REGISTER NOW FOR THE KONG AGENTIC ERA WORLD TOUR GOVERN A2A TRAFFIC WITH KONG'S NEW AGENT GATEWAY WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • [Why Kong](/company/why-kong)Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/products/kong-insomnia/api-design)
          API Design
        • [
          API Mocking](/products/kong-insomnia/api-mocking)
          API Mocking
        • [
          API Testing and Debugging](/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • [
          MCP Client](/products/kong-insomnia/mcp-client)
          MCP Client
        • RUN APIs
        • [
          API Gateway](/products/kong-gateway)
          API Gateway
        • [
          Context Mesh](/products/kong-konnect/features/context-mesh)
          Context Mesh
        • [
          AI Gateway](/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • [
          MCP Registry](/products/mcp-registry)
          MCP Registry
        • GOVERN APIs
        • [
          Metering and Billing](/products/kong-konnect/features/usage-based-metering-and-billing)
          Metering and Billing
        • [
          APIOps and Automation](/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Considering AI Gateway alternatives? ](/performance-comparison/ai-gateway-alternatives)Considering AI Gateway alternatives?
      • [Kong vs. Postman](/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [AI Connectivity](/ai-connectivity)AI Connectivity
      • [Open Banking](/solutions/open-banking)Open Banking
      • [Legacy Migration](/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [API Monetization](/solutions/api-monetization)API Monetization
      • [AI Monetization](/solutions/ai-monetization)AI Monetization
      • [AI FinOps](/solutions/ai-cost-governance-finops)AI FinOps
      • FOR AI TEAMS
      • [Agent Gateway](/agent-gateway)Agent Gateway
      • [AI Governance](/solutions/ai-governance)AI Governance
      • [AI Security](/solutions/ai-security)AI Security
      • [AI Cost Control](/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic Infrastructure](/solutions/agentic-ai-workflows)Agentic Infrastructure
      • [MCP Production](/solutions/mcp-production-and-consumption)MCP Production
      • [MCP Traffic Gateway](/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/solutions/financial-services-industry)Financial Services
      • [Healthcare](/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/solutions/insurance)Insurance
      • [Manufacturing](/solutions/manufacturing)Manufacturing
      • [Retail](/solutions/retail)Retail
      • [Software & Technology](/solutions/software-and-technology)Software & Technology
      • [Transportation](/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/solutions)See all Solutions
  • [Pricing](/pricing)Pricing
      • DOCUMENTATION
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Event Gateway](https://developer.konghq.com/event-gateway/)Kong Event Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • EXPLORE
      • [Blog](/blog)Blog
      • [Learning Center](/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Customer Stories](/customer-stories)Customer Stories
      • [Videos](/resources/videos)Videos
      • EVENTS
      • [API + AI Summit](/events/conferences/api-ai-summit)API + AI Summit
      • [Agentic Era World Tour](/agentic-era-world-tour)Agentic Era World Tour
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • FOR DEVELOPERS
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
      • COMPANY
      • [About Us](/company/about-us)About Us
      • [We're Hiring!](/company/careers)We're Hiring!
      • [Press Room](/company/press-room)Press Room
      • [Contact Us](/company/contact-us)Contact Us
      • [Kong Partner Program](/partners)Kong Partner Program
      • [Enterprise Support Portal](https://support.konghq.com/s/)Enterprise Support Portal
      • [Documentation](https://developer.konghq.com/?_gl=1*tphanb*_gcl_au*MTcxNTQ5NjQ0MC4xNzY5Nzg4MDY0LjIwMTI3NzEwOTEuMTc3MzMxODI2MS4xNzczMzE4MjYw*_ga*NDIwMDU4MTU3LjE3Njk3ODgwNjQ.*_ga_4JK9146J1H*czE3NzQwMjg1MjkkbzE4OSRnMCR0MTc3NDAyODUyOSRqNjAkbDAkaDA)Documentation
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Book Demo](/contact-sales)Book Demo
  • [Get Started](/products/kong-konnect/register)Get Started
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [Event Gateway](/blog/tag/event-gateway)Event Gateway
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Enterprise
  4. Reduce API Security Risks with Standardized Governance
[Enterprise](/blog/enterprise)Enterprise
August 18, 2023
8 min read

# Reduce API Security Risks with Standardized Governance

Kong

APIs serve as the foundation for how software systems and services communicate and exchange data. But unmanaged and unsecured APIs can open up massive vulnerabilities that lead to disastrous security breaches and data leaks without proper governance.

