Exception Management Policy ? Best Practices
Posted by Superadmin on September 16 2022 06:29:25

Exception Management Policy – Best Practices

 PUBLISHED DATE:JANUARY 24, 2019
Exception Management Policy

There may be times that business operations require certain exceptions be made to information security policies and procedures. This article provides some guidance and best practices on the exception management policy and how you can leverage it for your organization’s policy.

Management by Exception

Exceptions to any information security policies or procedures should be reviewed and approved by the senior management. Exceptions should be managed accordingly. In most cases, exceptions could be provided for the following:

Examples of exceptions

How exception is handled

During the course of conducting business, if there is a need for an exception to any information security policy and/or procedures, the request should be made by the related staff or team member. To maintain centralized control of exceptions, exceptions should be only granted through the Security Department. Other managers should not allowed to grant exceptions at their own discretion.

The exception request should include:

The security management should review the request and determine whether or not to grant the exception. If an exception is made, other mitigating controls should be implemented. These mitigating actions can be administrative, physical, technical, or any combination of these types of controls.

Those employees that have been granted an exception should be held accountable for following any other mitigating procedures implemented, and sanctions should be consistently applied for failure to follow these requirements.

Is there a time limit on security exceptions?

A time limit should be established for all exceptions. The time limit should be determined based upon the exception requested and any additional business impact along with associate risks involved. Exceptions are considered temporary and should be removed/canceled as the exception is no longer necessary.

Monitoring of exception

A determination should be made on how the exception should be monitored. This monitoring should be developed based on the exception made along with appropriate procedures for reviewing or auditing the exception.

An exception should be well documented. Documentation of an exception should include at least the following elements:

Final thoughts

At times, information security policies and procedures could directly affect business operations. For this reason, certain exceptions and steps may be taken to maintain the proper continuation of business operations.