ISO 27001 Crypto Exceptions: Evidence & CER Guide

The audit conversation David feared most arrived three weeks sooner than expected. InnovatePay had just acquired a smaller firm, QuickAcquire. The deal was a strategic win, but buried in the tech stack lay a legacy data transfer module using a cryptographic library that did not meet InnovatePay’s approved standards. Replacing it was a six-month project. The external auditor would be in next week.
In David’s mind, the scene was painfully clear. The auditor, calm and methodical, would land on the deviation and ask the one question that turns we know it is risky into a nonconformity: show me the evidence for the cryptographic exception and how you decided it was acceptable.
At that moment, intent does not matter; control does. Without a documented exception process, management risk acceptance, compensating controls, key management logs, and a time-bound remediation plan, an auditor is likely to treat the issue as a control failure or weak ISMS governance. This flagship guide shows how to turn that moment into a demonstration of maturity, using Clarysec’s toolkits and policies, ISO/IEC 27001:2022 control A.8.24 Use of cryptography, and a cross-compliance lens spanning NIS2, DORA, GDPR, NIST, and COBIT 2019.
Why Cryptographic Exceptions Are Inevitable (And How Auditors Assess Them)
Cryptographic exceptions exist for predictable reasons. In Clarysec engagements, we see repeatable patterns:
- Legacy technology constraints, for example unsupported algorithms, cipher suites, or key lengths.
- Vendor lock and certification delays that block timely upgrades to approved crypto.
- Operational realities in incident response or forensics that require temporary deviations to collect evidence or maintain service continuity.
- Migration periods, where transitional interoperability forces weaker settings for a limited time.
- Partner or customer constraints that prevent your preferred baseline.
Auditors for ISO/IEC 27001:2022 do not demand perfection, they demand control. They evaluate whether encryption is appropriate and consistent, whether key management is governed and logged, and whether you actively identify and manage outdated algorithms in your estate. The first step is aligning how you run exceptions with what auditors expect to see.
Anchor the Exception in Policy and Risk Governance
A mature ISMS treats exceptions as risk treatment decisions, not as technical debt. The formal mechanism is a Cryptographic Exception Request, and the policy clause that requires it is the pivot between a managed exception and a finding.
Clarysec’s enterprise Cryptographic Controls Policy requires: Use of non-standard cryptographic algorithms or temporary deviation from approved lifecycle practices requires a documented Cryptographic Exception Request. The policy family links directly to risk treatment. The companion Risk Management Policy supports assessment of cryptographic control risks and documents the risk treatment strategy for exceptions, algorithm obsolescence, or key compromise scenarios.
Once the requirement exists in policy, every exception must be traceable to a CER with management risk acceptance, a linked risk register entry, compensating controls, and an exit plan. Introduce these artifacts before anyone asks by walking the auditor through your governance, then into the technical state, using the interview and sampling approach set out in the Zenith Blueprint.
Build the CER as an Auditor-Ready Control Record
Ticket comments are not exception records. A CER should be structured, version controlled, and sampled like any other control. Whether implemented in a GRC tool or a controlled template, a strong CER includes:
- Exception summary, what is non-compliant and where.
- Scope, data types and whether the exception affects data at rest, in transit, or both.
- Business justification, the why that ties to service or business constraints.
- Security impact assessment, realistic threat scenarios such as downgrade risk, MITM, weak hashing, key compromise.
- Compensating controls, for example segmentation, client certificates, short session lifetime, WAF rules, extra authentication, enhanced monitoring.
- Risk rating before and after compensating controls, aligned to your risk matrix.
- Owner, an accountable risk owner in the business.
- Approvals, security, system owner, and management risk acceptance.
- Expiry date and review frequency, not open-ended.
- Exit plan, roadmap, dependencies, milestones, and due dates.
- Evidence pointers, links to configs, logs, test results, vendor statements, and change approvals.
In David’s case, the QuickAcquire exception moved from a hidden liability to an auditable decision when he raised the CER in the opening meeting, offered the evidence pack, and invited sampling.
The Minimum Viable Evidence Pack for a Crypto Exception
Auditors expect you to go beyond the technical snapshot. For exceptions, they want governance and operational proof. A practical evidence pack includes:
- The completed CER with approvals and expiry.
- The linked risk assessment and treatment decision.
