Compliance & Access Control
Configure IP restrictions, time-based access, and generate compliance reports for regulatory requirements
FlowGenX provides advanced compliance and access control features to help organizations meet regulatory requirements and enforce security policies through IP restrictions, time-based access controls, and automated compliance reporting.
Overview
Enterprise Compliance
Enforce security policies with IP allowlisting/blocklisting, time-based access windows, and automated compliance reporting for major regulatory standards.
The compliance system includes:
- IP-Based Access Control: Restrict API access by IP address or CIDR ranges
- Time-Based Access Control: Limit access to specific days and hours
- Compliance Reporting: SOC2, ISO27001, GDPR, HIPAA, PCI-DSS reports
- Security Audit Reports: Vulnerability scanning and recommendations
IP-Based Access Control
Control which IP addresses or networks can access your APIs at the group level.
Features
CIDR Notation Support
Supports both individual IP addresses and CIDR ranges (e.g., 192.168.1.0/24) for flexible network-based access control.
Capabilities:
- IPv4 and IPv6 Support: Full support for both protocols
- CIDR Ranges: Allow entire subnets (e.g.,
192.168.1.0/24) - Individual IPs: Specify single addresses (e.g.,
203.0.113.42) - Allow Lists: Only specified IPs can access (whitelist)
- Deny Lists: Block specific IPs from accessing (blacklist)
- Combined Rules: Use both allow and deny lists (deny takes precedence)
- Real-time Validation: Validate IP/CIDR format as you type
Configuring IP Restrictions
Step 1: Navigate to IP Restrictions
- Go to ACL Management → Security → IP Rules
- View all groups and their IP restriction status
- Select a group to configure
Step 2: Enable IP Restrictions
- Click Configure or Edit for the group
- Toggle Enable IP Restrictions on
- The restriction panel will expand
Step 3: Add IP Addresses
| Field | Description |
|---|---|
| IP Address/CIDR | Enter IP or CIDR notation (e.g., 192.168.1.100 or 10.0.0.0/8) |
| Type | Select Allow (whitelist) or Deny (blacklist) |
- Enter IP address or CIDR range
- Select type (Allow or Deny)
- Click the + button to add
- IP is validated automatically:
- ✓ Valid CIDR notation with IP count
- ✗ Invalid format with error message
Step 4: Manage IP Lists
Allowed IPs (Whitelist):
- Displays all allowed IP addresses/ranges
- Shows count of IPs in each range
- Remove individual entries with X button
- Only these IPs can access APIs
Denied IPs (Blacklist):
- Displays all blocked IP addresses/ranges
- Shows count of IPs in each range
- Remove individual entries with X button
- These IPs are explicitly blocked
Step 5: Save Configuration
- Review allowed and denied IP lists
- Click Save Restrictions
- Changes apply immediately to all consumers in the group
IP Restriction Rules
Deny Takes Precedence
If an IP is in both allow and deny lists, the deny rule takes precedence and the request is blocked.
How IP Restrictions Work:
- Deny List Check: If IP is in deny list → Access denied
- Allow List Check: If IP is in allow list → Access granted
- No Allow List: If no allow list configured → Access granted (open access)
- Allow List Exists: If allow list exists but IP not in it → Access denied
Supported Formats:
| Format | Example | Description |
|---|---|---|
| IPv4 | 192.168.1.100 | Single IPv4 address (auto-converted to /32) |
| IPv4 CIDR | 192.168.1.0/24 | IPv4 range (256 IPs in this example) |
| IPv6 | 2001:db8::1 | Single IPv6 address (auto-converted to /128) |
| IPv6 CIDR | 2001:db8::/32 | IPv6 range |
Common Use Cases
Corporate Network Access:
Allow: 203.0.113.0/24 (company office network)
Deny: (none)
Result: Only office network can accessBlock Malicious IPs:
Allow: (none - open access)
Deny: 198.51.100.42, 198.51.100.43
Result: All IPs except blocked ones can accessPartner Integration:
Allow: 198.51.100.0/28 (partner network)
Allow: 203.0.113.50 (partner VPN)
Deny: (none)
Result: Only partner networks can accessBest Practices
✓ Use CIDR notation for network ranges instead of individual IPs ✓ Document IP purposes in group descriptions ✓ Regularly review and remove outdated IP restrictions ✓ Test IP restrictions in dev/staging before production ✓ Use allow lists for sensitive APIs (default deny) ✓ Monitor denied requests from IP restrictions ✓ Keep partner IP allowlists up to date
Time-Based Access Control
Restrict API access to specific days of the week and hours of the day.
Features
Scheduled Access Windows
Configure business hours, maintenance windows, or compliance-required access schedules with timezone support.
