All use cases

Verify your security controls on a schedule, without a fire drill

Zero checks your security configuration on the cadence you set, verifies each control is in place, and reports deviations to the compliance team before audit week.

Zero connects:SlackGitHubNotion

Why every audit turns into a two-week fire drill

Audits used to be a quarterly all-hands fire drill: screenshots of every firewall rule, every IAM policy, every access review, assembled by hand in the week before the auditor arrives. Controls had drifted without anyone noticing; remediation happened in crisis mode. Continuous Control Verification runs the checks on a steady cadence, and drifts get caught the week they happen, not the week before the audit. The compliance team gets a dated, signed record of every check; engineering gets an alert when something drifts; auditors get evidence that's already organized.

How to ask Zero to verify controls

@Zero every Monday at 7am, verify our security controls. Firewall rules match the baseline in Notion, required GitHub branch protection is enabled on `main`, no repo has disabled 2FA. Log results to the Controls database and alert #compliance on any drift.

How Zero verifies your security controls

Zero pulls your current security configuration
Zero reads your source-of-truth controls (branch protection, IAM, firewall rules, access reviews) from the systems where they live. No sampling: every control in scope gets checked each run.
Zero compares to the baseline you defined
Your expected configuration lives in a Notion database. Zero compares current state to baseline, flags any drift, and records pass/fail per control with a timestamp and evidence link.
Zero logs results and alerts on drift
Every run writes a dated record to the Controls database. Any drift triggers a Slack alert tagging the compliance channel and the engineer who owns the control. Auditors get an immutable history.

Remediate a drift, scale coverage, or lock the schedule

Remediate a drift
Have Zero open a ticket or PR to fix the drift automatically.
@Zero for any drift on branch protection, open a PR to restore the protection rules and tag the repo owner.
Expand control coverage
Add a new control family to the verification sweep.
@Zero add GDPR controls to the weekly verification: DPA compliance, deletion-request turnaround, cross-border transfer logs.
Lock the schedule
Move from weekly to daily for high-risk controls.
@Zero run prod database access verification daily, not weekly. Keep the rest on the weekly cadence.

Required integrations: GitHub, Notion, and Slack

GitHub
GitHub
GitHub. Zero reads branch protection, repo permissions, and 2FA status for all repos in scope. Read access to org settings is required.
Required
Notion
Notion
Notion. Zero stores the baseline configuration and writes verification results. Read + write access to two databases (baseline and results) is required.
Required
Slack
Slack
Slack. Zero alerts the compliance channel on drifts and posts a weekly summary. Channel write access required.
Required

Best practices for continuous control verification

Keep the baseline in one place: Notion, Drata, or your own CMDB. Scattered baselines drift silently and Zero can't check what isn't documented.
Separate 'drift' from 'exception'. A drift is a control that changed without approval; an exception is a deviation that the team approved. Zero should treat them differently.
Run the summary into audit season. Auditors love continuous logs, and 'we've been doing this weekly for two years' is a much stronger story than 'we ran the checks last week'.