{"id":15281,"date":"2025-04-30T09:43:15","date_gmt":"2025-04-30T07:43:15","guid":{"rendered":"https:\/\/www.intesys.it\/journal\/?p=15281"},"modified":"2025-04-30T09:44:33","modified_gmt":"2025-04-30T07:44:33","slug":"api-security-con-kong-api-gateway-e-intesys","status":"publish","type":"post","link":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/","title":{"rendered":"API Security: come Kong e Intesys proteggono gli ecosistemi digitali delle aziende"},"content":{"rendered":"<p><div id='wpig-contents' class='wpig-contents wpig-number-list wpig-no-hierarachy wpig-sidebar-widget wpig-style-1'><span class='wpig-headline'>Indice dei contenuti<\/span><!-- Table of Contents --><div id='wpig-table-of-content' class='wpig-table-of-content' ><ol><li class='stoc-sicurezza-delle-api-un-rischio-crescente-e-talvolta-sottovalutato'><a href='#stoc-sicurezza-delle-api-un-rischio-crescente-e-talvolta-sottovalutato'>Sicurezza delle API, un rischio crescente (e talvolta sottovalutato)<\/a><\/li><li class='stoc-come-approcciare-lapi-security-in-5-step'><a href='#stoc-come-approcciare-lapi-security-in-5-step'>Come approcciare l\u2019API Security in 5 step<\/a><\/li><li class='stoc-lapi-gateway-come-perno-della-difesa-multi-layer'><a href='#stoc-lapi-gateway-come-perno-della-difesa-multi-layer'>L&#8217;API gateway come perno della difesa multi-layer<\/a><\/li><li class='stoc-kong-api-gateway-una-piattaforma-solida-per-la-sicurezza-delle-api'><a href='#stoc-kong-api-gateway-una-piattaforma-solida-per-la-sicurezza-delle-api'>Kong API Gateway: una piattaforma solida per la sicurezza delle API<\/a><\/li><li class='stoc-il-valore-strategico-di-intesys-nella-api-security'><a href='#stoc-il-valore-strategico-di-intesys-nella-api-security'>Il valore strategico di Intesys nella API security<\/a><\/li><\/ol><\/div><!-- END OF Table of Contents --><\/div><\/p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]In quanto perno degli ecosistemi digitali moderni, le API sono il bersaglio di attacchi sempre pi\u00f9 sofisticati e hanno reso la API security una priorit\u00e0 assoluta per molte aziende. In questo articolo analizziamo le principali minacce e vediamo come affrontarle grazie a un approccio che combina l\u2019esperienza e la visione di Intesys con la solidit\u00e0 della piattaforma Kong.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-sicurezza-delle-api-un-rischio-crescente-e-talvolta-sottovalutato\" class=\"wpig-heading\">Sicurezza delle API, un rischio crescente (e talvolta sottovalutato)<\/h2>\n<p>Le API sono il principale vettore di interconnessione tra sistemi IT, ma anche una porta d\u2019accesso per gli attori malevoli. Visto che le API generano l\u2019<a href=\"https:\/\/konghq.com\/blog\/enterprise\/why-kong-is-the-best-api-gateway\" target=\"_blank\" rel=\"noopener\">83% di tutto il traffico internet<\/a>, \u00e8 palese che una governance inadeguata aumenti esponenzialmente il rischio: KONG prevede addirittura <strong>un <a href=\"https:\/\/konghq.com\/blog\/enterprise\/apis-are-mission-critical\" target=\"_blank\" rel=\"noopener\">incremento del 996% degli attacchi API<\/a> tra il 2021 e il 2030 (+31% ogni anno)<\/strong>, a testimonianza di una superficie che cresce pi\u00f9 rapidamente della capacit\u00e0 di difesa.<\/p>\n<p>Non sorprende che molte violazioni registrate negli ultimi anni abbiano avuto come punto di accesso proprio le API. \u00c8 il caso delle vulnerabilit\u00e0 scoperte nel <a href=\"https:\/\/www.securityjourney.com\/post\/kias-web-portal-vulnerability-a-wake-up-call-for-api-security\" target=\"_blank\" rel=\"noopener\">portale web Kia<\/a> (giugno 2024), che hanno permesso ai ricercatori di controllare da remoto funzioni critiche delle auto, oppure \u2013 per andare su un caso malevolo \u2013 il data breach subito da <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-hacked-to-steal-data-of-37-million-accounts-in-api-data-breach\/\" target=\"_blank\" rel=\"noopener\">T-Mobile<\/a>, in cui un\u2019API non adeguatamente protetta ha consentito l\u2019esfiltrazione dei dati di oltre 37 milioni di clienti.