Capabilities:
- Day Selection: Choose specific days of the week
- Time Windows: Set start and end times (24-hour format)
- Timezone Support: Configure timezone-aware schedules
- Group-Level Control: Apply to all consumers in a group
- Real-time Enforcement: Access denied outside configured windows
Configuring Time Restrictions
Step 1: Navigate to Time Restrictions
- Go to ACL Management → Security → Time Rules
- View all groups and their time restriction status
- Select a group to configure
Step 2: Enable Time Restrictions
- Click Configure or Edit for the group
- Toggle Enable Time Restrictions on
- The restriction panel will expand
Step 3: Select Days of Week
- Click day buttons to select/deselect
- Selected days are highlighted in cyan
- Common presets:
- Weekdays: Mon-Fri
- Weekend: Sat-Sun
- Every Day: All seven days
Step 4: Set Time Window
| Field | Description |
|---|---|
| Start Time | Beginning of access window (24-hour format) |
| End Time | End of access window (24-hour format) |
| Timezone | Timezone for schedule evaluation |
Available Timezones:
- America/New_York (EST/EDT)
- America/Chicago (CST/CDT)
- America/Denver (MST/MDT)
- America/Los_Angeles (PST/PDT)
- America/Phoenix (MST - no DST)
- Europe/London (GMT/BST)
- Europe/Paris (CET/CEST)
- Asia/Tokyo (JST)
- Asia/Shanghai (CST)
- Australia/Sydney (AEDT/AEST)
- UTC (Coordinated Universal Time)
Step 5: Review Schedule
The Schedule Preview shows:
Access allowed: Mon, Tue, Wed, Thu, Fri • 09:00 - 17:00 (America/New_York)Step 6: Save Configuration
- Review the schedule preview
- Click Save Restrictions
- Changes apply immediately
Time Restriction Rules
How Time Restrictions Work:
- Request arrives at gateway
- Current time converted to group's configured timezone
- Day of week checked against allowed days
- Time checked against start/end window
- If both match → Access granted
- If either doesn't match → Access denied
Edge Cases:
- Midnight Crossing: End time before start time creates overnight window
- Example:
22:00 - 06:00= 10pm to 6am next day
- Example:
- No Days Selected: All requests denied
- Same Start/End Time: Creates 24-hour window (all day)
Common Use Cases
Business Hours Only:
Days: Mon, Tue, Wed, Thu, Fri
Time: 09:00 - 17:00
Timezone: America/New_York
Result: Access only during weekday business hoursMaintenance Window Block:
Days: Sun
Time: 02:00 - 06:00
Timezone: UTC
Result: Block access during Sunday maintenance window24/7 Weekday Access:
Days: Mon, Tue, Wed, Thu, Fri
Time: 00:00 - 23:59
Timezone: UTC
Result: Any time on weekdays, blocked on weekendsAfter-Hours Only:
Days: Mon, Tue, Wed, Thu, Fri
Time: 18:00 - 08:00
Timezone: America/Los_Angeles
Result: Access only outside business hours (overnight)Best Practices
✓ Align timezone with your business location ✓ Account for daylight saving time in timezone selection ✓ Test time restrictions before production deployment ✓ Document business reasons in group description ✓ Use UTC for globally distributed teams ✓ Monitor denied requests for time violations ✓ Consider maintenance windows when setting schedules
Compliance Reporting
Generate comprehensive compliance reports for regulatory standards.
Supported Standards
Multiple Frameworks
Generate reports for SOC2, ISO27001, GDPR, HIPAA, and PCI-DSS compliance requirements.
| Standard | Full Name | Focus Area |
|---|---|---|
| SOC2 | Service Organization Control 2 | Security, availability, processing integrity |
| ISO27001 | ISO/IEC 27001 | Information security management |
| GDPR | General Data Protection Regulation | Data privacy and protection (EU) |
| HIPAA | Health Insurance Portability and Accountability Act | Healthcare data protection (US) |
| PCI-DSS | Payment Card Industry Data Security Standard | Payment card data security |
Generating Compliance Reports
- Navigate to ACL Management → Operations → Reports
- Select Compliance Report tab
- Choose compliance standard from dropdown
- Click Generate Report
- Review report sections:
Report Components:
| Section | Description |
|---|---|
| Compliance Score | Overall percentage (0-100%) |
| Compliant Controls | Number of controls meeting requirements |
| Non-Compliant Controls | Number of failing controls |
| Control Details | Specific requirements and status |
| Recommendations | Actions to improve compliance |
| Risk Assessment | High/medium/low risk findings |
Compliance Report Contents
Access Control Evaluation:
- Authentication mechanisms (API Keys, OAuth)
- Authorization controls (ACL groups, permissions)
- Credential management practices
- Multi-factor authentication status
Data Protection:
- Encryption in transit (HTTPS enforcement)
- Encryption at rest (data storage)
- Data retention policies
- Privacy controls
Audit & Monitoring:
- Access logging coverage
- Log retention periods
- Security event monitoring
- Incident response procedures
Network Security:
- IP restriction coverage
- Firewall rules
- DDoS protection
- Network segmentation
Identity Management:
- User provisioning/deprovisioning
- Role-based access control (RBAC)
- Principle of least privilege
- Access review processes
Security Audit Reports
Identify vulnerabilities and get remediation recommendations.
