Prompts

Tested prompts that power your agents automatically. Learn more →

← All topics

Enterprise Engineering

Change Management & Approval

Design a change management and approval system covering change classification, approval workflows, audit trails, and emergency change procedures.

IP Allowlisting & Network Policies

Design IP allowlisting and network policy controls covering ingress rules, egress filtering, dynamic updates, and policy-as-code enforcement.

Vendor Migration & Switchover Plan

Design a vendor migration and switchover plan covering evaluation, parallel running, data portability, cutover execution, and rollback procedures.

API Version Migration & Deprecation

Design an API version migration and deprecation strategy covering versioning schemes, sunset timelines, client migration, and backward compatibility.

Enterprise Data Migration Pipeline

Design an enterprise data migration pipeline covering extraction, transformation, validation, loading, and reconciliation for large-scale data moves.

Legacy System Migration Strategy

Design a legacy system migration strategy covering assessment, strangler fig patterns, data migration, cutover planning, and rollback procedures.

Cross-Region Database Replication

Design cross-region database replication covering consistency models, conflict resolution, lag monitoring, and failover promotion strategies.

Global Load Balancing & Routing

Design global load balancing and traffic routing covering DNS-based routing, health checks, failover, and latency-based request distribution.

Data Residency & Sovereignty Controls

Design data residency and sovereignty controls covering geographic data placement, cross-border transfer rules, and compliance enforcement.

Multi-Region Deployment Architecture

Design a multi-region deployment architecture covering region selection, data replication, traffic routing, and failover automation.

Data Access Request & Approval

Build a data access governance system with request workflows, approval chains, time-bound grants, and access certification.

Data Lineage & Provenance Tracking

Implement data lineage tracking that records how data flows, transforms, and is consumed across your enterprise systems.

PII Detection & Dynamic Data Masking

Implement PII detection and dynamic data masking to protect sensitive personal data while maintaining application functionality.

Data Retention Policy Implementation

Implement automated data retention policies that enforce configurable retention periods with compliant deletion and archival.

Sandbox Environment Provisioning

Design sandbox environment provisioning enabling enterprise customers to test configurations and integrations safely.

Enterprise Data Export & Reporting

Build enterprise data export and reporting capabilities with scheduled reports, custom queries, and compliant data extraction.

Enterprise Integration Framework

Design an integration framework enabling enterprise customers to connect your product with their existing tools and workflows.

Enterprise SLA Monitoring

Build an SLA monitoring system tracking uptime, latency, and error rate commitments with automated breach detection and reporting.

White-Label & Custom Branding

Implement white-label theming allowing enterprise customers to apply their branding, colors, logos, and custom domains.

Enterprise Admin Console Design

Design an enterprise admin console giving organization administrators visibility and control over users, security, and configuration.

Service Account & Machine Identity

Design a service account and machine identity management system with credential rotation, least privilege, and lifecycle governance.

Periodic Access Review Workflow

Build an automated periodic access review workflow enabling managers to certify or revoke user access for compliance requirements.

API Key Lifecycle Management

Design a secure API key management system covering generation, rotation, scoping, rate limiting, and revocation workflows.

Fine-Grained Permission System

Build a fine-grained permission system supporting resource-level authorization with inheritance and delegation capabilities.