Hi Community,
Could you please share your ideas on what would be the ideal order of steps and/or their corresponding policies in an API proxy execution to perform the below logic?
1. Traffic management (SpikeArrest + Quota)
2. Threat Protection (JSON/XML + Regex)
3. API key verification
4. IP Access control
5. OAuth2 token verification
6. Required header/data validation
7. Maintenance check of backends
Thank you.