Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
118 views1 page

It Security Policy Exception Approval Workflow

The document outlines the workflow process for handling exceptions. It includes steps like submitting a request, review by various stakeholders, and a decision being made on whether to approve or deny the exception.

Uploaded by

Anthony Pringle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views1 page

It Security Policy Exception Approval Workflow

The document outlines the workflow process for handling exceptions. It includes steps like submitting a request, review by various stakeholders, and a decision being made on whether to approve or deny the exception.

Uploaded by

Anthony Pringle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Exceptions Handling Process Workflow

Request Submission Review Decision


START END

Complete Policy
Exception Request
End User

Form Notify
Department Head

Provide
Email Request Form
Endorsement
to Cybersecurity
Signature
Information Security
Steering Committee

Review Request and


Recommend Action
to CISO
IT Operations

Create Remediation
or Decommission
Plan

NO
NO
NO YES
CISO

Remediation or
Review Notify Other Determine Length
NO Approve Exception? YES Indefinite Approval? YES Decommission
Recommendations Stakeholders? of Approval
Needed?

YES
Stakeholders
Other

Notify

You might also like