FIG. 4 is a flow diagram illustrating an example method for processing a connection request associated with a customer account to connect to a destination endpoint identified as a high risk destination endpoint over a network.
FIG. 5 is a flow diagram that illustrates an example method for identifying a setting linked to a customer account that a trust score be evaluated prior to allowing a connection to a destination endpoint.
FIG. 6 is a flow diagram illustrating an example method for overriding a denial of a connection request.
FIG. 7 is a flow diagram that illustrates an example method for overriding a denial of a connection request using an authorization code.
FIG. 8 is a block diagram that illustrates an example service provider environment.
FIG. 9 is block diagram illustrating an example of a computing device that may be used to execute a method for processing a connection request associated with a customer account to initiate a connection with a destination endpoint over a network.
DETAILED DESCRIPTION