Releases

Why Exceptions Management is Key to an Enterprise Vulnerability Program

Security and IT teams deal with an overwhelming ‘sea’ of security alerts every day. Prioritizing issues helps teams focus on the most important issues so these can be addressed first. However, even when vulnerabilities are critical and need to be prioritized, there may still be valid reasons for not remediating them immediately. In these cases, it’s important to be able to set exceptions in your vulnerability management program. This helps teams remain focused on the issues they can actually fix, without getting distracted by the ones they can’t. However, while exceptions are essential, they can also become dangerous loopholes if not managed properly.

That’s why we’re excited to launch Mondoo’s unified exceptions management that provides a formal process for documenting, approving, tracking, and reviewing exceptions for your entire IT infrastructure in one place.

Why do you need exceptions?

When vulnerabilities cannot be remediated right away, it’s important to be able to ‘switch off’ alerts for a specified time period, so teams can stay focused on what needs their immediate attention. For instance, valid reasons for setting an exception can be:

  • Compensating controls or workarounds are already in place
  • Updates are already planned within a short time frame
  • Legacy applications that cannot run on updated operating systems
  • Affected assets have required uptimes and can’t be rebooted
  • The finding is a false positive or of low impact and should be ignored
Setting and exception in Mondoo

Setting an exception means that the vulnerability still shows up, but it’s marked as an ‘exception’ and isn’t included in risk score calculations. An exception can be temporary (e.g., waiting for a scheduled update) or longer term (e.g., a legacy system scheduled for decommission). Although exceptions are important for day-to-day vulnerability management, it’s easy to see how they could lead to disastrous outcomes if not managed properly. That’s why a formal management process is needed.

What is Exceptions Management?

Exceptions management is the formal process of documenting, approving, tracking, and reviewing vulnerabilities that cannot be remediated within standard timelines. Having a formal review process ensures that exceptions are not ad-hoc decisions but properly documented, risk-assessed, time-limited, and approved by the appropriate stakeholders (e.g., system owners, risk management, business leaders).

Exceptions management process in Mondoo

This maintains accountability as operations scale, and ensures that exceptions are:

  • Risk-assessed
  • Justified
  • Approved by the right stakeholders
  • Bound by clear expiration dates
  • Continuously monitored
  • Well-documented

With proper exceptions management, exceptions are an element of risk governance, not a loophole. Without it, teams waste time investigating irrelevant issues and reports show compliance and security gaps that have already been resolved by workarounds.

Challenges of Exceptions Management

While most organizations invest in vulnerability scanners and patching tools, one area that is often underdeveloped is exceptions management. Yet, as we’ve seen above, exceptions management is the backbone of a mature, enterprise-grade vulnerability management program.

However, there are often several challenges when implementing exceptions: 

  • No unified experience: Exceptions need to be set in each siloed security tool, even if they’re from the same vendor. This can cause duplicate work, conflicting settings, and confusion.
  • Lack of automation: It’s important to receive automatic reminders about exceptions to be reviewed and those that are about to expire, otherwise it’s easy to lose track. Even if tools support exceptions, they don’t always include automation.
  • No role based permissions: The roles of requester and approver should be separated so multiple stakeholders are involved in setting the exception.
  • No audit trail: The auditor will be taking a close look at any exceptions on the system, so it’s very important to document reasons, requesters, approvers, and renewals, including the history of the exception.
  • Lack of time bounds: It’s important to set time limits on exceptions to ensure that they get reviewed and are still valid.

How Mondoo delivers enterprise-ready exceptions management

Since the Mondoo platform covers your entire IT infrastructure, from cloud, on-prem, and endpoints, to network devices, SaaS platforms and the SDLC, this means you only need to set exceptions in one place. Mondoo’s automated review process ensures that each exception gets reviewed and approved by the appropriate stakeholders, and requesters are automatically notified when their exceptions are about to expire.

Key features of Mondoo’s Exceptions Management:

  1. Centralized: All exceptions are managed from one central interface, avoiding duplication and possible conflicting exception settings.
Mondoo Exceptions dashboard
  1. Role based: Mondoo users need to have the Exceptions Requester role in order to submit exception requests and the Exceptions Reviewer role to approve them.
Setting user roles in Mondoo
  1. Flexible: Mondoo allows you to select from different exception types and specify the time frame that the exception should apply. For each exception, a justification must be entered, which is important when reviewing or auditing exceptions at a later stage. 
  1. Visible: Exceptions should not be a way to hide problems. That’s why Mondoo clearly shows when an exception has been set for a finding.
Mondoo indicates if an exception is set for a finding
  1. Formal and automated process: Each exception requires approval from a user with Exceptions Reviewer permissions. This means that there are always multiple stakeholders involved in deciding where the case warrants an exception.
  1. Notifications: It’s important not to lose track of expiring exceptions or those that require approval. This is why Mondoo will send automated reminders via email.
  1. Auditable: Each exception can be reviewed in the Exceptions dashboard and includes detailed information on why and when the exception was requested, the time frame, the requester, approver, any extensions, and the current expiration date.
All exceptions are listed in the Exceptions dashboard

Find and fix the security risks that pose the biggest threat to your business.

Ready to leave your attackers in the dust?

Conclusion

An enterprise-ready vulnerability management program is not one that patches everything. Instead, it should use a deep understanding of the risk landscape to make informed decisions, document reasons, and track and review accepted risk, enabling business operations securely and realistically. Although Exceptions Management may not be the first thing that comes to mind when selecting your vulnerability management platform, it might actually make the difference between ‘shelfware’ and a platform that teams actually use.

Want to learn more? Schedule a demo to see Mondoo in action.

Tim Smith

Tim Smith is a Product Manager at Mondoo. He’s been working in web operations and software development roles since 2007 and port scanning class As since 1994. He downloaded his first Linux distro on a 14.4 modem. Tim most recently held positions at Limelight Networks, Cozy Co, and Chef Software.

Deborah Galea

Deborah is Director of Product Marketing at Mondoo and leads messaging and positioning, product launches, and sales enablement. She has 20+ years of experience in the cybersecurity industry. Prior to Mondoo, Deborah was Director of Product Marketing at Orca Security and held various marketing positions at other cybersecurity companies. She co-founded email security company Red Earth Software, which was acquired by cybersecurity firm OPSWAT in 2014.

You might also like

Supply Chain Security
Navigating the Sands of Dune: Protecting NPM From the Shai-Hulud Worm
Vulnerabilities
How to Fix 7-Zip Vulnerability with PoC Exploit (CVE-2025-11001)
AIX
Four Critical Vulnerabilities in IBM AIX: Why You Should Patch Now