Platform
Security & governance
Authentication, tenant isolation, audit logs, and secure execution.
Overview
Zof is designed for enterprise security requirements: authenticated access, organization-scoped tenant isolation, role-based access control, comprehensive audit logging, secure artifact handling, and governed execution and remediation with human approval gates.
Security in the Zof Console spans identity, data handling, agent fleet operations, API access, and compliance evidence export. Customer responsibilities include identity federation configuration, endpoint host hardening, integration credential management, and operational access reviews.
This documentation summarizes platform security controls and customer operational responsibilities. Enterprise customers should contact their account team for security questionnaires, deployment models, and contractual data processing terms.
Who should read this
- Security officers, compliance teams, organization administrators, and platform engineers.
Prerequisites
- Organization administrator or security reviewer access to Admin Center audit and identity settings
- Understanding of corporate security policies for SaaS adoption
When to use this workflow
- Onboarding new team members to Zof terminology and workflows
- Authoring internal runbooks aligned with Console labels
- Designing CI/CD or webhook integrations against documented behavior
Step-by-step procedure
Review authentication controls
Configure SSO and MFA in Admin Center → Identity & access aligned with corporate identity standards.
Disable or restrict authentication methods that violate policy, shared passwords, weak MFA exemptions.
Document break-glass procedures for identity outages with controlled local admin access if supported.
Implement least-privilege RBAC
Define role profiles mapped to job functions with minimal necessary permissions.
Separate remediation initiation, approval, directory admin, and audit export duties.
Schedule quarterly access reviews with exported evidence for compliance archives.
Secure developer and automation surfaces
Inventory API keys and webhooks in Admin Center → Developer with named owners.
Rotate keys on schedule and revoke immediately upon personnel departure or suspected compromise.
Scope automation credentials to environment-specific operations without organization administrator grants.
Validate tenant isolation and data handling
Confirm all operational data, runs, artifacts, agents, audit logs, remains organization-scoped.
Review secure upload and artifact retention policies for requirements documents and execution output.
Align data residency selections with contractual obligations through your account team.
Harden agent and endpoint operations
Apply corporate host baselines to endpoint agents on customer-controlled infrastructure.
Segment cloud and endpoint pools by environment to prevent cross-environment data exposure.
Monitor Agent Console telemetry for anomalous execution patterns indicating compromise.
Maintain audit and incident readiness
Export audit logs on schedule to SIEM or archive systems supporting retention requirements.
Include Zof Console in security incident response runbooks with escalation contacts.
Practice remediation approval and gate waiver procedures under audit scrutiny scenarios.
Key concepts
- Organization scope
- All Zof Console and API operations are isolated to your authenticated tenant.
- Governed execution
- Agent output and remediation follow policy packs with human approval when configured.
Best practices
- Treat API keys as production secrets, never commit to repositories or embed in client applications.
- Require human authorization for all production remediation apply operations.
- Integrate Console audit exports with enterprise SIEM correlation rules.
- Document shared responsibility boundaries between Zof platform controls and customer operations.
- Review integration OAuth scopes during annual security assessments.
Common issues
- Overexposed API keys in CI logs
- Mask secrets in pipeline output, rotate compromised keys immediately, and use short-lived credentials where supported.
- MFA not enforced uniformly
- Apply tenant-wide MFA policy rather than optional enrollment to close authentication gaps.
- Endpoint agents on unpatched hosts
- Include endpoint validation hosts in corporate patch management, the customer owns host security responsibility.
Was this page helpful?