Skip to content
Skip to content
Back to connectors
Connector runbook

Slack

Monitor and respond in Slack channels without exposing secrets. Message posting requires certificate validation and audit export.

Monthly verification • last run September 2025

Modes & scopes

Modes

  • Read-first
  • Write-gated (message posting)

Scopes

  • Event subscription for monitored channels
  • chat:write for approved automations

Runbook highlights

Connection modes

Slack Enterprise Grid with token rotation via SCIM. Optionally route through Slack EKM for BYOK compliance.

Learning Controls

Toxicity and data loss classifiers feed evaluation contracts; drift triggers safe-mode.

Evidence

Certificates include workspace IDs, channel IDs, and content policy hashes.

Sample automations & evidence

Sample automations

  • Escalate Sev1 alerts to on-call channel
  • Post certified incident summary with policy hash

Action Certificate mapping

Every certificate embeds connector identifiers, residency policy hashes, and Learning Control references so downstream systems can verify scope before allowing writes. Export verification logs to Splunk/Datadog using thetrustplane.certificate_id attribute.

Need a signed runbook?

Request a signed copy of this connector runbook, DPIA, or sub-processor alignment via the security contact form. We respond within one business day and can include environment-specific attestations.

Contact security