<\/p>\n<p><strong>Il panorama delle minacce, dal canto suo, \u00e8 ampio e in continua evoluzione<\/strong>. Tra quelle pi\u00f9 insidiose troviamo gli accessi non autorizzati, che avvengono spesso a causa di <strong>meccanismi di autenticazione deboli o assenti<\/strong>. Non meno gravi sono i <em>denial of service<\/em> (<strong>DoS<\/strong>), capaci di rendere indisponibili servizi critici, e gli <strong>injection attack<\/strong>, che compromettono l\u2019integrit\u00e0 dei dati.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_image=&#8221;13704&#8243; bg_position=&#8221;left top&#8221; background_image_loading=&#8221;default&#8221; bg_repeat=&#8221;no-repeat&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; color_overlay=&#8221;#000000&#8243; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.5&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-4-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; constrain_group_2=&#8221;yes&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;10304&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;custom&#8221; max_width_custom=&#8221;35%&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h5 id=\"stoc-storia-di-trasformazione-digitale\" class=\"wpig-heading\">STORIA DI TRASFORMAZIONE DIGITALE<\/h5>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_custom_heading text=&#8221;Automatizzare i rilasci e i test di un API Gateway&#8221; font_container=&#8221;tag:h3|font_size:34px|text_align:left|color:%23ffffff|line_height:42px&#8221; use_theme_fonts=&#8221;yes&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;see-through-2&#8243; color_override=&#8221;#ffffff&#8221; hover_color_override=&#8221;#17fdb4&#8243; hover_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;none&#8221; text=&#8221;SCOPRI IL CASO&#8221; margin_top=&#8221;30&#8243; url=&#8221;https:\/\/www.intesys.it\/portfolio\/automatizzare-rilasci-api-gateway-compagnia-assicurativa\/&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-come-approcciare-lapi-security-in-5-step\" class=\"wpig-heading\">Come approcciare l\u2019API Security in 5 step<\/h2>\n<p>L\u2019API Security \u00e8 un insieme di best practice, tool e policy volte a proteggere le interfacce applicative di un\u2019organizzazione. \u00c8 una disciplina articolata, che tocca aspetti tecnici e organizzativi, e che soprattutto <strong>richiede una strategia precisa, strumenti solidi come <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/kong-gateway-le-caratteristiche-vincenti-di-un-api-gateway-moderno\/\" rel=\"noopener\">Kong Gateway<\/a> e l\u2019esperienza di partner competenti<\/strong>. Un approccio efficace all\u2019API Security si basa su cinque pilastri:[\/vc_column_text][nectar_icon_list color=&#8221;default&#8221; direction=&#8221;vertical&#8221; icon_size=&#8221;small&#8221; icon_style=&#8221;border&#8221;][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019043-7&#8243; tab_id=&#8221;1745999019044-1&#8243; header=&#8221;Conoscere il proprio ecosistema API&#8221;]Molte organizzazioni operano in ambienti distribuiti e frammentati, che portano alla proliferazione di shadow API e silos applicativi. Queste API, solitamente non documentate, rappresentano un rischio critico perch\u00e9 sfuggono a qualsiasi controllo. [\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019052-8&#8243; tab_id=&#8221;1745999019052-2&#8243; header=&#8221;Aggiornamento costante sulle vulnerabilit\u00e0&#8221;]Per sviluppare una strategia di sicurezza \u00e8 necessario <strong>conoscere le minacce<\/strong>. La <a href=\"https:\/\/owasp.org\/API-Security\/editions\/2023\/en\/0x11-t10\/\" target=\"_blank\" rel=\"noopener\">OWASP API Security Top 10<\/a> \u00e8 un punto di riferimento per <strong>identificare e prevenire le vulnerabilit\u00e0 pi\u00f9 comuni<\/strong>. L\u2019ultima versione evidenzia criticit\u00e0 importanti (es, la mancata autorizzazione a livello di oggetto), potenziali scenari d\u2019attacco e le relative misure di prevenzione, come il rate limiting, il load balancing e una corretta configurazione del gateway.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019058-2&#8243; tab_id=&#8221;1745999019059-0&#8243; header=&#8221;Integrare l\u2019API Security nel ciclo di sviluppo&#8221;]Lo sviluppo delle API si deve basare su un <strong><a href=\"https:\/\/www.intesys.it\/information-technology\/servizi-it\/api-management-e-api-security\/\" target=\"_blank\" rel=\"noopener\">approccio <em>security-first<\/em><\/a><\/strong>. A partire dalla scelta dell\u2019architettura (REST o SOAP) fino al design, alla scrittura del codice e alla gestione di tutte le fasi del ciclo di vita (<a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/api-lifecycle-e-utilizzi-ai\/\">API lifecycle<\/a>), ogni decisione deve essere presa <strong>considerando i potenziali vettori di attacco e i requisiti di protezione pi\u00f9 adatti.