Governance
Human approval
Authorization gates for remediation plans.
Overview
Remediation approval workflows define who may authorize fix proposals, under what conditions, and with what audit evidence. Approval is the control point that transforms autonomous fix generation into governed engineering action suitable for enterprise and regulated environments.
Policies typically specify approver roles by environment, change blast radius, and affected system classification. Multi-step approval may be required for production apply, security-sensitive components, or changes touching customer data paths.
Every approval or rejection is recorded in organization audit logs with actor identity, timestamp, and decision context, forming evidence for internal governance and external compliance reviews.
Who should read this
- Engineering managers, release managers, compliance officers, and designated remediation approvers.
Prerequisites
- Remediation policy configured in Admin Center or Governance settings
- Approver roles assigned to qualified team members, not shared generic accounts
- Understanding of organization change management and segregation-of-duties requirements
When to use this workflow
- Onboarding new team members to Zof terminology and workflows
- Authoring internal runbooks aligned with Console labels
- Designing CI/CD or webhook integrations against documented behavior
Step-by-step procedure
Review organizational policy
Document which remediation categories require approval versus engineering-only manual fixes.
Identify approver roles for staging, pre-production, and production apply scopes.
Confirm backup approver assignments for release windows and on-call coverage.
Configure approver roles in Admin Center
Open Admin Center → Directory → Roles and verify remediation approver permissions exist.
Assign approver roles to named individuals based on team and system ownership.
Avoid granting approver permissions to operators who also initiate proposals without policy exception.
Receive and triage approval requests
Approvers receive notifications for pending remediation items through Console notifications or integrated channels.
Review proposal scope, linked failure evidence, run IDs, and affected services before deciding.
Request additional validation or narrower scope when information is insufficient.
Approve, reject, or defer
Approve when proposal scope, verification plan, and timing align with change policy.
Reject with documented rationale when scope is excessive, evidence is weak, or timing is inappropriate.
Defer when dependent validation or stakeholder sign-off is still pending.
Monitor apply and verification
Track apply execution after approval for errors requiring rollback or re-approval.
Confirm verification runs complete successfully before closing the approval record.
Escalate verification failures to engineering owners and incident processes as needed.
Audit and retrospect
Export approval records from Admin Center audit logs for quarterly governance reviews.
Analyze rejection reasons for systemic issues in proposal quality or detection accuracy.
Update policy when approval bottlenecks repeatedly delay legitimate fixes.
Key concepts
- Organization scope
- All Zof Console and API operations are isolated to your authenticated tenant.
- Governed execution
- Agent output and remediation follow policy packs with human approval when configured.
Best practices
- Enforce segregation of duties: proposal authors should not approve their own production fixes.
- Set SLA targets for approval turnaround during business hours and release windows.
- Require linked run evidence in every approval decision, approvers should not rely on summaries alone.
- Review approver role assignments quarterly as teams reorganize.
- Train backup approvers on policy nuances before primary approvers take leave.
Common issues
- Approval request missing context
- Initiators must attach failure evidence and run IDs. Reject incomplete requests and require resubmission with full context.
- Shared service account listed as approver
- Audit trails require identifiable humans. Replace shared accounts with named role assignments.
- Emergency fix bypasses approval
- Document break-glass procedures separately. Post-incident reviews should reconcile emergency actions with retroactive approval or policy updates.
Was this page helpful?