- Key management procedures for the affected system, with logs of key generation, distribution, rotation, access, and destruction.
- Change records for crypto settings, and test evidence showing changes were validated or constraints verified.
- Monitoring and detection evidence for compensating controls, including SIEM rules and alert tests.
- Communication records that show impacted staff were informed and trained on the deviation and monitoring expectations.
- A time-bound exit plan with milestones, dates, budget where applicable, and owners.
- Policy review history that demonstrates cryptographic baseline upkeep and algorithm lifecycle management.
These evidence types align to ISO/IEC 27002:2022 guidance on cryptography and change control.
Use the Zenith Blueprint to Collect and Present Evidence
The evidence method in the Zenith Blueprint is straightforward and auditor friendly: Interview, review, observe, and sample. Apply it to exceptions:
- Interview the system owner and security lead. Why is the exception necessary, what changed since the last review, and what is next on the exit plan.
- Review the CER, risk record, policy clause, and vendor or partner constraints. Confirm expiry and review dates.
- Observe the technical state, that is the exact configuration and where the exception is enforced, and see where compensating controls are applied.
- Sample multiple exceptions, usually three to five, to prove consistency of structure, approvals, reviews, logging, and expiry handling.
A Hands-On Example: Making a Legacy TLS Exception Audit-Proof
Scenario: A revenue critical B2B integration requires an older TLS cipher suite because the partner endpoint cannot negotiate your approved settings. Breaking the connection is not viable.
Make it auditable in four moves:
- Create the CER and tie it to risk. Set a 90-day expiry with 30-day reviews, attach partner correspondence, and link to a risk register entry owned by the business.
- Choose compensating controls that generate evidence. Restrict source IPs to partner ranges with firewall change records. Enforce mutual TLS if possible and retain certificate issuance records. Increase monitoring for handshake anomalies and retain SIEM rule definitions and alert tests.
- Prove key management discipline. Show KMS access logs, RBAC assignments, break-glass records, and periodic access review minutes. For smaller programs, your baseline requirement is explicit in the Cryptographic Controls Policy-sme: All access to cryptographic keys must be logged and retained for audit review, with regular access reviews.
- Package the exception. Assemble a single evidence folder or PDF that includes the CER, risk record, gateway configuration snapshot, firewall change tickets, KMS logs, SIEM rule and event samples, test records, and communications to operations.
Cryptographic Agility: Proving Exceptions Are Temporary by Design
ISO/IEC 27002:2022 encourages cryptographic agility, the ability to update algorithms and suites without rebuilding entire systems. Auditors look for evidence of agility, not promises:
- Policy review cadence that updates acceptable algorithms and practices with versioned change logs.
- Crypto update testing records that demonstrate secure rollout paths.
- Communications notifying personnel of crypto changes and operational impacts.
- Backlog items with delivery progress tied to exception expiry dates.
Exception Governance Meets Forensics
Exceptions can complicate investigations, especially when encryption or unsupported devices block evidence collection. Clarysec’s Evidence Collection and Forensics Policy addresses this with explicit considerations for evidence required from unsupported or encrypted devices. The SME version, the Evidence Collection and Forensics Policy-sme, anticipates practical failure modes, for example if evidence cannot be collected as per policy due to a system crash or corrupted media.
Plan for this in your CERs. Include potential forensic impact, escrow needed keys, and define emergency access and logging requirements.
Cross-Compliance Mapping: One Exception, Many Lenses
In regulated or multi-framework environments, the same exception will be examined through different lenses. Use the Zenith Controls guide to keep your evidence pack coherent.