<\/strong>[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019064-7&#8243; tab_id=&#8221;1745999019064-6&#8243; header=&#8221;Centralizzare la gestione delle policy&#8221;]Una strategia di policy management centralizzata fa s\u00ec che tutte le API abbiano un livello di protezione adeguato, in linea con framework come Zero Trust o lo stesso OWASP Top 10.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019071-0&#8243; tab_id=&#8221;1745999019071-10&#8243; header=&#8221;Monitoring continuo&#8221;]La sicurezza non \u00e8 statica. Si richiedono audit regolari, strategie di <em>versioning<\/em> e processi di monitoraggio proattivo per individuare tempestivamente anomalie e vulnerabilit\u00e0.[\/nectar_icon_list_item][\/nectar_icon_list][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-lapi-gateway-come-perno-della-difesa-multi-layer\" class=\"wpig-heading\">L&#8217;API gateway come perno della difesa multi-layer<\/h2>\n<p><strong>L&#8217;<a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/api-gateway-benefici-servizio-gestito\/\">API gateway<\/a> ha un ruolo centrale in ottica di difesa perimetrale<\/strong>, poich\u00e9 riduce la superficie di attacco: intercetta il traffico in ingresso, applica controlli, impone regole di validazione e previene gli abusi sugli end-point esposti.<\/p>\n<p>Considerare il gateway un <em>firewall<\/em> avanzato sarebbe per\u00f2 limitante. Integrato all\u2019interno di <strong>una strategia strutturata di <a href=\"https:\/\/www.intesys.it\/information-technology\/servizi-it\/api-management-e-api-security\/\" target=\"_blank\" rel=\"noopener\">API management e API security<\/a><\/strong>, diventa un elemento chiave per spingersi oltre, abilitando modelli di sicurezza <em>multi-layer<\/em> (o <em>defense in depth<\/em>) i cui effetti si estendono fino agli strati pi\u00f9 profondi dell\u2019architettura IT. Per esempio, le <strong>logiche di autenticazione e autorizzazione<\/strong> possono essere propagate agli strati interni, garantendo coerenza nelle policy di accesso e riducendo i margini di errore; allo stesso modo, <strong>la crittografia dei dati pu\u00f2 essere applicata in modo capillare e uniforme<\/strong>, mentre il tracciamento delle attivit\u00e0 consente una visibilit\u00e0 <em>end-to-end<\/em> sui flussi di dati e richieste, facilitando l\u2019identificazione di anomalie.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-kong-api-gateway-una-piattaforma-solida-per-la-sicurezza-delle-api\" class=\"wpig-heading\">Kong API Gateway: una piattaforma solida per la sicurezza delle API<\/h2>\n<p><strong><a href=\"https:\/\/konghq.com\/\" target=\"_blank\" rel=\"noopener\">Kong<\/a> \u00e8 una piattaforma open-source<\/strong>, disponibile anche in versione enterprise, che si distingue per la sua flessibilit\u00e0, la scalabilit\u00e0 nativa e un vasto ecosistema di plugin. Strumenti come <em>Bot Detection, Injection Protection, IP Restriction e JSON Threat Protection<\/em> permettono di mitigare le minacce pi\u00f9 comuni e consolidare il perimetro di difesa. Di seguito, alcune caratteristiche distintive della sua piattaforma <a href=\"https:\/\/www.intesys.it\/information-technology\/tecnologie-sviluppo-software\/kong-api-gateway\/\" target=\"_blank\" rel=\"noopener\">Kong API Gateway<\/a> in ambito di security.[\/vc_column_text][nectar_icon_list animate=&#8221;true&#8221; color=&#8221;default&#8221; direction=&#8221;vertical&#8221; icon_size=&#8221;small&#8221; icon_style=&#8221;no-border&#8221;][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019129-6&#8243; tab_id=&#8221;1745999019129-6&#8243; icon_fontawesome=&#8221;fa fa-bullseye&#8221; header=&#8221;Autenticazione&#8221;]Kong offre diverse opzioni per implementare controlli di accesso avanzati e flessibili. Tramite plugin, la piattaforma supporta vari meccanismi, dalla <strong>basic authentication ai token HMAC, fino a standard consolidati come OAuth 2.0<\/strong>, permettendo di adattare il livello di protezione ad esigenze applicative specifiche. In contesti enterprise, Kong si integra con Identity Provider esterni come Okta o Keycloak.