top of page

Why Azure Policy Exceptions Can Kill Your SOC 2 Audit

  • gs9074
  • Jul 29
  • 2 min read

Updated: Aug 18

Most startups think defining policies in Azure is enough for compliance. But unless you understand the difference between an exception and an exemption, you may be leaving critical gaps open—ones your auditor will flag instantly.


Azure Policies are powerful — until someone adds an exemption.

Many start-ups assume defining policies is enough to demonstrate control. But auditors don’t just care that you have policies — they care whether they’re enforced, tracked, and properly reviewed.

If your DevOps team routinely creates exemptions to unblock deployments, or if your cloud leads don’t distinguish between “exceptions” and “exemptions,” you’re likely heading into audit trouble.

What’s the difference?

• Exceptions in Azure are operational. They tell the system “skip this policy on these resources.”

• Exemptions are governance-level. They document “we acknowledge this policy isn’t applied, and here’s why.”

Exemptions are technical artefacts. Exceptions are risk decisions.

You need both but they must be traceable, time-bound, and reviewed. Most teams skip that last part.


Why auditors care

From a compliance perspective, exceptions and exemptions without review are risks. They imply:

  • Incomplete policy enforcement

  • Lack of approval workflows

  • Missing audit trail of who bypassed what

  • No regular review or expiry process

Your policy structure may be fine on paper — but if exemptions are used like duct tape and exceptions aren’t documented, it undermines your entire governance story.


What good looks like

  • Exemptions are reviewed regularly — ideally quarterly — and always have owners, justifications, and expiry dates.

  • Exceptions are documented outside the platform (e.g. tracked in a GRC tool or spreadsheet), reviewed by engineering leadership or your virtual CISO.

  • Policy evaluations include exemptions — your reporting tools or custom scripts flag exempted scopes.

  • Infrastructure as Code (IaC) does not silently exempt policies without change control.

If you're automating exemptions, your pipeline should include approvals, logging, and tagging.


What I recommend

  1. Review all current exemptions in your Azure environment. You can query them using Azure Resource Graph or PowerShell.

  2. Create a register of exceptions — even if informal — and map them to policies.

  3. Enforce a process: No exemption or exception without documented risk acceptance and an expiry or review date.

  4. Get an external review if you’re unsure what’s in scope or what's putting your SOC 2 at risk.


Want to find hidden policy gaps?

[Download the Azure SOC 2 Readiness Checklist]Includes a policy exemption review tracker you can customise.


Or, if you're facing time pressure:📅 Book a 2-day Azure Compliance & Cost AuditGet a practical review of your policies, identity controls, and audit posture — for founders and teams who need to get compliant fast.

 
 
 

Comments


Bagh Co Logo

Bagh Co Ltd

  • LinkedIn
  • X
  • Threads

©2025 by Bagh Co Ltd.

bottom of page