Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Why you need to become “besties” with policy exceptions

February 29, 2020

Why you need to become “besties” with policy exceptions

If there’s one thing that I think causes the most conflict between security and “the business”, it’s trying to figure out how to deal with policy exceptions. Now, in some cases, organizations have this pretty well dialed out—but based on my observations, I’m not really sure they truly understand why this is the case.

So let’s talk about why you shouldn’t treat policy exceptions like the blood-drenched, severed head of a zombie corpse, and instead, you should Tzu-t up, and figure out how to make them your best friends.

And the reason is based on the advice of the legendary Sun Tzu:

“You should keep your friends close—and your enemies closer.”

Because policy exceptions can be your worst feckin’ nightmare. Most of the time, they

…lead to everything from bun fights to bloody knuckles with the business ultimately over which is more important: following the rules or delivering value (most often seen wearing the clever disguise of “making money”)

…cause the size of your already “my cup overfloweth” security workload when someone brings you an 11th hour request to do something, has overruled the Security Policy Police, and demands you work all night to give them a solution so they can go live the next morning

…and, worst of all, if you do manage to emerge victorious in the Security vs. Business death match…

…you still lose, because you’re once again just another “security arsehole” that delayed a project and potentially cost someone their bonus.

In fairness…it’s not exactly your happy place.

The solution then is to take your policy exceptions out, wine them and dine them, and have a deep and meaningful conversation with them about who they are, why they exist, and why they’re spending so much of their time and energy making your life as a security professional a living hell.

Fortunately, you don’t have to figure out the magic manual of instant attraction for your policy exception wooing all by yourself. It’s already been done for you, and I can tell you that there’s a systematic way which is nearly foolproof…

…as long as you follow the principles and practices of The Agile Security System™ you’ll learn as part of Lesson 3 in the last module of the Building Effective Security Architectures program that starts next week. Because in this particular lesson, packed into under 20 minutes, you’ll learn how to put all that architecture effort you’ve been spending to work.

And I mean REALLY work…

…to apply the architecture you’ve developed to actually solving problems for real people—including becoming best friends with policy exceptions.

The best part?

When you help real people solve real problems, you’re damn-near instantly promoted from “security arsehole” to “Defender of the Realm”…

…with all the associated credibility and trust benefits that go along with it—like actually getting invited to meetings…like people voluntarily asking your opinion about how things should be done…

…and maybe even being the beneficiary of a few rounds of drinks at the pub.

All from the simple act of becoming best friends with your former arch-nemesis, the humble policy exception.

To learn the tricks to tame this troublesome tyrant, all you need to do is join the next cohort kicking off on Monday, February 24th using this link riatch he-or:

https://archistry.com/besa.

As you probably know, the registration closes on Friday (tomorrow) at midnight, so that means you have just over one measly little day to make sure you join us. Sure, you might have the chance to join another cohort in the future—but it won’t be this one, since it’s a live group of people that’ll be different every time. And judging by who’s already registered, I think this one will be pretty special.

Up to you. Link’s there, and we’ll be kicking off next week, whether you’re with us or not.

Say safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, BESA, Security Architecture, Security Policy

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.