Research19 min read

Exception Renewal Cadence Economics: Designing the Cycle That Pays Back

A renewal cadence is a deliberate cost decision, not a calendar habit inherited from the audit cycle. Run it too aggressively and the per-cycle review time, compensating control re-validation, and governance reconciliation drain approver bandwidth before any decay has occurred. Run it too slowly and the silent-decay tail accumulates inside the active register, audit reconstruction cost surges at fieldwork time, and the residual risk picture the leadership team reads against quietly diverges from the one the programme is actually carrying. The cadence sits between those two failure modes, and the right place to sit it depends on the population, the severity mix, the approver bandwidth, and the event-driven decay rate, not on the audit calendar.1,2,4,5,6

This research lays out how enterprise vulnerability programmes should price the renewal cycle on their exception register. It names the four cost components that scale with cadence (approver review time, compensating control re-validation time, governance reconciliation time, live-record join cost), the three avoided costs that scale against cadence (audit reconstruction, decay-driven SLA breach, residual risk drift), the event-driven renewal path that does not move with cadence at all, the severity-banded cadence defaults, the approver bandwidth constraint that bounds the design, the framework citations that pin the floor (PCI DSS 12.3.4, ISO 27001 A.5.4 and A.5.36, SOC 2 CC3.2 and CC9.1, NIST SP 800-53 PM-9 and RA-7, NIST CSF 2.0 GV.RM, CIS Controls v8.1 7.3, HIPAA 164.308(a)(1)(ii)(B), DORA Article 6), and the live-record discipline that keeps each cycle producing evidence rather than spreadsheet output.3,5,8,10,11,12

Why cadence is a cost decision rather than a calendar decision

Cadence on an exception register reads to most leadership reports as a single number: the renewal interval, usually expressed in months. The same number can describe a programme that runs a disciplined renewal sweep against a register of 200 acceptances and a programme that runs a rubber-stamp pass against a register of 2,500. The number does not separate the two because cadence by itself is not a cost statement. It is the calendar half of a cost statement whose other half (how many records, how much review time, how much approver bandwidth, how much live-record join work) usually does not appear next to it.

Reading the cadence as a cost decision exposes the trade-off that the bare calendar number conceals. Each cycle costs a measurable amount of attributable time across approvers, control owners, and the governance lead. The avoided cost is the audit reconstruction, the decay-driven SLA breach, and the residual risk drift that the cycle prevented from accumulating. The optimal cadence sits where the marginal per-cycle cost crosses the marginal avoided cost. That point depends on the register population, the severity mix, the approver bandwidth, and the rate of event-driven decay, not on the audit cycle calendar.5,8,11

The discipline that scales is to treat cadence as a derived number rather than as a primary one. The primary numbers are the population by severity band, the per-cycle cost components, the avoided cost estimate against decay, and the approver bandwidth. The cadence falls out of those four. Programmes that decide cadence first and then run the population through that cadence end up either over-spending against a calendar habit or under-spending against an audit-cycle inheritance. Programmes that decide the cost inputs first and let the cadence fall out end up with a cadence that survives leadership review because the trade-off is explicit. The risk acceptance decay rate research covers how active acceptances silently lose validity between audits and the failure modes the cadence design needs to cover.24

Four cost components that scale with cadence

The per-cycle cost base has four components. Each scales roughly linearly with the number of cycles per year, which means moving cadence from quarterly to monthly multiplies each component by approximately three and moving from annual to quarterly multiplies each by four. The shape is flat per cycle and linear in cycles per year. Each component has its own cost owner, its own constraint, and its own intervention path.5,8

