Skip to main content

Blog/Business/

New feature: introducing the Network Allowlist

Ruta Tamosaityte

Content Writer

network allowist

Organizations that handle significant amounts of sensitive data and aim to maintain compliance need to ensure that only the right people can access the NordPass Admin Panel and vault. This is one of the main requirements for access control and the security of corporate resources and data. How can you ensure that with NordPass? By enabling a new feature called the Network Allowlist.

What is the Network Allowlist?

The Network Allowlist feature allows Owners and Admins to control which trusted networks and countries employees can access the NordPass vault and Admin Panel from. In other words, employees will be able to access these only from specified IP addresses.

This functionality is sought after in every corporate security solution, so we’re proud to provide it. Whether your company operates remotely, adopts hybrid work models, or simply has multiple offices—you can now ensure that employees access sensitive work data and tools only from trusted networks and geographic locations.

Please note that this feature is only available with the Enterprise plan.

How does the Network Allowlist work?

This feature is available on the NordPass Admin Panel under the “Policies” tab, accessible to both Owners and Admins. There, you can add individual IP addresses, specify a range of IPs using CIDR notation, or choose countries from a predefined list. You can also add a note to each rule to make it easier to identify which country or office it applies to.

Once the Network Allowlist is configured, employees will get an alert and be unable to log in when trying to use NordPass from an unverified network or country. To log in, they will have to connect from a verified network.

Simplify your compliance efforts

The Network Allowlist helps your company meet key regulatory requirements with confidence. Major compliance frameworks, including NIST, ISO/IEC 27001/27002, the NIS2 Directive, and SOC 2, require organizations to enforce network access restrictions. This feature is a straightforward way to implement these controls and strengthen your security framework.