What is the primary purpose of implementing an allow list for network traffic management within a cloud environment?
To block suspect ports from sending or receiving traffic
To analyze traffic pattern behavior and identify anomalies
To randomize the ports through which traffic is permitted to flow
To explicitly permit only known and trusted traffic, while denying all others