Is your approval process working?
In every business, there are many scenarios which require some form of approval process. Common examples we might find in every business are:
The approval process can take many different forms, but we typically rely on some form of 4-eyes check, or human approval process, where there are typically 3 different parties involved with a flow such as:
There are of course occasions where there can be multiple approvers and the approver might be the risk manager, but critically, there is some separation between the requester and approver to minimise risk of malicious or accidental or unauthorised harm through the resource being requested. This is normally documented into policy and control statements which require an approval process to be followed.
To make the narrative easier to follow, this article focuses on examples using requests for access to a resource, but many of the considerations could apply equally to a code review or a finance approval. The focus is on identifying the business trade-offs involved, and assumes technology to support the choices is readily available (which it typically is).
Design Considerations
There are many things to consider in designing what an appropriate approval process should look like.
These key piece of information will typically inform the design of an approval process, most critically who will have the permissions to provide the approval.
Effectiveness
There are many perspectives through which to measure effectiveness of the approval process and the contextual factors mentioned above are critical to establishing this. Let us consider from the perspective of the three different actors involved.
The Risk Manager
The foundational objective of many approval processes is compliance with policy. There will be a policy which states all access needs to be approved, and an auditor will expect to see evidence of approval for each request. This is absolutely foundational and provides very little assurance that any risk is being mitigated....
compliance != risk mitigation
In order to establish whether risk is actually being mitigated, we need to dig a bit deeper....
领英推荐
The Requestor
In the vast majority of cases, the person making the request is doing so in order to perform their role. We have controls in place to mitigate risks to the business, but we should be listening to feedback from people requesting access regarding:
There are always trade-offs to be made, but a high frequency of approvals from outside the immediate team, would often indicate some underlying problem and whether it is poor engineering practices resulting in frequent use of break-glass, or new starters needing to request access to dozens of the same applications as their team mates, these are problems that need to be fixed.
The Approver
Arguably the most important person in the process is the approver. Depending on the process or the organisation: they could be part of a centralised IAM team, they might be an incident manager who needs to approve breakglass access, they might be a line manager, they could be an application owner.
For many forms of access, selecting Approvers is not easy, and as organisations scale contextual awareness of employees and applications reduces, making the task even harder.
Key questions for the approvers:
Concluding on Effectiveness
When you dig a bit deeper into how the process is operating, gathering some of the metrics above, it is not uncommon to find and subset of processes which:
There are of course exceptions to this, but of all of the approval processes within your organisation, it is very uncommon not to find some which exhibit these characteristics. Starting to look at those which are used most frequently is often a good place to start.
There are many trade-offs to be made here, sometimes some "friction" in the process can be a useful tool to encourage the right behaviours, but make these trade-offs consciously and recognise the impact it has on all participants in the process.
Alternative Approaches
There will always be some approval processes needed, but some techniques to try and mitigate more risk and reduce inefficiency are:
What else?
I am quite sure there are other considerations not taken into account above? What would you add to the conversation?
Head of Sales and Marketing Department
5 个月It's amazing! Phil, thanks for sharing!
Technical Principal
2 年Interesting article. I'd add an additional consideration. From a security perspective there's a risk judgement to be made but what's almost never considered is the opportunity cost of the approval process. How much does even having an approval process cost in terms of not just implementation of the process but the chilling effect of the process on growth and change? I'd suggest considering alerting and monitoring of access in place of approval process in the first place. As you point out approval is often a tick the box process anyway. Regardless, event granting approval does almost nothing to prevent risky behaviour/actions once granted. I'd argue that in almost all cases, approval processes can be replaced with SDLC automation and judicious (not overly noisy) alerting.
Compliance != risk mitigation. So true!
Information & Technology Strategy, Change and Run Leader, Enterprise Architect or Risk leader. Experienced in Transformation including Mergers, Divestment & Acquisition within Financial Services
2 年Try Approver Apathy which you also neatly described. I can only concur that the right control is used for the severity of risk faced to ensure the cost of control doesn’t exceed the cost of failure. As described, oftentimes what appears to be a necessary control is nothing more than an inability to automate risk MI any other way. This can be addressed by a simple Cost Benefit analysis across Resource Effort and Delay Opportunity.