{"id":49136,"date":"2023-12-12T07:10:03","date_gmt":"2023-12-12T12:10:03","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=49136"},"modified":"2024-04-26T13:08:30","modified_gmt":"2024-04-26T17:08:30","slug":"security-exceptions-the-ultimate-weakness-to-a-secure-environment","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/security-exceptions-the-ultimate-weakness-to-a-secure-environment\/","title":{"rendered":"Security Exceptions: The Ultimate Weakness to a Secure Environment"},"content":{"rendered":"

This blog covers the risks of creating security exceptions \u2013 often overlooked, manipulated and out of control \u2013 and how to reengineer the process to maintain a secure environment.<\/h2>\n
\n

Picture a company that\u2019s the envy of its peers from a compliance and risk perspective. This respected firm has robust staff in its internal audit, security, risk management, and related departments. It has a fully functioning GRC system and tracks control effectiveness globally under multiple compliance frameworks.<\/p>\n

When the company\u2019s employees attend conferences and events, they are flooded with questions about \u201chow they do it\u201d or what \u201cmature\u201d looks like in their environment. With all these things in place, the risk of a significant breach, security control failure, or risk event should be low.<\/strong> However, this program has one glaring hole which occurs at nearly every company. The security exception program lacks maturity and has spiraled out of control.<\/p>\n

What Are Security Exceptions?<\/h2>\n

A security exception is when a policy, procedure or control is temporarily bypassed, using an exception process, for business reasons. It\u2019s an \u201cexception to the rule\u201d justified by the company\u2019s business mission, so to speak. All companies have a legitimate need to grant information security exceptions<\/a>. Never say never when it comes to information security, considering the unlimited ways technologies are used and how quickly they\u2019re evolving.<\/strong><\/p>\n

Common security exceptions include:<\/p>\n