A policy exception is a deviation from the established policies, standards, or procedures of the enterprise, such as the information security policy. A policy exception may be granted by the management when there is a valid business reason or justification for the deviation, and when the risk associated with the deviation is acceptable or mitigated. The best course of action when a business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls is to obtain management approval for policy exception. This will ensure that the business unit is aware of the implications and consequences of the policy exception, and that the management agrees with the risk acceptance and approves the policy exception. The other options are not the best course of action, as they involve different risk response strategies or outcomes:
Develop an improved password software routine means that the business unit modifies or enhances the password controls of the software package, such as by increasing the password length, complexity, or expiration. This may not be a feasible or effective way to address the risk of weak password controls, as it may violate the terms and conditions of the software vendor, or may not be compatible or consistent with the software package.
Select another application with strong password controls means that the business unit replaces the software package with another application that has better password controls, such as by using encryption, authentication, or authorization. This may not be a desirable or efficient way to address the risk of weak password controls, as it may incur additional costs, delays, or complexities, or may not meet the business requirements or expectations of the business unit.
Continue the implementation with no changes means that the business unit proceeds with the software package without any modifications or improvements to the password controls, or without any approval or documentation of the policy exception. This may not be a responsible or ethical way to address the risk of weak password controls, as it may expose the enterprise to legal, financial, or reputational risks, or may compromise the security or compliance of the enterprise. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 3, Section 3.4.1.1, pp. 121-122.