All lessons

Watch this lesson

Enter your work email to unlock every lesson in Hoop University. One email, full access. No spam.

No spam. One email, full access to every lesson.

Platform Fundamentals · Lesson 03

Access Requests and Approval Workflows

Just-in-time access with Slack-native approvals and a complete audit trail

6 min·intermediate·Platform Engineer
  • intermediate
  • approvals
  • jit-access
  • slack
  • compliance
  • audit

What you’ll learn

Outcomes and concepts.

Learning objectives

  1. 01Configure a per-command access request rule and bind it to a specific resource
  2. 02Scope approval rules to user groups and define how many approvers are required
  3. 03Use force approval groups to enable break-glass access for SRE scenarios
  4. 04Connect Slack so approvers can review and approve requests without leaving their workflow
  5. 05Read the session audit trail to identify the requester, command, resource, timing, and approver
  6. 06Map Hoop's audit records to SOC 2 and ISO 27001 evidence collection requirements

Key concepts

Access request rule

A policy that requires explicit approval before commands run against a protected resource. Rules can be scoped per command, bound to specific resources, and limited to specific user groups.

By command approval

An enforcement mode where every individual command executed against a resource requires its own approval before it runs. Prevents unilateral access to production.

Resource binding

An access request rule only enforces on the resources explicitly attached to it. This is what scopes the policy to the systems that need protection.

Approval user groups

The groups whose members can approve incoming requests. Combined with an approval count to require single or multi-party approval.

Force approval groups

A break-glass mechanism that lets specific groups, typically SRE, bypass the standard approval flow during urgent scenarios.

Slack approval flow

Approvers receive request notifications directly in Slack with the requester's name, email, target connection, exact command, and group membership. One-click approve or deny without leaving Slack.

Audit trail

A locked record of every step in the request: who requested access, what command they ran, which system, when it happened, and who approved it. Designed as evidence for SOC 2 and ISO 27001 audits.

Check what you learned

4 questions. No score, no clock.

Answer each one to reveal the explanation. You can change your selection any time.

00Ready when you are

Answer 4 short questions about this lesson.

End of track

You finished the lesson.

Browse the rest of Hoop University, or pick another track.

Ask AI to summarize this lesson