Zum Hauptinhalt springen
Starter Kit · Register

Exceptions Register

Updated on 2 min Reviewed by: Cenedril-Redaktion
A.5.1 ISO 27001

The exceptions register documents all approved deviations from your security policies. Every ISMS has areas where a policy cannot be fully implemented temporarily — the register makes these areas visible, time-limited and controllable.

ISO 27001 A.5.1 (Policies for Information Security) requires that policies are binding. When a deviation is unavoidable, it must be formally approved, paired with compensating controls and time-limited. The exceptions register is where you document this chain.

What does it contain?

Each row represents one approved exception. The columns:

  • ID / Type / Scope — unique identifier, type of deviation (e.g. Malware Protection, Access Control) and affected scope
  • Description / Reason — what exactly deviates and why the deviation is necessary
  • Compensating Controls — which alternative measures contain the residual risk
  • Requested By / Approved By — who requested the exception and who approved it
  • Granted / Expires / Status — approval date, expiry date and current status

How to use it

Request: Whoever needs a deviation from a policy documents the case in the register: which policy is affected, why the deviation is necessary and which compensating controls will be implemented.

Approval: The ISO (or executive management for far-reaching exceptions) reviews the justification and compensating controls, sets an expiry date and approves or rejects.

Monitoring: Once a quarter, review the register for expiring or expired exceptions. Expired entries are either renewed (with a fresh review) or closed — in both cases the status is updated.

Register Template

Exceptions Register

IDTypeScopeDescriptionReasonCompensating ControlsRequested ByApproved ByGrantedExpiresStatus
EXC-2026-001Malware protectionAST-013 CI runnersExclude /builds/ directory from real-time AV scanBuilds fail with scan enabled (false positives on artefacts)Weekly offline scan + limited network access for runnersHead of EngineeringISO2026-02-012026-08-01Active
EXC-2026-002Web filterMarketing team (12 users)Allow social media platforms (LinkedIn Facebook Instagram X TikTok)Business need for social media campaignsDLP scan outbound + trainingMarketing LeadISO2026-01-152027-01-15Active
EXC-2026-003Malware protectionAST-006 (3 developer laptops)Exclude Docker Desktop cache directoriesEDR conflicts with containersEDR policy with Docker-aware rules + network monitoringHead of EngineeringISO2026-03-012026-09-01Active
EXC-2026-004Web filterThreat Intel analyst (1 user)Allow access to malware analysis sandboxes and underground forumsThreat researchIsolated research VM + loggedISOISO + CEO2026-01-012026-12-31Active
EXC-2026-005Password policyLegacy ERP interfaceAllow password length of 10 chars instead of 14System does not support longer passwordsAccount lockout after 5 failed attempts + MFA on jump hostIT Operations LeadISO2025-11-012026-11-01Active
EXC-2026-006Web filterFinance team (4 users)Allow banking portalsBusiness needMonitored + DLP rulesCFOISO2026-01-012027-01-01Active

Sources

ISO 27001 Controls Covered

A.5.1 Policies for information security

Frequently asked questions

When do I need an exception?

Whenever a security policy cannot be fully met in a specific case for technical or business reasons on a temporary basis. Typical examples: malware scanner interfering with build processes, legacy system without MFA capability, test environment with relaxed network rules. Every exception needs a documented justification, compensating controls and an expiry date.

How long may an exception last?

As short as possible. In practice, three to six months work well, with a mandatory renewal review. Open-ended exceptions are an audit finding because they effectively override the policy.

Who approves exceptions?

Typically the ISO or executive management — depending on the scope. The CSV template has columns for Requested By and Approved By. The key is that the approver consciously accepts the residual risk and documents the decision.