With API-related attacks increasing — and set to [increase 996% by 2030](https://konghq.com/blog/enterprise/apis-are-mission-critical)increase 996% by 2030 — unmanaged APIs are a very real security threat. How do you implement reliable API security without slowing down innovation or blowing up costs?

The answer lies in standardization. In this post, we'll talk about how taking a standardized approach to [API security risks](https://konghq.com/blog/engineering/api-security-risks-and-how-to-mitigate-them)API security risks and governance can help organizations reduce risk, accelerate time-to-market, and lower costs.

## What is API standardization?

API standardization involves creating (and adhering to) guidelines intended to ensure consistency, interoperability, and reliability in the design, development, and usage of APIs.

Standardizing APIs helps create a common framework that developers, applications, and systems can follow. This leads to a higher quality level and more reliability in API development.

Other benefits of API standardization include reduced complexity, increased ease of adoption, easier scalability, and (of course) increased security.

## Why standardized API governance matters

API governance involves the processes and policies for overseeing APIs throughout their entire lifecycle. This includes establishing proper authentication, authorization, audit logging, rate limiting, and other forms of access control.

With effective governance in place, companies can track all APIs in use across environments, set and enforce security policies, monitor for suspicious activity, and optimize how APIs are consumed. Standardizing this approach helps unify often fragmented efforts from individual teams and systems.

### Common root causes behind API vulnerabilities

There are a few key factors that commonly contribute to API security gaps:

  • - **Rapid pace of change** — The API landscape changes quickly, with new interfaces constantly added as teams release features and integrate with internal/external systems. This makes API governance difficult to track.
  • - **Complexity** — Modern architectures are complex, with many different services and endpoints. Microservices exacerbate sprawl.
  • - **Lack of visibility** — IT often lacks visibility into all APIs in use and how they're secured (or not secured).
  • - **Missed patches** — Much like operating systems and apps, APIs need regular patches and upgrades to fix vulnerabilities. Neglecting these allows risks to persist.
  • - **User error **— Ah, that old reliable classic of security gaps everything: user error. Misconfigurations and oversights during implementation can inadvertently introduce security holes.
  • - **Complacency** — Because APIs serve internal needs, organizations often underestimate their exposure. A lack of due diligence around governance magnifies risks.
  • - **Legacy architectures** — Monolithic applications with large attack surfaces pose bigger risks, necessitating modernization.
  • - **Complexity of identity **— Juggling internal and external user access, SSO, and robust authentication creates gaps that attackers exploit.

These challenges (and more) lead to APIs being rolled out without adequate protections in place. The consequences of exposed APIs can be severe — from data breaches, to regulatory non-compliance, to degraded services, and irate customers.

## Security benefits of standardizing API governance

Standardizing API governance comes with a bevy of security benefits. By ensuring consistent application of security protocols (like authentication, authorization, and encryption), API governance standardization helps reduce vulnerabilities — and therefore the risk of a breach.

And since the standardization process calls for regular security audits, threat assessments, and vulnerability testing, organizations are more likely to detect and mitigate potential risks earlier than they might have otherwise.

By clearly laying out security guidelines related to data protection, access controls, and secure coding best practices, API governance standardization creates a solid security foundation — allowing for greater resilience of the API ecosystem again security threats.

### Other benefits of standardizing API governance

The benefits of standardization go well beyond security, with other benefits realized including an improved developer experience, superior user experiences, and a reduction in time and costs.

### Improved developer experience

Standardizing API security and governance simplifies development in a few key ways.

