Security & Compliance
How Apiable handles your data, your traffic, and your trust
A reference page for security teams, procurement reviewers, and architects. Everything below is the same answer your champion would get from us on a call — published so they don't have to wait on one.
AWS Partner · Well-Architected Framework Review passed in 2025
ISO 27001 in progress (Q3 2026) · GDPR-compliant · single-tenant per customer
On this page
Data flow
Does Apiable proxy my API traffic?
No. Apiable does not sit in your API request path.
Traffic between your developers and your gateway never passes through Apiable's infrastructure. Onboarding, plans, quotas, billing, and the developer portal run inside Apiable; the API calls themselves do not.
Optionally, Apiable retrospectively reads your gateway's log files (CloudWatch Logs, Konnect analytics, Apigee analytics, etc.) to track usage, generate insights, and drive billing. Log access is read-only and runs on your schedule, not in the request path.
What touches Apiable, what doesn't
- In Apiable: partner accounts, plans, subscriptions, approvals, contracts, billing records, portal customisation, audit logs of admin actions.
- Not in Apiable: your API request and response payloads, end-user data your APIs return, your gateway runtime, your underlying services and databases.
Hosting & regions
Where is Apiable hosted?
Apiable runs on AWS in the Frankfurt region (eu-central-1).
Customer data and configuration are stored there. Each customer gets a dedicated, single-tenant portal instance with its own database — no shared portal infrastructure between customers.
Additional regions are available for enterprise customers. If you need US, APAC, or another EU region, talk to us — we've delivered multi-region rollouts and can scope yours.
We've passed the AWS Well-Architected Framework Review (2025), AWS's audit of well-architected best practices for AWS Partner Network ISVs.
Authentication & encryption
How does Apiable handle authentication and encryption?
Portal authentication — bring your own IdP
Apiable does not provide a default identity provider. You connect your existing one over OpenID Connect — Microsoft Entra ID, Google, Okta, AWS Cognito, Auth0, Keycloak, or any OIDC-compliant provider. Apiable never stores or validates your end users' credentials.
API authorization — three first-class models
Tokens, scopes, and grant types follow the OAuth 2.0 specification (authorization code, client credentials, refresh). Pick the model that fits your stack:
- 1.API-key only. Your gateway maps the API key to a subscription. Simplest setup, no JWT required.
- 2.Apiable-managed authorization. Cognito user pool + Lambda authoriser, deployed into your AWS account via our modular CDK / CloudFormation Launch Stack URL / Terraform module. The auth surface runs in your account, not Apiable's.
- 3.External authorization. Federate to your existing IdP (Duende, Auth0, Okta, Entra, Keycloak, etc.) using the
apiable_api_keybridge-claim pattern. Apiable reverse-maps the credential at log ingestion.
Encryption
- ✓In transit: TLS 1.2+ enforced for all customer-facing endpoints.
- ✓At rest: AWS-managed encrypted services (RDS, S3, DynamoDB) with AES-256.
Audit logging
Admin actions in Apiable — product changes, plan changes, subscription approvals, user and role changes — are recorded in an immutable audit log accessible to your administrators.
Gateway access
How does Apiable access my API gateway?
Apiable connects to your gateway through a dedicated adapter per gateway type — AWS API Gateway, Kong, Apigee, Azure APIM. The adapter lists your APIs, syncs catalog metadata, creates and revokes consumer credentials, and retrieves OpenAPI specs where available.
How gateway credentials are stored
- ✓Not in Apiable's database. Gateway access credentials live in AWS Secrets Manager.
- ✓Dedicated AWS IAM role per customer. Apiable's access to your secrets is scoped to your role only.
- ✓Audited access. AWS Secrets Manager access is logged. The audit is available to you on demand.
- ✓For AWS API Gateway specifically: we use an assume-role pattern (RoleARN). The key and secret are generated temporarily and are not stored on Apiable.
How API consumer credentials are stored
- ✓Not stored in Apiable's database.
- ✓Retrieved on demand by the Apiable backend, displayed in the portal UI, then released — not cached.
- ✓Generated by your gateway's native auth, by the Apiable-managed Cognito + Lambda authoriser deployed into your AWS account, or by your existing IdP via the External AuthZ bridge-claim pattern.
Honest disclosure
Adding an Apiable integration grants Apiable Admin access to the connected API gateway. That's the level of access we need to list APIs, create plans, and manage consumer credentials. Procurement and security teams should know this upfront — it's why the credentials live in AWS Secrets Manager, behind a dedicated IAM role, with audit-on-demand.
Compliance status
Where Apiable is today on AWS WAFR, ISO 27001, and GDPR
An honest snapshot. Status changes are reflected on this page and on our live trust report.
| Standard | Status | Notes |
|---|---|---|
| AWS Well-Architected Framework Review | Passed | Audited against AWS well-architected best practices for ISVs in 2025. Required for AWS Marketplace listing. |
| GDPR | Compliant | EU data processor. Frankfurt-only hosting. |
| ISO 27001 | In progress | Live status published at trust.apiable.io. Targeted for Q3 2026. |
If you need to complete a vendor security questionnaire today, trust.apiable.io is the best starting point. For specific controls or evidence, email support@apiable.io.
Operational security
What sits behind the audited compliance posture:
- ✓ Hardened AWS VPC deployment
- ✓ Infrastructure as Code — auditable deployments
- ✓ Continuous patching and maintenance
- ✓ Vulnerability scanning and penetration testing
- ✓ High availability and disaster recovery
- ✓ Encrypted secret storage in AWS Secrets Manager
Self-hosting
Can Apiable be self-hosted?
In your own AWS account, yes — as a named enablement-package item. Otherwise, no.
Default delivery is managed SaaS in our AWS account in Frankfurt. If you need the platform deployed into your own AWS account, that's available as a named item on your enablement package — talk to us early so we can scope it into the contract.
We don't currently offer:
- ✕Single-tenant deployment in your own Azure or GCP account
- ✕On-premises deployment
- ✕Air-gapped deployments
If your concern is data residency or sovereignty rather than physical hosting, the answer is usually different — Apiable doesn't proxy your API traffic, and your underlying APIs and data stay in your gateway and your infrastructure.
For anything on the "we don't offer" list above, talk to us — we'd rather scope it together than have you guess.
Need something we haven't published?
Architecture deep-dive call, sub-processor list, a specific vendor questionnaire response, evidence for a particular control — email support@apiable.io and we'll route to the right person on our team.
See what your API program looks like as a revenue engine.
Join the companies monetizing API usage, scaling partner onboarding, and proving measurable business impact—without overloading their teams.