How to deal with Application Security Policy Exceptions

in CISM
This question is not related to CISA/CISM certification, but an CISA/CISM expert could answer this and so posting this here
We have defined Application Security Baseline and expect existing/new applications to follow the baseline. Recently one of the newly developed application doesnt follow a few of the security baselines.
Another day, a different website might be developed and that one might violate different policies in the baseline.
Development team might or might not fulfill the baseline requirements and in such cases How to deal with such exceptions ?
suggestions needed as an Information Security point of view - Should we document such exceptions and allow the website to operate ? should we accept the risk involved ?
Could some one share thoughts on this ?
We have defined Application Security Baseline and expect existing/new applications to follow the baseline. Recently one of the newly developed application doesnt follow a few of the security baselines.
Another day, a different website might be developed and that one might violate different policies in the baseline.
Development team might or might not fulfill the baseline requirements and in such cases How to deal with such exceptions ?
suggestions needed as an Information Security point of view - Should we document such exceptions and allow the website to operate ? should we accept the risk involved ?
Could some one share thoughts on this ?
Comments
A couple other considerations:
Are the defined "application security baselines" required?
Are the developers aware of the baselines?
Can changes to the application be made to align with the baselines?
How important is the application to the business?
What does the application do (i.e., is it just for internal uses, is it an ecommerce site, does it collect personal information or credentials, etc.)?
Still new to the ISACA way, so...
Conduct risk assessment to evaluate the impact of violating baseline.
Suggest/implement mitigating, detective and compensating controls.
Document violation down.
Understand the business risk appetite.
Is the risk minimized to an acceptable level?
Advise business owner accordingly.
Allow web site to operate. Business always wins.
Choose the "best of..." depending on your role.
So are you the auditor, business owner, security manager or just a concerned stakeholder?