Use authentication, rate limits, quotas, and abuse detection (IP reputation, anomaly detection). Add request validation, WAF rules, and backpressure, plus monitoring and alerting for spikes.
A layered approach prevents abuse and reduces blast radius:
Rate limiting headers:
X-RateLimit-Limit: 1000
X-RateLimit-Remaining: 42
X-RateLimit-Reset: 1710000000