  • - **Remove redundancy **— Developers don’t have to reinvent the wheel for each project/API. Common protocols, plugins, authentication, etc. are defined once.
  • - **Promote reuse** — Developers can build on established standards and shared libraries of governance/security code rather than coding from scratch.
  • - **Speed onboarding** — New developers get up and running faster when standards are clearly documented. They don’t have to learn bespoke implementations.
  • - **Clarity on requirements** — Standards provide clear guidance on which security measures are mandated for different API types/use cases. This removes ambiguity.
  • - **Allow focus on core logic** – Standards handle the heavy lifting, so developers don’t get bogged down implementing customized security controls.
  • - **Facilitate collaboration** — Team members are aligned on shared frameworks and policies when building APIs together.
  • - **Platform enforcement** — Much of the security adherence can be automatically enforced by gateways like Kong when compared to manual reviews.

Overall, standardization gives developers a proven blueprint, tools, and guardrails that make incorporating security into API development a more systematic (versus ad-hoc) process. It provides efficiency and clarity. Automation then scales this efficiently across many APIs.

### Reduce time and costs

Here are some of the key ways standardizing API security and governance can reduce costs and accelerate time-to-market.

**Reduces costs**

  • - Eliminates redundant development work for security features that are standardized.
  • - Lowers operational and personnel expenses from systematized processes versus ad-hoc security.
  • - Consolidates tools and platforms like Kong for economies of scale.
  • - Automates implementation of standards policies so less manual effort.
  • - Enables easier integration and interoperability between systems.
  • - Leverages shared security libraries and protocols vs building from scratch.

**Speeds time-to-market**

  • - Removes the need to develop custom security controls for each API.
  • - Onboarding new developers is faster with standardized frameworks.
  • - Promotes collaboration and alignment between teams.
  • - Automated governance speeds up compliance and the launch of new APIs.
  • - Change management can be implemented quickly across APIs.
  • - New features and endpoints can build on existing standards.
  • - Fosters reuse that accelerates development lifecycles.

Overall, standardization and automation provide efficiency, clarity, and economies of scale. This directly translates into lower costs and a faster ability to get new APIs and products to market in a secure manner.

### Improved user experience

Standardizing API security and governance can also improve the end–user experiences in a few key ways:

  • - **Enhance reliability** — Consistent security means apps and services are less vulnerable to outages and breaches that disrupt users.
  • - **Improve performance **— Standardized protocols are optimized for speed and efficiency versus ad-hoc solutions.
  • - **Facilitate scalability** — Standardization allows the app to scale rapidly without security bottlenecks.
  • - **Simplify integration** — Common standards enable seamless integration between apps and services from a user perspective.
  • - **Increase usability** — Standards enable single sign-on and unified identity management.
  • - **Reduces friction —** Standard authentication eliminates redundant login prompts and complexity.
  • - **Builds trust****—** Users feel more secure knowing standards are applied consistently across the application.
  • - **Promotes innovation****—** Developer time spent on security standards means more time for user-focused features.
  • - **Prioritizes user experience —** Developer resources go towards core user functionality vs security mechanisms.
  • - **Enables personalization****—** Context-based standards allow fine-grained customization of user experience.

By leveraging standardized components, developers can focus on optimization and innovation that improves the user experience end-to-end. Security becomes an enabler rather than a bottleneck. The result? Apps that are more robust, usable, and tailored for the user.

In essence, API governance allows organizations to maximize the business benefits of APIs while minimizing security risks and technology debt. But all too often, companies approach governance in a fragmented way, with policies varying widely across environments and teams. This leads to gaps that malicious actors exploit.

That's why implementing standardized API governance is critical — it provides comprehensive security and oversight scalably across an entire organization.

## Path to API governance and security maturity

When standardizing API governance, following core principles and best practices helps ensure success.

### 5 key principles for API governance success

Adhering to these principles will help establish effective API governance that balances security, productivity, and adoption across the organization.

  • - **Start with discovery **— The first step is discovering all APIs in use across the organization, what they connect to, who owns them, and their current security levels. An inventory provides visibility.
  • - **Take an iterative approach —** Governance capabilities should be rolled out incrementally over time. Prioritize quick wins first and build towards an end-state vision.
  • - **Enable self-service **— Make it easy for developers to implement governance policies in a standardized way during API development, without bottlenecks.
  • - **Default to secure **— APIs should default to employing authorization, SSL, rate limiting, etc. — unless explicitly excluded for specific business reasons.
  • - **Continuously monitor** — Utilize tools to monitor API activity, detect anomalies, identify misconfigurations, and alert on policy violations.