| Evidence artifact | ISO/IEC 27001:2022 focus | NIST focus | COBIT 2019 focus | Regulatory focus |
|---|---|---|---|---|
| CER with approvals and expiry | Annex A control A.8.24, A.5.1 policy governance, risk treatment traceability | SC-13 cryptographic protection, POA&M alignment, authorization of risk | APO12 manage risk, DSS01 operations, decision rights and oversight | Accountability, time-bound remediation for NIS2 and DORA, security of processing under GDPR |
| Risk register entry linked to CER | Clause 6.1.3 risk treatment, residual risk acceptance | RA-3 risk assessment, risk ratings, risk response | EDM03 ensure risk optimization, reporting | Service impact and resilience, risk to essential services and personal data |
| Key access logs and access reviews | Controlled key management, logging, least privilege | AU-6 audit review, CM controls for baselines, key lifecycle evidence | MEA02 monitor, evaluate, assess, control performance | Demonstrable access accountability for GDPR, traceability for DORA |
| Crypto policy review change log | Document control, continual improvement, algorithm lifecycle | CM-3 configuration change control, baseline upkeep | APO01 manage the IT management framework | Evidence of keeping up with threats and standards |
| Test records for crypto changes | Verification of changes and outcomes, suitability | SA-11 developer testing and evaluation, regression checks | BAI07 manage change acceptance and transitioning | Reduced likelihood of incident impact and regression |
| Staff communications on crypto changes | Operational adoption and awareness under A.7 resource controls | IR-4 incident handling readiness, operational readiness | APO07 manage human resources, awareness | Preparedness and organizational measures, explicit accountability |
| (Note: Table adapted from Zenith Controls cross-mapping methodology) |
How Different Auditors Will Probe (And How to Answer)
Even in a single audit, styles vary. Prepare for each style and steer the narrative:
- The ISO/IEC 27001:2022 auditor will ask where the cryptography policy is, where the exception process is defined, how often exceptions are reviewed, and will want to sample. Lead with your CERs and a controlled register.
- The NIST-oriented auditor will look for cipher suite baselines, downgrade protections, key generation and destruction procedures, and logs with alerting. Bring KMS logs, SIEM rules, and validation tests.
- The COBIT or ISACA auditor will focus on who owns the risk, who accepted it, what the review cadence is, and which metrics show exception burn-down. Bring steering committee minutes and exception aging reports.
- The regulator-minded reviewer will ask how the exception affects availability and integrity of critical services, and whether personal data exposure risk increased. Offer resilience planning artifacts and a firm remediation timetable.
Common Pitfalls That Create Nonconformities
- Exceptions without expiry dates, interpreted as unmanaged risk.
- No management risk acceptance, where an engineer signed off in a ticket without accountable ownership.
- Compensating controls described but not evidenced, for example monitoring claims without SIEM rules.
- Missing or inaccessible key management logs.
- Policy says one thing and practice another, for example CERs are required but not used.
The Audit Day Checklist for Crypto Exceptions
- A current register lists all crypto exceptions with CER IDs, owners, approvals, review dates, and expiries.
- Every exception links to a risk record and a documented treatment decision.
- At least two compensating controls per exception, with hard evidence.
- Key access is logged, logs are retained, and access reviews are performed.
- Crypto policy review history is available, with versioned changes.
- You can sample three or more exceptions and tell a consistent story.
- A roadmap shows reduction of exceptions over time.
Supplier and Partner Constraints
Many exceptions originate outside your direct control. Partners impose cipher suites, vendors lag on roadmaps, or acquired systems carry debt. Treat external constraints as part of your governance, not excuses. Require supplier statements on crypto roadmaps, include contract clauses that set crypto baselines, and put external dependencies in your risk register.
Next Steps: Build Your Exception Program in One Sprint
- Inventory all cryptographic exceptions, including hidden ones in edge services.
- Create or retrofit CERs for each exception with approvals, expiry, and exit plans.
- Link every CER to a risk register entry with an accountable owner.
- Assemble a standard exception evidence pack template and rehearse audit sampling.
- Validate cross-compliance readiness with the Zenith Controls guide.
Turn crypto exception anxiety into audit confidence. Book a working session with Clarysec. In one engagement, we implement a CER workflow, an exception register, and an auditor-ready evidence pack structure. The result is faster audits, fewer repeat findings, and cryptographic exceptions that demonstrate governance rather than improvisation.
Frequently Asked Questions
About the Author

Igor Petreski
Compliance Systems Architect, Clarysec LLC
Igor Petreski is a cybersecurity leader with over 30 years of experience in information technology and a dedicated decade specializing in global Governance, Risk, and Compliance (GRC).Core Credentials & Qualifications:• MSc in Cyber Security from Royal Holloway, University of London• PECB-Certified ISO/IEC 27001 Lead Auditor & Trainer• Certified Information Systems Auditor (CISA) from ISACA• Certified Information Security Manager (CISM) from ISACA • Certified Ethical Hacker from EC-Council