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019135-8&#8243; tab_id=&#8221;1745999019136-9&#8243; icon_fontawesome=&#8221;fa fa-money&#8221; header=&#8221;Gestione semplificata dei segreti&#8221;]Kong consente di centralizzare la gestione di token, password e chiavi API, integrandosi con tool come AWS Secrets Manager e HashiCorp Vault. In questo modo, i segreti non vengono mai esposti nei file di configurazione o nei log. [\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019139-9&#8243; tab_id=&#8221;1745999019140-1&#8243; icon_fontawesome=&#8221;fa fa-eye&#8221; header=&#8221;Rate limiting avanzato&#8221;]Grazie ai molteplici plugin <a href=\"https:\/\/docs.konghq.com\/hub\/kong-inc\/rate-limiting-advanced\/\" target=\"_blank\" rel=\"noopener\">dedicati al Rate Limiting<\/a>, \u00e8 possibile limitare il numero di richieste per client su base temporale, prevenendo abusi e attacchi DDoS.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019145-7&#8243; tab_id=&#8221;1745999019146-5&#8243; icon_fontawesome=&#8221;fa fa-eye&#8221; header=&#8221;Automazione delle policy con configurazione dichiarativa&#8221;]Kong supporta la configurazione dichiarativa, permettendo di definire le policy di sicurezza in file YAML o JSON. Questo approccio facilita l&#8217;automazione e l&#8217;integrazione delle configurazioni nei processi CI\/CD, assicurando coerenza e tracciabilit\u00e0 delle modifiche. [\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1745999019151-3&#8243; tab_id=&#8221;1745999019152-0&#8243; icon_fontawesome=&#8221;fa fa-eye&#8221; header=&#8221;Logging e monitoraggio avanzato&#8221;]Plugin dedicati permettono l\u2019integrazione con strumenti come Prometheus e Grafana, offrendo visibilit\u00e0 e alert in tempo reale per la sicurezza e le performance delle API. [\/nectar_icon_list_item][\/nectar_icon_list][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-il-valore-strategico-di-intesys-nella-api-security\" class=\"wpig-heading\">Il valore strategico di Intesys nella API security<\/h2>\n<p>Kong \u00e8 uno degli <strong>strumenti chiave che usiamo nei nostri progetti e integriamo (rapidamente) nell\u2019ecosistema IT<\/strong> delle aziende. \u00c8 una piattaforma solida e flessibile, che apprezziamo non soltanto per le sue caratteristiche intrinseche, ma anche per il suo potenziale strategico: Kong pu\u00f2 diventare un punto di<strong> snodo attorno al quale costruire una visione di sicurezza moderna, multilivello e integrata<\/strong>.<\/p>\n<p>Ed \u00e8 qui che Intesys fa la differenza: non ci limitiamo a integrare una piattaforma \u2013 per quanto centrale \u2013 ma guidiamo le aziende verso un <strong>approccio strutturato allo sviluppo, alla gestione e alla <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/evolvere-il-business-con-un-approccio-strategico-di-api-security\/\">sicurezza delle API<\/a><\/strong>. Negli anni, infatti, abbiamo accumulato un bagaglio solido di esperienze in molteplici ambiti, dallo sviluppo applicativo alla progettazione di API Architectures, ma senza trascurare l\u2019API Management e la Security by Design, integrando<a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/come-realizzare-approccio-api-first-attraverso-le-linee-guida-e-apiops\/\"> competenze anche in ambito DevOps<\/a>, automazione dei test e dei processi di rilascio.<\/p>\n<p>Questa ricchezza di competenze e di esperienze ci permette di offrire ai nostri clienti una vera e propria <strong>visione olistica sulla governance e la sicurezza delle API<\/strong>, un valore molto rilevante in contesti enterprise e regolamentati, dove \u00e8 essenziale progettare architetture che rispondano in modo rigoroso ai requisiti di auditing, compliance e controllo.<\/p>\n<p>Intesys, inoltre, non si limita a offrire consulenza, ma fornisce anche la <strong>solidit\u00e0 dei propri processi, delle metodologie e di servizi ad hoc<\/strong>\u00a0che aiutano le aziende ad ottenere il massimo valore possibile dalle loro API. Senza concedere nulla, ovviamente, sotto il profilo della sicurezza.