel them, pushing the airline to discount tickets.

#### Kong's recommendation

Kong can use advanced rate-limiting features to provide granular control over how many HTTP requests can be made in a given time frame. Kong also provides bot detection, preventing automated entities from flooding the API and protecting performance and responsiveness for live users.

**Kong Resources:**

  • - [[Documentation] Kong Rate Limiting plugin](https://docs.konghq.com/hub/kong-inc/rate-limiting-advanced/)[Documentation] Kong Rate Limiting plugin
  • - [[Documentation] Kong Bot Detection plugin](https://docs.konghq.com/hub/kong-inc/bot-detection/)[Documentation] Kong Bot Detection plugin
  • - [[Hands-on Workshop] Getting Started with Rate Limiting](https://education.konghq.com/courses/course-v1:kong+KGLL-101+Perpetual/about)[Hands-on Workshop] Getting Started with Rate Limiting

### API7:2023 Server Side Request Forgery

Server-Side Request Forgery (SSRF) forgery may happen when an API retrieves a remote resource but doesn't validate the URI. A bad actor can then use the application to send requests to unintended destinations.

An example of an attack using SSRF could be an application that allows for user-uploaded profile pictures. With the option to upload an image via a URL, an attacker can send a malicious URL and initiate port scanning to see if the port is open or not.

#### Kong's recommendation

Kong provides the Request Validator plugin, which allows API administrators to utilize Kong's schema validator, or provide their own JSON Schema Draft 4 compliant validator to define validation schema. In the case of SSRF attacks, this can be used to confirm that requests containing user-supplied URIs conform to expected input values, or to default to non-acceptance of requests containing pre-defined values (like localhost).

The Kong Request and Response Transformer plugins can also be used to capture request values, like URIs, and sanitize them before being passed to the upstream API endpoints.

**Kong Resources:**

  • - [[Documentation] Kong Request Validator Plugin](https://docs.konghq.com/hub/kong-inc/request-validator/)[Documentation] Kong Request Validator Plugin
  • - [[Documentation] Kong Request Transformer Plugin](https://docs.konghq.com/hub/kong-inc/request-transformer-advanced/)[Documentation] Kong Request Transformer Plugin
  • - [[Documentation] Kong Response Transformer Plugin](https://docs.konghq.com/hub/kong-inc/response-transformer-advanced/)[Documentation] Kong Response Transformer Plugin

### API8:2023 Security Misconfiguration

The complicated configurations of APIs and their support systems allow for customization. But missed configurations or poor security practices can create vulnerabilities ripe for attack.

An example attack could be with an application that allows for direct messages. If new messages are retrieved via an API request missing the Cache-Control HTTP response header, the messages can get cached by the browser and then retrieved by a bad actor via the browser cache files in the filesystem.

#### Kong's recommendation

Kong provides a number of mechanisms to secure backend APIs that may be more exposed than necessary. The Kong Route object is the primary mechanism to narrow the scope of API endpoints, methods, and protocols that can be exposed for a backend service.

Kong offers a CORS Plugin with numerous options to granularly [define CORS access](https://konghq.com/blog/learning-center/what-is-cors-cross-origin-resource-sharing)define CORS access.

Kong also offers Response Transformer and Exit Transformer plugins to modify or obfuscate response bodies and status codes to prevent leakage of sensitive information.

**Kong Resources:**

  • - [[Hands-on Workshop] Getting Started with Services, Routes, and Plugins](https://education.konghq.com/courses/course-v1:kong+KGLL-101+Perpetual/about)[Hands-on Workshop] Getting Started with Services, Routes, and Plugins
  • - [[Documentation] Kong Proxy Guide: Routes and Matching Capabilities](https://docs.konghq.com/enterprise/2.3.x/proxy/#routes-and-matching-capabilities)[Documentation] Kong Proxy Guide: Routes and Matching Capabilities
  • - [[Documentation] Kong CORS plugin](https://docs.konghq.com/hub/kong-inc/cors/)[Documentation] Kong CORS plugin
  • - [[Documentation] Kong Exit Transformer Plugin](https://docs.konghq.com/hub/kong-inc/exit-transformer/)[Documentation] Kong Exit Transformer Plugin
  • - [[Documentation] Kong Response Transformer Plugin](https://docs.konghq.com/hub/kong-inc/response-transformer-advanced/)[Documentation] Kong Response Transformer Plugin

### API9:2023 Improper Inventory Management

Proper, detailed, and up-to-date documentation and inventory are essential as APIs generally expose so many endpoints.

