IP Allowlisting
Define allowed CIDRs and enforce warn or block modes to reduce exposure to credential compromise. Use passkey step-up for policy updates and enable time-bound break-glass when you need to recover access safely.
Restrict portal access to approved network ranges.
Deliverables reviewers recognize, plus a preview of the structure buyers expect.
Included in
Foundations(Add-on / early access)Continuous(Add-on / early access)Security Ops(Add-on / early access)Resilience(Add-on / early access)Command(Add-on / early access)
How It Works
01
Warn or block enforcement modes with
Warn or block enforcement modes with explicit CIDR allowlists
02
Passkey step-up required for policy changes
Passkey step-up required for policy changes and break-glass
03
Designed to prevent lockouts with time-bound
Designed to prevent lockouts with time-bound break-glass access
At a Glance
Used For
Enterprise procurement • SOC 2 • Buyer security reviews
Outcomes
Enforce network boundaries for portal access • Reduce exposure to credential compromise • Keep an attributable access trail for audits
Proof Produced
Security policy configuration record • Break-glass activation log • Access enforcement audit events
Technical Notes
Warn or block enforcement modes with explicit CIDR allowlists • Passkey step-up required for policy changes and break-glass • Designed to prevent lockouts with time-bound break-glass access
Sharing and Controls
Pair outputs with Trust Center tiers so you control what’s shared and preserve access logs.
Connect systems to keep governance grounded
FAQ
Want the exports this feature enables?
We’ll walk through your reviewers’ expectations and map the workflow and outputs that unblock deals.
No obligation. We respond within one business day. We will show a sample reviewer-ready export.