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#000000&#8243; bg_image=&#8221;15225&#8243; bg_position=&#8221;left top&#8221; background_image_loading=&#8221;default&#8221; bg_repeat=&#8221;no-repeat&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; color_overlay=&#8221;rgba(0,0,0,0.01)&#8221; color_overlay_2=&#8221;rgba(0,0,0,0.01)&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.5&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-4-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; constrain_group_2=&#8221;yes&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;10304&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;custom&#8221; max_width_custom=&#8221;35%&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]SERVIZI IT[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_custom_heading text=&#8221;API Management e API Security&#8221; font_container=&#8221;tag:h3|font_size:34px|text_align:left|color:%23ffffff|line_height:42px&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;see-through-2&#8243; color_override=&#8221;#ffffff&#8221; hover_color_override=&#8221;#ffffff&#8221; hover_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;none&#8221; text=&#8221;SCOPRI COME POSSIAMO AIUTARTI&#8221; margin_top=&#8221;30&#8243; url=&#8221;https:\/\/www.intesys.it\/information-technology\/servizi-it\/api-management-e-api-security\/&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221;&#8230;<\/p>\n","protected":false},"author":25,"featured_media":15303,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[27],"tags":[52,54,56,61],"class_list":{"0":"post-15281","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-technology","8":"tag-api","9":"tag-api-gateway","10":"tag-api-management","11":"tag-api-security"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>I vantaggi di Kong e di un partner esperto per l&#039;API Security<\/title>\n<meta name=\"description\" content=\"API Security: scopri il ruolo di Kong API Gateway e di un partner IT esperto nel fare la differenza nelle strategie di protezione delle API\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"I vantaggi di Kong e di un partner esperto per l&#039;API Security\" \/>\n<meta property=\"og:description\" content=\"API Security: scopri il ruolo di Kong API Gateway e di un partner IT esperto nel fare la differenza nelle strategie di protezione delle API\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/\" \/>\n<meta property=\"og:site_name\" content=\"Intesys Journal\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-30T07:43:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T07:44:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Denis Signoretto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Denis Signoretto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/\",\"url\":\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/\",\"name\":\"I vantaggi di Kong e di un partner esperto per l'API Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/04\/API-security-KONG.png\",\"datePublished\":\"2025-04-30T07:43:15+00:00\",\"dateModified\":\"2025-04-30T07:44:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e50c847c2cf96e0a4714c385e1e12bc4\"},\"description\":\"API Security: scopri il ruolo di Kong API Gateway e di un partner IT esperto nel fare la differenza nelle strategie di protezione delle API\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#primaryimage\",\"url\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/04\/API-security-KONG.png\",\"contentUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/04\/API-security-KONG.png\",\"width\":1920,\"height\":1440,\"caption\":\"API security KONG\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intesys.it\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"API Security: come Kong e Intesys proteggono gli ecosistemi digitali delle aziende\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\",\"url\":\"https:\/\/www.intesys.it\/journal\/\",\"name\":\"Intesys\",\"description\":\"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intesys.it\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e50c847c2cf96e0a4714c385e1e12bc4\",\"name\":\"Denis Signoretto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0ea2e09692df092bbec8b05b7e5a64eebb8f7ece1c302b6cea6bffbb7fd8764a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0ea2e09692df092bbec8b05b7e5a64eebb8f7ece1c302b6cea6bffbb7fd8764a?s=96&d=mm&r=g\",\"caption\":\"Denis Signoretto\"},\"description\":\"Esperto da oltre 20 anni di soluzioni software open source e sviluppatore certificato Liferay, Denis in Intesys \u00e8 specializzato di API Design per lo sviluppo di architetture Headless.