Automated Tests
Automated tests are created and run by LowerPlane when you connect an integration. They require no manual configuration or intervention. How they work:- When an integration syncs, the Go worker processes the incoming data.
- The worker evaluates the data against predefined compliance criteria.
- Test results are recorded with full details of what was checked and any findings.
- Results update automatically on every sync cycle.
- “MFA is enabled for all Okta users” (triggered by Okta sync)
- “S3 buckets are not publicly accessible” (triggered by AWS sync)
- “Branch protection is enabled on main branch” (triggered by GitHub sync)
- “All devices have endpoint protection installed” (triggered by CrowdStrike sync)
You cannot create automated tests manually. They are generated automatically when you connect an integration. The available tests depend on the specific integration and the data it provides.
Scheduled Tests
Scheduled tests run on a recurring cadence that you define. They are useful for compliance checks that need to happen at regular intervals but are not tied to a specific integration. Available schedules:| Schedule | Frequency | Typical Use |
|---|---|---|
| Hourly | Every 60 minutes | Critical security monitoring |
| Daily | Once per day | Standard compliance checks |
| Weekly | Once per week | Access reviews, configuration audits |
| Monthly | Once per month | Periodic compliance reviews |
| Quarterly | Every 3 months | Management reviews, risk assessments |
| Semi-Annual | Every 6 months | Policy reviews, tabletop exercises |
| Annual | Once per year | Annual risk assessments, penetration tests |
- “Quarterly access review completed” (quarterly schedule)
- “Vulnerability scan executed this week” (weekly schedule)
- “Disaster recovery test performed” (annual schedule)
Manual Tests
Manual tests require a person to upload evidence or confirm that an action has been completed. These are used for controls that cannot be verified through automated data collection. How they work:- The test appears in the Pending state until someone takes action.
- The assigned owner uploads evidence (a screenshot, document, or other artifact) or marks the test as complete with notes.
- The test moves to Passing status once evidence is provided.
- The test returns to Pending when its evidence expires or a new cycle begins.
- “Physical access logs reviewed” (upload access log export)
- “Security incident response drill conducted” (upload drill report)
- “Visitor management policy enforced at office” (upload visitor log)
Upload evidence
Attach one or more files that demonstrate the control is satisfied. Supported formats include PDF, images, spreadsheets, and documents.
Add notes
Provide context about what was done, when, and by whom. Notes are stored as part of the test record for auditor review.
Policy Tests
Policy tests automatically verify that a required compliance policy exists, has been approved, and is within its review period. What policy tests check:- A policy matching the required type exists in the Policy Center
- The policy status is Approved or Active
- The policy has not passed its next review date
- The policy is linked to the appropriate frameworks
- “Information Security Policy is approved and current”
- “Acceptable Use Policy exists and is active”
- “Data Retention Policy has been reviewed within the last 12 months”
Policy tests update in real time as policies move through the approval workflow. You do not need to manually run them.
Document Tests
Document tests verify that a required document is present in the evidence vault and has not expired. What document tests check:- A document of the specified type exists
- The document’s
valid_untildate has not passed - The document is associated with the correct controls
- “Penetration test report uploaded within the last 12 months”
- “SOC 2 Type II report from cloud provider is current”
- “Business continuity plan document is not expired”
Custom Tests
Custom tests let you define your own pass/fail criteria for any compliance requirement that does not fit the other test types. When to use custom tests:- Compliance requirements unique to your industry or organization
- Internal security standards beyond framework requirements
- Tests that evaluate conditions not covered by existing integrations
- Composite checks that combine multiple data points
Define the test name and description
Clearly describe what the test verifies and why it matters for compliance.
Set the severity
Choose critical, high, medium, low, or informational based on the compliance impact.
Define completion criteria
Describe what constitutes a pass. This could be evidence upload, a configuration check, or a confirmation.
Choosing the Right Test Type
| Scenario | Recommended Type |
|---|---|
| Data comes from a connected tool | Automated |
| Check must happen on a regular cadence | Scheduled |
| Requires human judgment or physical evidence | Manual |
| Verifies a policy exists and is approved | Policy |
| Verifies a document is current | Document |
| None of the above apply | Custom |