At scale β hundreds of services, dozens of teams, multiple regions β consistent API security depends on infrastructure, not per-service discipline. API gateways and service meshes provide that infrastructure: centralized auth, traffic management, observability, and policy enforcement. This module covers the major API gateway products in 2026, service mesh patterns, and zero-trust architecture for APIs.
What an API gateway provides
- Single entry point for clients β clients hit gateway, not backends directly
- AuthN / AuthZ enforcement centralised β JWT validation, OAuth introspection, API key check
- Rate limiting + quota β per-consumer policies in one place
- Request/response transformation β header injection, body shape changes
- Observability β every request logged, metric’d, traced
- Routing β path-based, header-based to specific backend services
- Caching β at the edge for read-heavy endpoints
- Circuit breaking β failing backends isolated from cascading failure
Major API gateways in 2026
Cloud-managed
- AWS API Gateway β REST + HTTP + WebSocket APIs; integrates with Lambda, AppSync; expensive at high scale
- Azure API Management β full lifecycle (developer portal, versioning, monetization); strong policy engine
- GCP API Gateway / Apigee β Apigee is the heavyweight enterprise tool; basic API Gateway is the budget option
Self-hosted / open source
- Kong Gateway β Lua-based plugins, broad ecosystem; Konnect SaaS variant
- Tyk β Go-based, lightweight, multi-tenant friendly
- KrakenD β Go-based aggregator-style; strong for backend-for-frontend (BFF) patterns
- Envoy β not a gateway but the underlying proxy used by many; Gloo / Contour build gateways on it
- Traefik β Kubernetes-native ingress + gateway features
Service mesh β east-west traffic security
API gateways handle north-south (client to first service). Service meshes handle east-west (service to service inside the network). What a mesh provides:
- mTLS everywhere β automatic cert provisioning, rotation, enforcement between services
- Service identity β every service has a SPIFFE-style identity
- Traffic policy β which service can call which; deny by default
- Observability β distributed tracing without instrumenting code
- Resilience β retries, timeouts, circuit breaking centrally configured
Major mesh products
- Istio β most feature-rich, also most complex. Sidecar architecture (Envoy proxy injected into every pod)
- Linkerd β lighter-weight alternative; Rust-based proxy; faster, simpler, fewer features
- Consul Connect β HashiCorp’s mesh; integrates with Consul service discovery
- Cilium Service Mesh β eBPF-based; no sidecar overhead; gaining adoption
- App Mesh (AWS) β managed mesh; lock-in but operational simplicity
Zero-trust API architecture
Zero-trust principles applied to APIs:
Continue reading with Basic tier (βΉ499/month)
You've read 25% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.