Core Concepts

Governed remediation

Policy-bound fixes.

Overview

Governed remediation is how Zof proposes, reviews, and applies fixes to failing validation outcomes without bypassing enterprise policy. AI agents may suggest code or configuration changes, but policy packs, human authorization, verification runs, and audit logs constrain what can execute automatically.

Use governed remediation when you want faster recovery from test failures while preserving separation of duties: engineers propose, security or release managers approve, and the platform records every decision for compliance review.

Who should read this

  • New users, technical writers, and integration engineers aligning internal documentation with Zof terminology.

Prerequisites

  • Basic familiarity with Zof Console navigation
  • Organization member access

When to use this workflow

  • Onboarding engineers unfamiliar with Zof terminology
  • Writing internal runbooks that align with Console UI labels
  • Mapping customer CMDB or ITSM fields to Zof entities

Governed remediation flow

Governed remediation flow

From failure signal to verified fix

Step-by-step procedure

Enable remediation policy

Governance → Policies → enable remediation pack for target applications.

Require human authorization for production environments; allow auto-apply only in staging when policy permits.

Triage failed runs

Operate → Runs → open failed run → Results tab.

Open remediation suggestion when agent or workflow surfaces a plan.

Approve and verify

Governance → Remediation → Approvals queue → review diff and blast radius.

After apply, confirm verification run passes before closing release gate exceptions.

Key concepts

Remediation plan
Structured proposal listing affected files, tests, and rollback steps before any change is applied.
Verification run
Mandatory re-execution of linked suites after apply to prove the fix resolves the failure without regressions.
Human authorization
Explicit approver action recorded in audit logs; distinct from automated policy checks.

Best practices

  • Separate approvers from authors of the original failing change
  • Scope auto-apply to staging; require approval for production-adjacent environments
  • Attach run IDs and plan URLs to change tickets for SOC and release audits

Was this page helpful?

01The operational surface

One surface for posture, operations, and what needs attention next.

The Zof home is not a marketing dashboard. It is the operational surface engineering, QA, and SRE teams use every day, quality posture, in-flight runs, coverage by module, and the actions a leader should look at next.

OPERATIONAL KPIs

  • Runs
  • Coverage
  • Risk

Live across every environment you ship to.

WORK SPINE

  • Specs
  • Tests
  • Schedules

From specification to scheduled regression.

GUARDRAILS

  • RBAC
  • SSO
  • audit

Every action attributable to a named human.

STAGING · LIVE/home
Zof AI home command center showing 12 runs at 94% pass, 3 open critical issues, 84% coverage, four module traceability bars, the specification pipeline, upcoming schedules, and recommended next actions with an active-runs sidebar.
Home view · Checkout Service · Staging · captured live from the product.
  • 01 · RUNS · 24H

    94% pass

    12 runs across staging

  • 02 · COVERAGE

    84%

    Across four modules

  • 03 · ACTIVE RUNS

    3 running

    Live on this branch

  • 04 · NEXT ACTIONS

    Recommended

    Triage gaps, new spec

Governed remediation | Zof AI Documentation