Security exclusions represent one of the most nuanced decisions admins face when designing effective security policies. These exceptions to your standard security rules require careful consideration - apply them too liberally, and you risk creating security gaps; too restrictively, and you might impede legitimate work. But before you can determine how many exclusions to implement, you need to decide what type of exclusions make the most sense for your environment.
It's a question that generates strong opinions among IT/security teams, and for good reason. The approach you choose significantly impacts both security posture and user experience. Let's explore this decision point and provide a framework for determining which approach makes the most sense for your specific circumstances.
Before diving into the decision-making process, let’s clarify what we mean by these two types of exclusions:
User-Based Exclusions are security exceptions tied to specific user identities, roles, or groups. These exclusions follow the person regardless of which device they’re using. For example, you might exempt your design team from restrictions on certain creative applications, or grant your developers exceptions to run local development environments.
Device-Based Exclusions apply to specific devices regardless of who’s using them. These might be based on device type, ownership model, or security posture. For instance, you might exempt kiosk devices from screen lock requirements or create different security profiles for corporate-owned versus personal devices.
The distinction seems straightforward on the surface, but the implications run deep. Richard Hiralal, System Engineer at Grammarly, gave his opinion recently on the Patch Me If You Can podcast saying, "I honestly think it depends on the situation, the control and also what your security team is okay with." This contextual approach is key since there’s rarely a one-size-fits-all answer.
When deciding between user and device-based exclusions, several factors should influence your approach:
Some security controls naturally align better with one approach:
Your device ownership and management approach significantly impacts which exclusion type makes more sense:
Consider the practical aspects of maintaining your exclusions over time:
User-based exclusions are especially effective in several common scenarios:
When certain job functions require exceptions to security policies, user-based exclusions allow you to tie these exceptions directly to roles rather than devices. This works particularly well for:
User-based exclusions excel when access requirements change based on context:
For users who regularly switch between devices, user-based exclusions provide consistency:
Device-based exclusions offer advantages in other common scenarios:
When exceptions are tied to device capabilities or limitations:
When the device’s purpose or location dictates security needs:
When device ownership determines appropriate security levels:
To help visualize the trade-offs, consider this comparison:
| User-Based Exclusions | Device-Based Exclusions |
| Pros: | Pros: |
|
|
|
|
|
|
|
|
| Cons: | Cons: |
|
|
|
|
|
|
|
|
Many organizations find that a hybrid approach provides the benefits of both approaches. Consider these strategies:
Apply baseline exclusions at the device level, then add user-specific exceptions for special cases. This works well when you have a relatively standardized device fleet but diverse user needs.
Implement systems that consider both user identity and device characteristics when applying exclusions. This approach is more sophisticated but offers greater flexibility.
Use device-based exclusions for some controls and user-based for others, depending on which makes more sense for each specific security requirement.
When determining which approach to use, this simplified decision path may help:
The choice between user and device-based exclusions isn't about finding the "right" answer - it's about building a framework that balances security with productivity in your specific environment.
Focus on implementation, not ideology. The most successful security teams spend less time debating which approach is theoretically better and more time ensuring their chosen approach actually works in practice. This means:
The real win isn't picking the perfect approach - it's being intentional about your choices. Document why you chose user-based for some controls and device-based for others. This creates consistency in your decision-making and makes future exclusions easier to evaluate.
Most importantly, remember that security exclusions should enable work, not create new friction. Whether you go user-based, device-based, or hybrid, the measure of success is simple: are your people more productive while your organization stays secure?