Tested prompts that power your agents automatically. Learn more →
Change Management & Approval
Design a change management and approval system covering change classification, approval workflows, audit trails, and emergency change procedures.
IP Allowlisting & Network Policies
Design IP allowlisting and network policy controls covering ingress rules, egress filtering, dynamic updates, and policy-as-code enforcement.
Vendor Migration & Switchover Plan
Design a vendor migration and switchover plan covering evaluation, parallel running, data portability, cutover execution, and rollback procedures.
API Version Migration & Deprecation
Design an API version migration and deprecation strategy covering versioning schemes, sunset timelines, client migration, and backward compatibility.
Enterprise Data Migration Pipeline
Design an enterprise data migration pipeline covering extraction, transformation, validation, loading, and reconciliation for large-scale data moves.
Legacy System Migration Strategy
Design a legacy system migration strategy covering assessment, strangler fig patterns, data migration, cutover planning, and rollback procedures.
Cross-Region Database Replication
Design cross-region database replication covering consistency models, conflict resolution, lag monitoring, and failover promotion strategies.
Global Load Balancing & Routing
Design global load balancing and traffic routing covering DNS-based routing, health checks, failover, and latency-based request distribution.
Data Residency & Sovereignty Controls
Design data residency and sovereignty controls covering geographic data placement, cross-border transfer rules, and compliance enforcement.
Multi-Region Deployment Architecture
Design a multi-region deployment architecture covering region selection, data replication, traffic routing, and failover automation.
Data Access Request & Approval
Build a data access governance system with request workflows, approval chains, time-bound grants, and access certification.
Data Lineage & Provenance Tracking
Implement data lineage tracking that records how data flows, transforms, and is consumed across your enterprise systems.
PII Detection & Dynamic Data Masking
Implement PII detection and dynamic data masking to protect sensitive personal data while maintaining application functionality.
Data Retention Policy Implementation
Implement automated data retention policies that enforce configurable retention periods with compliant deletion and archival.
Sandbox Environment Provisioning
Design sandbox environment provisioning enabling enterprise customers to test configurations and integrations safely.
Enterprise Data Export & Reporting
Build enterprise data export and reporting capabilities with scheduled reports, custom queries, and compliant data extraction.
Enterprise Integration Framework
Design an integration framework enabling enterprise customers to connect your product with their existing tools and workflows.
Enterprise SLA Monitoring
Build an SLA monitoring system tracking uptime, latency, and error rate commitments with automated breach detection and reporting.
White-Label & Custom Branding
Implement white-label theming allowing enterprise customers to apply their branding, colors, logos, and custom domains.
Enterprise Admin Console Design
Design an enterprise admin console giving organization administrators visibility and control over users, security, and configuration.
Service Account & Machine Identity
Design a service account and machine identity management system with credential rotation, least privilege, and lifecycle governance.
Periodic Access Review Workflow
Build an automated periodic access review workflow enabling managers to certify or revoke user access for compliance requirements.
API Key Lifecycle Management
Design a secure API key management system covering generation, rotation, scoping, rate limiting, and revocation workflows.
Fine-Grained Permission System
Build a fine-grained permission system supporting resource-level authorization with inheritance and delegation capabilities.