Introducing Akto’s Agentic AI Suite for API Security. Learn More.

Introducing Akto’s Agentic AI Suite for API Security. Learn More.

Introducing Akto’s Agentic AI Suite for API Security. Learn More.

New Guidelines from NIST: API Security for Cloud-Native Systems

National Institute of Standards and Technology (NIST) is releasing new regulations for API security in the cloud in 2025.

Luke

Apr 8, 2025

Guidelines for API Protection for cloud native systems
Guidelines for API Protection for cloud native systems

NIST released the Initial Public Draft (IPD) of Special Publication (SP) 800-228, Guidelines for API Protection for Cloud-Native Systems, on March 25, 2025. In this draft, they provide guidance to address the evolving security challenges in API implementation. What stands out most in the guidelines are three key areas: API Risk, Recommended Controls, and Implementation of API Protection.

APIs have become the fundamental building blocks of modern software applications, especially in cloud-native environments.

This blog explores the essential security risks and controls recommended by NIST and how they can be effectively implemented to protect your API infrastructure.

The Rising Importance of API Security in Cloud-Native Systems

Cloud-native systems are built on loosely coupled applications and microservices, often orchestrated through APIs. While this architecture offers unprecedented flexibility and scalability, it also introduces unique security risks. APIs serve as gateways, exposing functionality and sensitive data to both internal and external consumers. When inadequately secured, they become attractive entry points for attackers seeking to exploit vulnerabilities, exfiltrate data, or disrupt services.

API Risks by NIST

The NIST SP 800-228 IPD arrives at a critical moment, as recent years have witnessed a surge in API-related security incidents, from misconfigurations to inadequate authentication mechanisms. The recommendations below can be organized into three main security pillars: Discovery, Testing/remediation, and API posture management.

With public comments open until May 12, 2025, this framework provides comprehensive guidance for securing APIs throughout their lifecycle and is subject to change.

Key Security Controls Recommended by NIST

1. Strong Authentication and Authorization

NIST recommends implementing strong authentication mechanisms to ensure that only authorized users and applications can access your APIs. You should:

  • Use OAuth 2.0, OpenID Connect, or properly validated API keys

  • Enforce Role-Based Access Control (RBAC) or Attribute-Based Access Control (ABAC)

  • Rotate credentials regularly and validate tokens securely

  • Require multi-factor authentication for sensitive operations

These practices help protect your systems from unauthorized access and credential-based attacks.

2. Secure API Communication

To protect data in transit, NIST advises securing API communication using encryption and transport safeguards. Specifically, you should:

  • Enforce TLS (Transport Layer Security) to prevent eavesdropping

  • Implement HTTPS-only policies for all API endpoints

  • Disable weak or deprecated cryptographic algorithms

  • Use certificate pinning to prevent man-in-the-middle attacks

These controls help maintain data confidentiality and integrity across distributed systems.

3. Input Validation and Data Sanitization

To reduce exposure to injection and scripting attacks, NIST encourages adopting strict input validation and sanitization measures. You should:

  • Follow secure coding practices throughout the API development lifecycle

  • Apply validation rules to all incoming data

  • Use parameterized queries to avoid SQL injection

  • Sanitize inputs before processing

  • Validate request payloads against predefined schemas

These measures help prevent malicious data from reaching your backend systems.

4. Rate Limiting and Throttling

To guard against abuse, including denial-of-service (DoS) attacks, NIST suggests applying runtime protections such as:

  • Implementing rate limiting by user, IP, or application ID

  • Throttling requests to prevent system overload

  • Using graduated response strategies for suspected abuse

  • Returning generic error messages that don’t expose system details

These controls help maintain system availability and prevent performance degradation.

5. Comprehensive Logging and Monitoring

Effective monitoring helps detect suspicious activities and potential security breaches. The NIST guidelines emphasize you should:

  • Log all API interactions, including authentication and data access

  • Implement real-time monitoring and anomaly detection

  • Use SIEM tools to aggregate and analyze logs

  • Configure alerts for suspicious patterns or abnormal behavior

Logging and monitoring allow you to detect and respond to potential security incidents quickly.

6. Patch Management and API Versioning

Outdated APIs with unpatched vulnerabilities present significant security risks. NIST advises to:

  • Maintain a proactive patch management strategy for all API components

  • Implement secure API versioning to phase out deprecated endpoints

  • Establish a process for communicating API changes to consumers

  • Conduct regular vulnerability assessments of API implementations

This lifecycle approach ensures that APIs remain secure throughout their operational lifespan.

7. Secure API Gateway Implementation

API gateways serve as centralized control points for managing API traffic. NIST recommends to:

  • Deploy API gateways as intermediaries between clients and backend services

  • Centralize authentication, authorization, and rate-limiting policies in one platform

  • Implement traffic filtering and inspection capabilities

  • Use gateways to enforce consistent security controls across all APIs

These architectural controls add layers of protection while simplifying the implementation of security policies.

Implementation Options and Trade-Offs

One of the strengths of NIST SP 800-228 IPD is its recognition that one size doesn't fit all when it comes to API security. Analyzing the pros and cons of different implementation strategies and allowing organizations to tailor solutions to their specific needs. This flexibility enables security practitioners to balance security requirements with performance and cost considerations.

For enterprises adopting cloud-native architectures, the guidelines offer both basic and advanced controls, providing a scalable path to API security that accommodates varying levels of organizational maturity. Smaller organizations can start with fundamental protections and gradually implement more sophisticated measures as their capabilities grow.

Each implementation has its trade-offs, there is no one-size-fits-all with API security. The chart above shows the three options that today’s API Gateways provide.

There is value in any tool that helps organizations inventory and manage their APIs and traffic. However, the enforcement of any policies should be as close to the individual service instance as possible in order to achieve robust API security assurance. In the use case of data classification, these tools can be especially useful for building an initial inventory. - NIST

As API definitions are rolled out across the organization, data tagging should be implemented as part of the API schema, and the data flow policy should be enforced via explicit policy (e.g., with an authorization system). The runtime discovery of data flow is primarily important in protecting against exfiltration.

How Akto.io Can Help

To meet NIST’s API security requirements, Akto offers a comprehensive platform that addresses key API risks like unauthorized access, data exposure, and abuse. With real-time API discovery, continuous monitoring, and automated security testing, Akto helps detect and mitigate vulnerabilities early. Align with the new NIST guidelines, enabling efficient compliance while strengthening your overall API security posture against modern cyber threats.

Final thoughts

As cloud-native adoption continues to accelerate, API security remains a critical component of enterprise resilience. The NIST SP 800-228 IPD provides a comprehensive framework for identifying vulnerabilities, analyzing risks, and implementing effective controls across the API lifecycle.

By following these recommended security controls, organizations can mitigate risks, protect sensitive data, and ensure the reliability of their API infrastructure. Implementing these best practices strengthens security posture and fosters trust with users and stakeholders in an increasingly interconnected digital ecosystem.

Schedule a call with us today and see how Akto can help your organization meet security regulations.

Follow us for more updates

Want to learn more?

Subscribe to Akto's educational emails for essential insights on protecting your API ecosystem.

Experience enterprise-grade API Security solution