Feature

IP Allowlisting

Define allowed CIDRs and enforce warn or block modes to reduce exposure to credential compromise. Use passkey step-up for policy updates and enable time-bound break-glass when you need to recover access safely.

Restrict portal access to approved network ranges.
Export Outputs
Deliverables reviewers recognize, plus a preview of the structure buyers expect.
Plans
Included in
Foundations(Add-on / early access)Continuous(Add-on / early access)Security Ops(Add-on / early access)Resilience(Add-on / early access)Command(Add-on / early access)

Workflow

How It Works

Evaluator-level mechanics behind this feature and how it becomes exportable evidence.

01
Warn or block enforcement modes with
Warn or block enforcement modes with explicit CIDR allowlists
02
Passkey step-up required for policy changes
Passkey step-up required for policy changes and break-glass
03
Designed to prevent lockouts with time-bound
Designed to prevent lockouts with time-bound break-glass access

Proof / Trust

At a Glance

Feature-specific context: outcomes, outputs, and where it fits.

Used For
Enterprise procurement • SOC 2 • Buyer security reviews
Outcomes
Enforce network boundaries for portal access • Reduce exposure to credential compromise • Keep an attributable access trail for audits
Proof Produced
Security policy configuration record • Break-glass activation log • Access enforcement audit events
Technical Notes
Warn or block enforcement modes with explicit CIDR allowlists • Passkey step-up required for policy changes and break-glass • Designed to prevent lockouts with time-bound break-glass access
Sharing and Controls
Pair outputs with Trust Center tiers so you control what’s shared and preserve access logs.

Integrations

Connect systems to keep governance grounded

Integrations keep evidence and ownership tied to reality so governance exports stay defensible.

Browse Integrations

FAQ

FAQ

Common questions from buyers and reviewers.

What does a reviewer actually receive?
Common outputs include: Security policy configuration record; Break-glass activation log; Access enforcement audit events.
Where does this feature fit?
Teams use it for Enterprise procurement, SOC 2, Buyer security reviews. The goal is to reduce back-and-forth by tying work to exportable evidence.
What outcome should I expect?
Enforce network boundaries for portal access Reduce exposure to credential compromise
Do you auto-share content externally?
No. Drafts and exports are human-verified. You control what’s shared and what stays internal.
Next step
Want the exports this feature enables?
We’ll walk through your reviewers’ expectations and map the workflow and outputs that unblock deals.
No obligation. We respond within one business day. We will show a sample reviewer-ready export.