API Governance for Engineering Organizations

How to organize and manage microservice APIs at scale.

Back to API Governance Framework

Compliance Framework Example: Regulated Utility

Context: A power utility operates a mix of corporate IT systems, regulated operational environments, and legacy mainframe platforms. Some systems must remain isolated from the public Internet and tightly segmented from other internal environments. The API governance platform provides the control plane for access, lifecycle management, observability, and evidence collection across these boundaries.


Platform Scope & Boundaries

What This Platform Provides

The API governance platform is a governance, enforcement, and audit layer that sits between utility applications, modernization services, integration platforms, and restricted environments. It provides:

Enforcement Capabilities:

Lifecycle & Coordination:

Audit & Compliance Evidence:

Observability:

What This Platform Cannot Provide

The following utility-specific capabilities are outside the platform’s scope and must be implemented by backend systems or specialized operational technology:

Operational Control Systems:

Legacy System Operability:

Network & Regulatory Determinations:

Integration Model

The platform works in conjunction with utility systems and segmented environments:

%%{init: {'theme':'base', 'themeVariables': { 'primaryColor':'#e8f4f8','primaryTextColor':'#000','primaryBorderColor':'#000','lineColor':'#333'}}}%%
flowchart LR
    Portal[Developer Portal / Registry] --> GW[API Gateway]
    Portal --> AUD[Auditor]

    Corp[Corporate IT Apps] -->|Approved Calls| GW
    GW -->|Governed Access| Int[Integration Services / Facades]
    Int --> MF[Mainframe Systems]
    Int --> Bus[Message Bus / Event Backbone]
    Bus --> Ops[Restricted Utility / OT-Adjacent Systems]
    GW -->|Logs + Metrics| AUD

    style Portal fill:#D0EED0
    style GW fill:#D0EED0
    style AUD fill:#FFE6CC
    style Int fill:#E0D0E0
    style MF fill:#FFD0D0
    style Bus fill:#E0D0E0
    style Ops fill:#FFD0D0

The Registry tracks the interfaces, the Gateway enforces the approved connectivity model, and the Auditor provides the evidence trail and operational telemetry. Mainframe modernization teams expose selected capabilities through governed facades, events, or integration services rather than by allowing uncontrolled direct dependencies.


Utility-Specific Governance Concerns

Segmented Networks and Internet Restrictions

In regulated utility environments, some systems must remain off the public Internet and reachable only through tightly controlled private connectivity. The platform should therefore be deployed to support:

Mainframe Modernization as a Governance Problem

For utilities, modernization is not only a rewrite program. It is an interface management problem:

API governance addresses this by making each exposed capability a managed product:

Observability in a Utility Context

In this environment, observability is not only a performance concern. It is part of operational control.

Without this visibility, modernization becomes guesswork and segmented environments become harder to operate safely.


Compliance and Control Alignment

This example is written for a North American power utility, where cybersecurity and audit expectations often span NERC CIP, internal cyber policy, SOX-relevant financial controls, privacy obligations, and state utility commission scrutiny.

Cybersecurity & Network Segmentation

API Governance Implementation:

Evidence for Auditors:

Asset Ownership and Change Control

API Governance Implementation:

Evidence for Auditors:

Operational Resilience and Incident Response

API Governance Implementation:

Evidence for Auditors:

Customer Data, Billing, and Financial Controls

API Governance Implementation:

Evidence for Auditors:


Mainframe Modernization Patterns

Pattern 1: Governed Facade

A modernization team exposes a COBOL/CICS capability through a service facade. The platform governs:

This lets the utility stabilize consumption before rewriting the underlying system.

Pattern 2: Event Publication from Legacy Systems

Rather than letting consumers poll legacy stores directly, the modernization team publishes events derived from mainframe updates:

Pattern 3: Strangler Migration with Parallel Versions

As a mainframe capability is reimplemented:


Example Utility Scenario

Consider a utility modernizing its customer and outage ecosystem:

With API governance in place:

This gives the utility a controlled way to connect legacy, modern, and regulated systems without waiting for a full mainframe rewrite.


Why This Matters for Utilities

For a regulated utility, API governance is not only a developer experience investment. It is a way to:

In this environment, governance is what allows modernization to proceed without losing control of risk.


Back to Technical Design