displayName
IP Allowlist Management
workflowKind
security
triggerType
event-driven
typicalCadence
per-request
complexity
single-team
description
Governs changes to IP allowlists and firewall rules across cloud
environments — request intake, business justification verification,
security impact assessment, rule implementation, and periodic stale-entry
cleanup. Excludes network architecture design.