Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Policies

Latest

How to Manage Your API Policies with OPA (Open Policy Agent)

API ManagementOctober 18, 2024

APIs are essential to modern applications, but managing access and security policies can be complex. Traditional access control mechanisms can fall short when flexible, scalable, and fine-grained control over who can access specific resources is needed. This is where OPA (Open Policy Agent) steps…

Sven Bernhardt

Flexible Policy Match in Kuma 2.0

kuma background
KumaDecember 19, 2022

Kuma is configurable through policies. These enable users to configure their service mesh with retries, timeouts, observability, and more. Policies contain three main pieces of information: Which proxies are being configured What traffic for these proxies this configuration applies to (i.e:…

Charly Molter

What are API Gateway Policies?

Kong Logo
API GatewayMarch 10, 2022

An API Gateway is becoming an essential part of modern application architecture. It acts as a reverse proxy that routes API requests to appropriate backend services. Along with routing, API Gateways provide capabilities like security, monitoring, rate limiting, and more for your APIs. A major…

Kong

8 Common API Gateway Request Transformation Policies

API Gateway Request Transformation
API GatewayJuly 27, 2021

API gateway request transformation policies are incredibly powerful. There are many situations when an API developer can take advantage of request transformations to adjust the shape and values of a request to cleanly fit their API. Let’s say you’re deprecating a certain endpoint for your API, but…

Michael Heap

Subscribe to Kong’s newsletter

Stay ahead of API and AI Gateway trends. Get expert insights, technical guides, and best practices delivered to your inbox.

View All Policies Posts

Implementing Traffic Policies in Kubernetes

Traffic Policies in Kubernetes
KubernetesJune 30, 2021

When setting up Kubernetes for the first time, one of the networking challenges you might face is how to safely grant outside clients access to your cluster. By default, pods within a cluster can communicate with all other pods and services. You should restrict access to anything outside of that…

Cody De Arkland

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance•
  • © Kong Inc. 2025