Slack
Monitor and respond in Slack channels without exposing secrets. Message posting requires certificate validation and audit export.
Monthly verification • last run September 2025
Modes & scopes
Modes
- Read-first
- Write-gated (message posting)
Scopes
- Event subscription for monitored channels
- chat:write for approved automations
Runbook highlights
Connection modes
Slack Enterprise Grid with token rotation via SCIM. Optionally route through Slack EKM for BYOK compliance.
Learning Controls
Toxicity and data loss classifiers feed evaluation contracts; drift triggers safe-mode.
Evidence
Certificates include workspace IDs, channel IDs, and content policy hashes.
Sample automations & evidence
Sample automations
- Escalate Sev1 alerts to on-call channel
- Post certified incident summary with policy hash
Action Certificate mapping
Every certificate embeds connector identifiers, residency policy hashes, and Learning Control references so downstream systems can verify scope before allowing writes. Export verification logs to Splunk/Datadog using thetrustplane.certificate_id attribute.
Need a signed runbook?
Request a signed copy of this connector runbook, DPIA, or sub-processor alignment via the security contact form. We respond within one business day and can include environment-specific attestations.
Contact security