### 3 steps to API governance and security maturity

Here are three key steps organizations should take to advance API governance and security maturity:

  • - **Establish central oversight — **Consolidate fragmented efforts into a center of excellence for managing APIs securely and consistently. Audit current posture and processes to identify gaps.
  • - **Standardize protection — **Leverage tools like Kong Enterprise to implement standardized authentication, SSL, rate limiting, and other protections across all APIs. Promote a secure-by-default culture.
  • - **Continuously monitor and optimize — **Monitor API activity for policy violations, unwanted usage patterns, and early attack indicators. Regularly tune policies to optimize security and performance.

Taking these steps will help transform API security from an ad-hoc collection of individual efforts into a mature governance model that enables innovation and protects the business.

## How to achieve automated standardization

[Choosing the right API gateway](https://konghq.com/blog/enterprise/how-to-choose-an-api-gateway)Choosing the right API gateway is important when it comes to achieving automated standardization. The right API management platform is basically like having your own expert guide to creating APIs. Many options are packed with ready-to-use templates and rules that follow standard practices, making it simple for developers. In this way, the[ best API gateway or API management platform](https://konghq.com/company/why-kong) best API gateway or API management platform for your needs ensures you can not only make APIs quickly but keep them secure, consistent, and error-free.

Many major enterprises, from [fintech](https://konghq.com/blog/enterprise/api-security-management-fintech)fintech to retail, healthcare, and technology have leveraged Kong to implement robust, consistent API governance across their organizations. Here are a few success stories.

[Grupo Globo](https://konghq.com/resources/case-study/globo-centralizes-service-connectivity-security-with-kong)Grupo Globo

  • - Implemented OpenID Connect integration to maintain consistent security across all business lines
  • - Reduced application deployment cycles from days down to just hours
  • - Created a "digital hub" for centralized management of APIs

[Fubon Financial](https://konghq.com/resources/case-study/fubon-financial-focuses-on-security-and-standardization-with-kong-enterprise)Fubon Financial

  • - Replaced cumbersome manual firewall configurations with Kong for centralized policy orchestration
  • - Lowered operational costs while accelerating the release of new features

[First Abu Dhabi Bank](https://konghq.com/resources/case-study/first-abu-dhabi-bank-accelerates-cloud-connectivity-with-kong)First Abu Dhabi Bank

  • - Reduced mobile app onboarding timeframes from 7 months down to just 3 months
  • - Cut costs substantially while speeding time to market
  • - Managed 200+ APIs across multiple data centers consistently

Rakuten

  • - Uses Kong for core security, traffic control, and observability for 70+ internal APIs
  • - Optimized API consumption, reduced costs, and prevented outages
  • - Accelerated innovation cycles and time-to-market for new apps

These examples showcase how the right API platform can provide tangible improvements in governance, system visibility, speed of innovation, and bottom-line cost savings when applied to securing APIs.

### Conclusion

APIs now serve as the connective tissue integrating most modern applications and services, both within organizations and externally with partners. However, exposing unmanaged and unsecured APIs can lead to devastating breaches and systemic risk.

Implementing centralized, consistent API governance provides protection at scale for businesses. Kong gives organizations an integrated platform for governing all APIs and microservices securely while gaining invaluable visibility across environments.

With capabilities like declarative policy definition, authentication integration, granular access control, and sophisticated traffic monitoring, Kong allows organizations to standardize critical governance while preventing API risks and accelerating innovation. By following best practices around governance, businesses can adopt APIs safely and strategically.

Want to learn Learn more about how Kong can help your organization adopt a standardized approach to API security and governance? [Get a demo](https://konghq.com/contact-sales)Get a demo today.

Or check out the free, on-demand webinar [*Reducing Costs with a Standardized Approach to API Security and Governance*](https://konghq.com/resources/webinar/reduce-cost-through-api-security-and-governance)*Reducing Costs with a Standardized Approach to API Security and Governance* for a deeper dive into understanding the ins and outs of standardized API security and governance.

## Developer agility meets compliance and security. Discover how Kong can help you become an API-first company.

[Get a Demo](/contact-sales)Get a Demo[Start for Free](/products/kong-konnect/register)Start for Free
- [API Security](/blog/tag/api-security)API Security- [Governance](/blog/tag/governance)Governance- [Observability](/blog/tag/observability)Observability

## More on this topic

_Videos_

## Moving Beyong the API Gateway to an API Platform

_Demos_

## How Should API Gateways And Service Mesh Fit Into Your API Platform?

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [API Security](/blog/tag/api-security)API Security- [Governance](/blog/tag/governance)Governance- [Observability](/blog/tag/observability)Observability
Kong

Recommended posts

# The Incessant AI Death Knell

[Enterprise](/blog)EnterpriseApril 8, 2026

CLIs, MCP, and the Real Governance Tradeoffs Shaping Enterprise AI Agents The CLI case is real Let's start with the strongest version of the CLI argument. For well-known tools baked into model training data (e.g., git, grep, curl, jq, docker, kub

Michael Field
[](https://konghq.com/blog/enterprise/cli-vs-mcp-enterprise-ai-governance)

# Evaluating API Testing Tools: Insomnia vs Postman

[Enterprise](/blog)EnterpriseMarch 26, 2026

Free collaboration with Postman — a myth On March 1st, 2026, Postman discontinued free collaboration for small teams. Now , Git or Cloud-native collaboration requires a Team plan starting at $19 per person per month. That means even a 3-person team

Haley Giuliano
[](https://konghq.com/blog/enterprise/insomnia-vs-postman-evaluating-api-testing-tools)

# Layered Security Strategy for Managing APIs

[Engineering](/blog)EngineeringDecember 21, 2023

This post is part of a series on becoming a secure API-first company. For a deeper dive, check out the eBook Leading Digital Transformation: Best Practices for Becoming a Secure API-First Company. As APIs have become mission-critical , securing th

Kong
[](https://konghq.com/blog/engineering/layered-security-for-managing-apis)

# OWASP API Security Top 10: Mitigating Risks with Kong

[Engineering](/blog)EngineeringAugust 10, 2023

The Open Web Application Security Project (OWASP for short) is a not-for-profit entity devoted to improving the security of software. Founded in 2001, OWASP is a global organization that supports thousands of volunteers globally to produce freely a

Kong
[](https://konghq.com/blog/engineering/owasp-top-10-api-security-2023)

# Kong A2A and MCP Metrics: Visibility and Governance for AI Tool Adoption at Scale

[Product Releases](/blog)Product ReleasesApril 23, 2026

When an organization deploys AI agents at scale, high uptime and low latency are an important baseline. However, Platform owners and business stakeholders could be flying blind on several fronts: The Insights Gap: Non-technical stakeholders have li

Amit Shah
[](https://konghq.com/blog/product-releases/kong-ai-governance-metrics-a2a-mcp)

# Automating Agreement Workflows with Kong Konnect and Docusign for Developers

[Engineering](/blog)EngineeringApril 16, 2026

Traditional agreement processes were slow and heavily manual. Documents were often created in office tools, shared through email, printed, signed physically, and stored across multiple systems. Tracking the status of agreements required manual follo

Paige Rossi
[](https://konghq.com/blog/engineering/automating-agreement-workflows-kong-konnect-and-docusign-for-developers)

# No More Static Secrets: Kong Expands Cloud-Native Authentication Support

[Engineering](/blog)EngineeringApril 15, 2026

How Kong Gateway 3.14 closes the consistency gap in IAM-based authentication across AWS, Azure and GCP — and what it means for your production deployments Starting with 3.13 (which addressed Redis support) and completed in 3.14, Kong now presents

Walker Zhao
[](https://konghq.com/blog/engineering/cloud-native-authentication)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo

## step-0

  • ## Company

    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
      • Terms
      • Privacy
      • Trust and Compliance
  • ## Platform

    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
  • ## Compare

    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
  • ## Explore More

    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
  • ## Open Source

    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Kong enables the connectivity layer for the agentic era – securely connecting, governing, and monetizing APIs and AI tokens across any model or cloud.

  • English
  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode