5 Best Practices for Securing Microservices at Scale in 2025

TL;DR Secure microservices at scale with these five proven practices: Build Complete Architecture Visibility - Map all services and dependencies to identify security gaps Implement Zero Trust Authentication - Verify every request between services using mTLS and centralized identity Create…
Federated Deployments with Control Plane Groups

In this blog post, we'll talk about the significant challenge of managing and governing a growing number of APIs across multiple teams in an organization — and how Control Plane Groups are a clear solution to avoid the chaos of inconsistent policies and operational bottlenecks. Scaling your API…
API Management as a Central Security Hub

While many organizations mistakenly believe a single tool can solve all their API security woes, the truth is far more complex. This blog post will dismantle the myth of the "silver bullet" and demonstrate how a comprehensive, defense-in-depth strategy, centered around a robust API management…
What is API Security?

APIs are the digital lifelines powering modern applications, microservices, IoT devices, and everything in between. They act as the universal translators of data, ferrying information between diverse software platforms. API security encompasses the technologies, practices, and protocols dedicated…
Create an Internal API and Service Inventory with Konnect Service Catalog

When speaking with our customers, and particularly with platform teams, we repeatedly hear about how difficult it is to discover and govern all the services and APIs that actively run on their infrastructure. In ever-expanding and changing environments, platform teams often grapple with the…
Kong Event Gateway: Unifying APIs and Events in a Single API Platform

Kong customers include some of the most forward-thinking, tech-savvy organizations in the world. And while we’re proud to help them innovate through traditional APIs, the reality is that their ambitions don’t stop there. Increasingly, our customers are investing heavily in real-time data and event…
Implementing an Open Source Vulnerability Management Strategy

Open source software has become an indispensable component of modern software development. With its easy accessibility, it offers numerous benefits such as cost savings, flexibility, and collaborative innovation. Since the use of open source components has become so mainstream, it poses some unique…
Ensuring Tenant Scoping in Kong Konnect Using Row-Level Security

In the SaaS world, providers must offer tenant isolations for their customers and their data. This is a key requirement when offering services at scale. At Kong, we've invested a lot of time to provide a scalable and seamless approach for developers to avoid introducing breaches in our systems. In…
RBAC Explained: The Basics of Role-Based Access Control

As cybersecurity takes the main stage, organizations face a significant challenge: how do you strike a balance between maintaining a high level of security and ensuring employees have enough data access to perform their jobs properly? Role-based access control (RBAC) is a solution that can support…
Kong Insomnia 11: Elevating API Security and Collaboration

We’re excited to announce the general availability of Kong Insomnia 11! This release introduces third-party vault integrations for enhanced security, an all-new Git sync experience for more seamless collaboration, and support for multi-tabs to improve efficiency within the Insomnia application.…
Building and Running Secure APIs with Kong and Traceable

Cloud native application development relies heavily on APIs. APIs have proven themselves as a scalable and efficient way to capture, deploy, and scale functionality. Consequently, APIs became a target for malicious actors to misuse. Therefore, building quality APIs with adequate security controls…
How to Implement Secure Access Control with OPA and Kong Gateway

Ensuring secure access to applications and APIs is critical. As organizations increasingly adopt microservices architectures and cloud native solutions, the need for robust, fine-grained access control mechanisms becomes paramount. This is where the combination of Open Policy Agent (OPA) and Kong…