The following additional protections are available:
Access control based on IP address range
Client IP address override
JWT validation
Rate limiting by key
Rate limiting by IP address
Security headers