Overview
Delete Protection adds an extra layer of security by:- Preventing accidental deletion of critical resources
- Requiring explicit confirmation to disable protection
- Blocking deletion attempts through both UI and API
- Returning clear error messages when deletion is attempted
Supported resources
Currently, Delete Protection is available for:APIs
Protect your API configurations and settings from accidental deletion. This includes the API itself and its associated configuration, but not individual keys.
Enable delete protection for APIs
Type the API name to confirm
Enter the exact name of your API to confirm you want to enable protection.

Disable delete protection
To remove delete protection:Type the API name to confirm
Enter the exact name of your API to confirm you want to disable protection.
Protected resource behavior
When Delete Protection is enabled:- All deletion attempts are blocked
- The API returns a
DELETE_PROTECTEDerror - The error includes a link to this documentation
- The resource remains fully operational and modifiable
Example API error response
Attempting to delete a protected resource returns:Dashboard behavior
In the dashboard:- Delete buttons are disabled or show a warning
- Attempting deletion shows a modal explaining protection is enabled
- You must explicitly disable protection before deletion is possible
Best practices
Enable for production resources
Enable for production resources
Always enable Delete Protection for resources running in production environments. This prevents accidents during deployments or configuration changes.Protected resources:
- Production APIs
- High-traffic services
- Resources with external dependencies
Use for critical resources
Use for critical resources
Protect resources that contain important data or configurations that would be difficult to recreate:
- APIs with complex permission configurations
- Resources with many dependencies
- Services that require significant setup time
Regular protection review
Regular protection review
Periodically review which resources have delete protection:
Team communication
Team communication
Inform team members about protected resources:
- Document which resources are protected and why
- Include protection status in runbooks
- Communicate before enabling/disabling protection
- Use clear naming conventions for protected resources
Infrastructure as Code
Infrastructure as Code
When using IaC tools (Terraform, etc.), ensure delete protection is part of your configuration:
Limitations
Understand what delete protection does and doesn’t cover:What's protected
- The resource itself cannot be deleted
- Explicit disable step required before deletion
- Works across both UI and API
What's not protected
- Modifications to the resource are still allowed
- Child resources can still be deleted (e.g., keys belonging to a protected API)
- Users with appropriate permissions can disable protection
- Does not prevent key revocation or rate limit changes
Delete protection is not a replacement for proper access control and backup strategies. Use it as an additional safety layer.
Workflow integration
CI/CD pipelines
Integrate delete protection checks in deployment pipelines:Monitoring and alerts
Set up alerts for protection status changes:- Monitor audit logs for
delete_protection.enabledevents - Alert when protection is disabled on critical resources
- Track who disabled protection and when
Migration strategy
When you need to delete a protected resource:Related documentation
Root Keys
Manage permissions for delete operations
Audit Logs
Track all changes to protected resources