An example attack could include a malicious actor finding a beta API host missing a rate-limiting mechanism and brute force guessing a six-digit token.

#### Kong's recommendation

Kong’s Route object provides an abstraction layer to reduce the scope of exposure to backend services as described above in section API8:2023 Security Misconfiguration.

The Route abstraction also makes it easy to create additional endpoints to represent different API versions and transparently migrate backend API service implementations without impacting uptime for API clients.

Kong's Developer Portal allows organizations to document and publicize only the APIs that they want to provide exposure to. The Developer Portal can be integrated with third-party IdPs to securely manage developer access to the portal.

**Kong Resources:**

  • - [[Documentation] Kong Routes Guide](https://docs.konghq.com/gateway/latest/key-concepts/routes/#route-and-service-interaction)[Documentation] Kong Routes Guide
  • - [[Documentation] Kong Developer Portal](https://docs.konghq.com/gateway/latest/)[Documentation] Kong Developer Portal

### API10:2023 Unsafe Consumption of APIs

Developers may be lax on security standards when it comes to trusting data from third-party APIs. Knowing this, malicious actors may go after integrated services rather than the API.

An example attack would include a bad actor compromising a third-party API used to store sensitive data and making it respond with a permanent redirect to the attacker's server.

#### Kong's recommendation

There are several Kong plugins that can be used to limit the impact compromised third-party services and APIs can have on the primary API. Kong offers several methods through which users can implement "zero-trust" security in their APIs.

The Mutual TLS Authentication plugin adds TLS authentication based on client-supplied or server-supplied certificates and on the configured trusted CA list. TLS encryption ensures that sensitive data cannot be sniffed, even if a third-party intermediate service is compromised for a Man-in-the-Middle (MiTM) attack.

The Kong Request Validator Plugin, as well as the Request and Response Transformer plugins can be used to enforce request schemas, as well as sanitize requests that may contain non-conforming or malicious strings. Users can enable these plugins and apply policies against requests that come from potentially compromised third parties.

**Kong Resources:**

  • - [[Documentation] Kong Mutual TLS Authentication](https://docs.konghq.com/hub/kong-inc/mtls-auth/)[Documentation] Kong Mutual TLS Authentication
  • - [[Documentation] Kong Request Validator Plugin](https://docs.konghq.com/hub/kong-inc/request-validator/)[Documentation] Kong Request Validator Plugin
  • - [[Documentation] Kong Request Transformer Plugin](https://docs.konghq.com/hub/kong-inc/request-transformer-advanced/)[Documentation] Kong Request Transformer Plugin
  • - [[Documentation] Kong Response Transformer Plugin](https://docs.konghq.com/hub/kong-inc/response-transformer-advanced/)[Documentation] Kong Response Transformer Plugin

### Conclusion

In the constantly shifting landscape of web application security, it's critical to stay informed about potential vulnerabilities and the best practices to mitigate them. The OWASP Top 10 helps by outlining the most critical security risks to web applications and APIs.

Kong’s cloud native API platform offers a variety of capabilities that can help mitigate or prevent the threats present in the OWASP API Top 10. From robust authentication mechanisms and rate limiting to secure data transmission and comprehensive logging and monitoring, Kong provides a holistic approach to safeguarding APIs against potential threats.

However, tools are only part of the story in maintaining an effective security posture. Ongoing security testing and monitoring are vital for keeping up with the evolving threat landscape. Furthermore, staying updated with the latest security trends and adapting your measures to counter new threats is an ongoing process.

As software systems continue to become more complex and more powerful, the role of API management in maintaining security becomes even more significant.

## Developer agility meets compliance and security. Discover how Kong can help you become an API-first company.

[Get a Demo](/contact-sales)Get a Demo[Start for Free](/products/kong-konnect/register)Start for Free
- [API Security](/blog/tag/api-security)API Security- [Governance](/blog/tag/governance)Governance- [Observability](/blog/tag/observability)Observability

## More on this topic

_Videos_

## Secure and Govern APIs

_Videos_

## Security Observability: Securing Your Cloud Native Apps and APIs

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [API Security](/blog/tag/api-security)API Security- [Governance](/blog/tag/governance)Governance- [Observability](/blog/tag/observability)Observability
Kong

Recommended posts

# Layered Security Strategy for Managing APIs

[Engineering](/blog)EngineeringDecember 21, 2023

This post is part of a series on becoming a secure API-first company. For a deeper dive, check out the eBook Leading Digital Transformation: Best Practices for Becoming a Secure API-First Company. As APIs have become mission-critical , securing th

Kong
[](https://konghq.com/blog/engineering/layered-security-for-managing-apis)

# Practical Strategies to Monetize AI APIs in Production

[Engineering](/blog)EngineeringMarch 27, 2026

Traditional APIs are, in a word, predictable. You know what you're getting: Compute costs that don't surprise you Traffic patterns that behave themselves Clean, well-defined request and response cycles AI APIs, especially anything that runs on LLMs

Deepanshu Pandey
[](https://konghq.com/blog/engineering/monetize-ai-apis)

# Connecting Kong and Solace: Building Smarter Event-Driven APIs

[Engineering](/blog)EngineeringMarch 20, 2026

Running Kong in front of your Solace Broker adds real benefits: Authentication & Access Control – protect your broker from unauthorized publishers. Validation & Transformation – enforce schemas, sanitize data, and map REST calls into event topics.

Hugo Guerrero
[](https://konghq.com/blog/engineering/smarter-event-driven-apis-kong-solace)

# Reduce API Security Risks with Standardized Governance

[Enterprise](/blog)EnterpriseAugust 18, 2023

APIs serve as the foundation for how software systems and services communicate and exchange data. But unmanaged and unsecured APIs can open up massive vulnerabilities that lead to disastrous security breaches and data leaks without proper governance

Kong
[](https://konghq.com/blog/enterprise/reduce-api-security-risks-with-standardized-governance)

# Evaluating API Testing Tools: Insomnia vs Postman

[Enterprise](/blog)EnterpriseMarch 26, 2026

Free collaboration with Postman — a myth On March 1st, 2026, Postman discontinued free collaboration for small teams. Now , Git or Cloud-native collaboration requires a Team plan starting at $19 per person per month. That means even a 3-person team

Haley Giuliano
[](https://konghq.com/blog/enterprise/insomnia-vs-postman-evaluating-api-testing-tools)

# From Chaos to Control: How Kong AI Gateway Streamlined My GenAI Application

[Engineering](/blog)EngineeringOctober 6, 2025

🚧 The challenge: Scaling GenAI with governance While building a GenAI-powered agent for one of our company websites, I integrated components like LLM APIs, embedding models, and a RAG (Retrieval-Augmented Generation) pipeline. The application was d

Sachin Ghumbre
[](https://konghq.com/blog/engineering/how-kong-ai-gateway-streamlined-my-genai-application)

# Federated Deployments with Control Plane Groups

[Engineering](/blog)EngineeringSeptember 24, 2025

What are Control Plane Groups? Control Plane Groups in Kong Konnect provide a structured way to manage multiple control planes within a single organization. Think of it as a federated approach: different teams can deploy and manage their own APIs wh

Declan Keane
[](https://konghq.com/blog/engineering/kong-konnect-control-plane-groups)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo
Ask AI for a summary of Kong
  • [](https://chatgpt.com/s/t_69b981cfa37081919ce25ce107c431c1)
  • [](https://share.google/aimode/hyefOiNwl8pg8W99d)
  • [](https://www.perplexity.ai/search/what-solutions-does-kong-offer-VsYWPddxQjajgvLA4B9hjQ)
Stay connected

## step-0

    • Company
    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
    • Legal
    • [Terms](/legal/terms-of-use)Terms
    • [Privacy](/legal/privacy-policy)Privacy
    • [Trust and Compliance](https://trust.konghq.com)Trust and Compliance
    • Platform
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
    • Compare
    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
    • Explore More
    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • Open Source
    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Kong enables the connectivity layer for the agentic era – securely connecting, governing, and monetizing APIs and AI tokens across any model or cloud.

  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode