Platform

Security & governance

Authentication, tenant isolation, audit logs, and secure execution.

Overview

Zof is designed for enterprise security requirements: authenticated access, organization-scoped tenant isolation, role-based access control, comprehensive audit logging, secure artifact handling, and governed execution and remediation with human approval gates.

Security in the Zof Console spans identity, data handling, agent fleet operations, API access, and compliance evidence export. Customer responsibilities include identity federation configuration, endpoint host hardening, integration credential management, and operational access reviews.

This documentation summarizes platform security controls and customer operational responsibilities. Enterprise customers should contact their account team for security questionnaires, deployment models, and contractual data processing terms.

Who should read this

  • Security officers, compliance teams, organization administrators, and platform engineers.

Prerequisites

  • Organization administrator or security reviewer access to Admin Center audit and identity settings
  • Understanding of corporate security policies for SaaS adoption

When to use this workflow

  • Onboarding new team members to Zof terminology and workflows
  • Authoring internal runbooks aligned with Console labels
  • Designing CI/CD or webhook integrations against documented behavior

Step-by-step procedure

Review authentication controls

Configure SSO and MFA in Admin Center → Identity & access aligned with corporate identity standards.

Disable or restrict authentication methods that violate policy, shared passwords, weak MFA exemptions.

Document break-glass procedures for identity outages with controlled local admin access if supported.

Implement least-privilege RBAC

Define role profiles mapped to job functions with minimal necessary permissions.

Separate remediation initiation, approval, directory admin, and audit export duties.

Schedule quarterly access reviews with exported evidence for compliance archives.

Secure developer and automation surfaces

Inventory API keys and webhooks in Admin Center → Developer with named owners.

Rotate keys on schedule and revoke immediately upon personnel departure or suspected compromise.

Scope automation credentials to environment-specific operations without organization administrator grants.

Validate tenant isolation and data handling

Confirm all operational data, runs, artifacts, agents, audit logs, remains organization-scoped.

Review secure upload and artifact retention policies for requirements documents and execution output.

Align data residency selections with contractual obligations through your account team.

Harden agent and endpoint operations

Apply corporate host baselines to endpoint agents on customer-controlled infrastructure.

Segment cloud and endpoint pools by environment to prevent cross-environment data exposure.

Monitor Agent Console telemetry for anomalous execution patterns indicating compromise.

Maintain audit and incident readiness

Export audit logs on schedule to SIEM or archive systems supporting retention requirements.

Include Zof Console in security incident response runbooks with escalation contacts.

Practice remediation approval and gate waiver procedures under audit scrutiny scenarios.

Key concepts

Organization scope
All Zof Console and API operations are isolated to your authenticated tenant.
Governed execution
Agent output and remediation follow policy packs with human approval when configured.

Best practices

  • Treat API keys as production secrets, never commit to repositories or embed in client applications.
  • Require human authorization for all production remediation apply operations.
  • Integrate Console audit exports with enterprise SIEM correlation rules.
  • Document shared responsibility boundaries between Zof platform controls and customer operations.
  • Review integration OAuth scopes during annual security assessments.

Common issues

Overexposed API keys in CI logs
Mask secrets in pipeline output, rotate compromised keys immediately, and use short-lived credentials where supported.
MFA not enforced uniformly
Apply tenant-wide MFA policy rather than optional enrollment to close authentication gaps.
Endpoint agents on unpatched hosts
Include endpoint validation hosts in corporate patch management, the customer owns host security responsibility.

Was this page helpful?

Security & governance | Zof AI Documentation