Certain security policy burdened customers may have a policy of restricting the use of any infrastructure service with public facing internet connectivity. More than just the optional toggle in the instance provisioning flow, these customers want to guarantee that no instance launched under a given org could ever have had ingress or egress access to the public internet, so that no "regular" permissioned user can provision an instance or service with any access to a publically routable network.
* This could be accomplished by enforcing a "Do not provision with public IPs" toggle for an entire org
* Could also be enforced by creating a setting for "Default VLANs" for a "Layer-2" only/by default deployment flow (does not currently exist). This would enable a customer to provision an instance into a customer managed network for the lifecycle of that instance.