Log in
Feature

IP Allowlisting

Define allowed CIDRs and enforce warn or block modes to reduce exposure to credential compromise. Use passkey step-up for policy updates and enable time-bound break-glass when you need to recover access safely.

Restrict portal access to approved network ranges.

Workflow

How It Works

Evaluator-level mechanics behind this feature and how it becomes verifiable proof.

01
Warn or block enforcement modes with
Warn or block enforcement modes with explicit CIDR allowlists
02
Passkey step-up required for policy changes
Passkey step-up required for policy changes and break-glass
03
Designed to prevent lockouts with time-bound
Designed to prevent lockouts with time-bound break-glass access

Capabilities

At a Glance

Feature-specific context: outcomes, outputs, and where it fits.

Used For
Enterprise procurement • SOC 2 • Buyer security reviews
Outcomes
Enforce network boundaries for portal access • Reduce exposure to credential compromise • Keep an attributable access trail for audits
Exports & Records
Security policy configuration record • Break-glass activation log • Access enforcement audit events
Technical Notes
Warn or block enforcement modes with explicit CIDR allowlists • Passkey step-up required for policy changes and break-glass • Designed to prevent lockouts with time-bound break-glass access
Sharing and Controls
Pair outputs with Trust Center tiers so you control what’s shared and preserve access logs.
What you can show reviewers
Artifacts reviewers recognize, plus sample previews of structure.
Plans
Included in
Foundations(Add-on / early access)Continuous(Add-on / early access)Security Ops(Add-on / early access)Resilience(Add-on / early access)Command(Add-on / early access)

Integrations

Connect systems to keep governance grounded

Integrations keep evidence and ownership tied to reality so governance stays defensible.

Browse Integrations

FAQ

FAQ

Common questions from buyers and reviewers.

What does a reviewer actually receive?
Common outputs include: Security policy configuration record; Break-glass activation log; Access enforcement audit events.
Where does this feature fit?
Teams use it for Enterprise procurement, SOC 2, Buyer security reviews. The goal is to reduce back-and-forth by tying work to evidence, approvals, and clear history.
What outcome should I expect?
Enforce network boundaries for portal access Reduce exposure to credential compromise
Do you auto-share content externally?
No. Drafts and shared materials are human-reviewed. You control what's shared and what stays internal.
Next step
Want a walkthrough focused on this feature?
Bring a reviewer request. We'll map the workflow end-to-end.
No obligation. We respond within one business day. No compliance guarantees.