\",\"url\":\"https:\/\/www.intesys.it\/journal\/autore\/denis-signoretto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"I vantaggi di Kong e di un partner esperto per l'API Security","description":"API Security: scopri il ruolo di Kong API Gateway e di un partner IT esperto nel fare la differenza nelle strategie di protezione delle API","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/","og_locale":"it_IT","og_type":"article","og_title":"I vantaggi di Kong e di un partner esperto per l'API Security","og_description":"API Security: scopri il ruolo di Kong API Gateway e di un partner IT esperto nel fare la differenza nelle strategie di protezione delle API","og_url":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/","og_site_name":"Intesys Journal","article_published_time":"2025-04-30T07:43:15+00:00","article_modified_time":"2025-04-30T07:44:33+00:00","og_image":[{"width":600,"height":250,"url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg","type":"image\/jpeg"}],"author":"Denis Signoretto","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg","twitter_misc":{"Scritto da":"Denis Signoretto","Tempo di lettura stimato":"12 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/","url":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/","name":"I vantaggi di Kong e di un partner esperto per l'API Security","isPartOf":{"@id":"https:\/\/www.intesys.it\/journal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#primaryimage"},"image":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/04\/API-security-KONG.png","datePublished":"2025-04-30T07:43:15+00:00","dateModified":"2025-04-30T07:44:33+00:00","author":{"@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e50c847c2cf96e0a4714c385e1e12bc4"},"description":"API Security: scopri il ruolo di Kong API Gateway e di un partner IT esperto nel fare la differenza nelle strategie di protezione delle API","breadcrumb":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#primaryimage","url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/04\/API-security-KONG.png","contentUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/04\/API-security-KONG.png","width":1920,"height":1440,"caption":"API security KONG"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/api-security-con-kong-api-gateway-e-intesys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intesys.it\/journal\/"},{"@type":"ListItem","position":2,"name":"API Security: come Kong e Intesys proteggono gli ecosistemi digitali delle aziende"}]},{"@type":"WebSite","@id":"https:\/\/www.intesys.it\/journal\/#website","url":"https:\/\/www.intesys.it\/journal\/","name":"Intesys","description":"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intesys.it\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e50c847c2cf96e0a4714c385e1e12bc4","name":"Denis Signoretto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0ea2e09692df092bbec8b05b7e5a64eebb8f7ece1c302b6cea6bffbb7fd8764a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0ea2e09692df092bbec8b05b7e5a64eebb8f7ece1c302b6cea6bffbb7fd8764a?s=96&d=mm&r=g","caption":"Denis Signoretto"},"description":"Esperto da oltre 20 anni di soluzioni software open source e sviluppatore certificato Liferay, Denis in Intesys \u00e8 specializzato di API Design per lo sviluppo di architetture Headless.","url":"https:\/\/www.intesys.it\/journal\/autore\/denis-signoretto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/15281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/comments?post=15281"}],"version-history":[{"count":10,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/15281\/revisions"}],"predecessor-version":[{"id":15283,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/15281\/revisions\/15283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media\/15303"}],"wp:attachment":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media?parent=15281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/categories?post=15281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/tags?post=15281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}