Security Policy Exceptions
There are times in which an organization (or a department within an organization) may realize that an information security policy requirement may not be reasonable or even possible for them to implement. In these cases an information security policy requirement exception should be developed. The benefit to creating a policy exception is that the information security requirement is directly addressed and a documented rationale is provided explaining why the exception is requested or taken.
An information security policy exception is a gap between the information security requirements and the adopted information security policy. In most cases information security policy will reflect information security requirements, but occasionally an organization may find it appropriate to document an exception to a requirement. Exceptions are generally noted with a modification to the requirement, with compensating controls, or with a risk-based rationale. Each of these information security policy exception types are explained below:
Audit Reviews and Updates – The department shall review and update the selected audited events annually every six months, or as required.
Identification and Authentication of Organizational Users - The Department shall ensure the organization’s information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users.
Exception: Thin client workstations require a logon to provide access to applications. Group identifiers are used for thin clients.
领英推荐
Compensating Controls
Thin client desktop has not access to sensitive data.
Data may not be stored on thin client desktops.
Each application requires a unique user identifier and authentication credential to login.
·????? Exception with Risk-Based Rationale - This type of policy exception acknowledges the security requirement, states the requirement cannot (or will not) be met by the system, system component, or the department, and provides a risk-based rationale to address residual risks of not implementing this control. For example, the policy statement below states that the authentication feedback requirement cannot be met by a web-based application in the system and offers rationale of why the risk is considered low for this component.
Authenticator Feedback - The Department shall ensure the state information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
Exception: Web-based application has an option to “show password” while providing authentication information. Users are instructed to guard their screen and to only use this option when providing authentication information after a failed attempt. The risk of exposure is considered low based on limited use of the web application to a protected environment and user training provided for protection from shoulder surfing.
Passage from the Security Policies, Procedures, and Standards. Order your copy: https://www.amazon.com/Information-Security-Policies-Procedures-Standards/dp/036766996X
Computer Engineer
3 个月No worries ... the hacker eyes are designed to recognize the green apple not the red ... ??
Doug, I prefer the term "exemption" for what you describe. Management reviews a situation and determines that, on balance, the risk of non-conformity with some requirement is acceptable for business reasons - generally just for a limited periodm giving time to resolve the blockers. "Exception", for me, refers to a nonconformity that has NOT been reviewed and accepted by management - in other words, a potential issue, concern, risk, problem ... Distinguishing them hints at the need for detection, evaluation, resolution and monitoring - for example, if someone is accountable for resolving an exemption "before the end of the year" to limit the risk, there ought to be arrangements in place to plan, complete and confirm the changes are on-track, otherwise the exemption will become an exception on Jan 1.