Generate Security Audit:
- Go to Reports → Security Audit Report
- Click Generate Report
- Review findings:
Report Sections:
| Section | Content |
|---|---|
| Security Score | Overall security posture (0-100) |
| Vulnerabilities | Identified security issues |
| Severity Levels | Critical, high, medium, low |
| Affected Resources | Groups, consumers, routes impacted |
| Recommendations | Step-by-step remediation guidance |
| Risk Assessment | Business impact analysis |
Common Findings:
- Expired API keys not rotated
- Consumers without group assignments
- Overly permissive group permissions
- Missing IP restrictions on sensitive routes
- No time restrictions for external access
- Weak credential management
- Insufficient audit logging
- Missing encryption enforcement
Access Pattern Analysis
Reports include access pattern analysis:
Pattern Detection:
- Normal Patterns: Expected access behavior
- Anomalous Patterns: Unusual activity requiring review
- Risk Levels: Low, medium, high risk classification
- Frequency Analysis: Request patterns over time
- Source Analysis: Geographic and network source patterns
Risk Indicators:
| Risk Level | Indicators |
|---|---|
| Low | Expected access during business hours from known IPs |
| Medium | Access from new IPs or outside normal hours |
| High | Repeated failures, suspicious patterns, blocked access attempts |
Exporting Reports
Export Options:
- JSON Format: Programmatic access for integrations
- PDF Format: Human-readable for audit purposes
- CSV Format: Data analysis in spreadsheets
Export Process:
- Generate desired report
- Click Export button
- Select format (JSON/PDF/CSV)
- Download file
- Store securely for compliance records
Compliance Best Practices
✓ Generate compliance reports monthly ✓ Address non-compliant controls within SLA ✓ Document remediation actions ✓ Review security audit findings weekly ✓ Export and archive reports for auditors ✓ Track compliance score trends over time ✓ Assign owners to remediation tasks ✓ Implement continuous monitoring
Combined Security Controls
Combine IP restrictions, time restrictions, and compliance monitoring for defense-in-depth.
Example: PCI-DSS Compliant API
Requirements:
- Access only from verified networks
- Access only during business hours
- Full audit logging
- Quarterly compliance reports
Configuration:
Step 1: Create Compliant Group
Group: pci-payment-processors
Description: PCI-DSS compliant access for payment processingStep 2: Configure IP Restrictions
Allow IPs:
- 203.0.113.0/24 (payment processor network)
- 198.51.100.50/32 (backup processor)
Deny IPs: (none)Step 3: Configure Time Restrictions
Days: Mon-Fri
Time: 06:00 - 22:00
Timezone: America/New_YorkStep 4: Enable Audit Logging
- All requests logged
- Denied requests tracked
- Export logs monthly
Step 5: Generate Compliance Reports
- Monthly PCI-DSS compliance report
- Review and remediate findings
- Export for compliance records
Monitoring & Enforcement
Real-Time Enforcement
All restrictions are enforced in real-time:
- Request arrives at Kong API Gateway
- Consumer identity verified (API key/OAuth token)
- Consumer's group restrictions retrieved
- IP address checked against allow/deny lists
- Current time checked against time windows
- If all pass → Request forwarded to backend
- If any fail → 403 Forbidden response
- All decisions logged for audit
Denied Request Tracking
Monitor restriction violations:
- Access Logs: Filter by "Access Granted = false"
- Denial Reasons: "IP Restriction" or "Time Restriction"
- Consumer Analysis: Which consumers are being blocked
- Pattern Detection: Unusual access attempts
Alerts & Notifications
Set up alerts for:
- Spike in IP restriction violations (potential attack)
- Time restriction violations outside windows
- Compliance score drops below threshold
- Critical security findings in audit reports
- New vulnerabilities discovered
Troubleshooting
IP Restriction Issues
Problem: Legitimate requests being blocked
Solutions:
- Verify client IP address (check access logs)
- Confirm IP in allow list with correct CIDR
- Check for deny list entries blocking the IP
- Test IP format validation (IPv4 vs IPv6)
- Verify no typos in IP addresses
Problem: IP restrictions not working
Solutions:
- Confirm restrictions are enabled for the group
- Verify consumer is assigned to the group
- Check Kong gateway sync status
- Review restriction configuration
- Test with known allowed/denied IPs
Time Restriction Issues
Problem: Access denied during allowed hours
Solutions:
- Verify timezone configuration matches client location
- Check server time is correct
- Confirm day of week selection includes today
- Review start/end time for midnight crossings
- Test in different timezone if globally distributed
Problem: Access allowed outside configured window
Solutions:
- Confirm time restrictions are enabled
- Verify no multiple groups with conflicting rules
- Check for midnight crossing creating unintended window
- Review timezone and DST settings
- Test restriction immediately after saving
Compliance Report Issues
Problem: Low compliance score
Solutions:
- Review non-compliant controls in report
- Follow remediation recommendations
- Implement missing security controls
- Update configurations to meet requirements
- Re-generate report to verify improvements
Problem: Cannot generate report
Solutions:
- Check backend service health
- Verify sufficient data for analysis
- Try different compliance standard
- Review error messages
- Contact support with error details