ComponentWhat scalesCost owner
1. Approver review timeNamed approver confirms the rationale still holds, the asset binding still applies, and the residual risk position is still acceptable. 5 to 15 minutes per critical or high acceptance, less on medium and below.Named approvers; usually security leadership, GRC owners, or business unit risk owners.
2. Compensating control re-validationSecurity or platform engineer re-checks the named control is in place, configured correctly, and effective against the original exploit class. 10 to 30 minutes per control.Security engineering, platform engineering, or the control owner named on the rationale.
3. Governance reconciliationProgramme manager joins the acceptance catalogue to the live workspace user record, the referenced finding, the referenced compensating control, and the asset register; produces the renewal worklist.Vulnerability programme manager or governance lead.
4. Live-record join costThe platform or query layer cost to resolve each acceptance against current state at cycle time. Low on a single record-of-truth; high on parallel spreadsheet registers that need manual reconciliation.Platform team or the implicit cost the governance lead absorbs when the live record is a spreadsheet.

The four components share a common signature: each absorbs attributable time, each is bounded by the organisational headcount available, and each scales by cadence multiplier independent of the others. Reading the four numbers separately on the leadership report lets the programme see which component is driving cadence cost rather than rolling everything into a single labour line. Programmes whose governance reconciliation cost dominates usually have a parallel-spreadsheet problem; programmes whose approver review cost dominates usually have an approver bandwidth constraint; programmes whose control re-validation cost dominates usually have a compensating control catalogue that has grown faster than the engineering team can sustain.

Three avoided costs that scale against cadence

Cadence economics is a trade-off because three costs fall as the cadence rises. Each is real, each is largely invisible inside a single cycle, and each shows up at audit fieldwork time or in the residual risk picture rather than as a line item the operations view can read. Pricing these three avoided costs lets the cadence design read as an investment rather than as a labour overhead.1,3,5,11

Avoided costWhat scalesFailure if uncovered
1. Audit reconstructionNumber of decayed exceptions inside the audit window times auditor effort to verify each. Long cadence concentrates the cost at fieldwork time.Audit-week scramble; field-presence query passes and active-validity verification fails; control gap finding written into the report.
2. Decay-driven SLA breachVolume of acceptances that silently invalidate mid-cycle and route the underlying finding back to the active remediation queue under SLA pressure.Unplanned remediation absorbs engineering bandwidth; SLA breach rate rises without operational visibility; durability metrics deteriorate.
3. Residual risk driftVolume and materiality of acceptances the programme is no longer actively choosing to carry. Long cadence stretches the drift window.Leadership reads a residual risk picture that no longer matches the active programme position; governance escalation lands on the wrong owner.

The three avoided costs share the same invisibility pattern: each is real on annualised basis and each looks like zero inside any single cycle. The discipline that surfaces them is to estimate the avoided cost explicitly at cycle design time rather than treating cadence as labour overhead. An organisation with 1,500 active acceptances on annual cadence carries a measurable annualised audit reconstruction cost even if the most recent audit closed cleanly; the closure depended on a one-week reconstruction sprint that absorbed the security team. Moving to quarterly cadence on the bulk register spreads that reconstruction across the year and absorbs it through smaller, more regular cycles. The labour cost moves from concentrated and invisible to distributed and tracked; the audit fieldwork experience moves from scramble to walkthrough.

Event-driven renewal as a separate budget line

The event-driven renewal path runs against triggering conditions rather than against the calendar. CISA KEV listings on an accepted CVE, EPSS threshold crossings on an accepted vulnerability, approver departure from the workspace, compensating control removal or configuration change, asset transfer or decommission, and expiry approaching the configured warning window all generate renewal demand that cannot be amortised by stretching the calendar interval.14,15,16

Programmes that fund only the calendar path are surprised by event-driven decay; programmes that fund only the event-driven path miss the time-driven decay tail that accumulates between events. The defensible design carries both paths and prices them separately. The calendar path covers the time-driven decay (approver continuity, compensating control drift, gradual severity revision). The event-driven path covers the disruption-driven decay (sudden severity revision via KEV listing, approver departure, compensating control removal).

Event-driven renewal cost scales with the rate of triggering events rather than with calendar interval. Programmes on coastal regulatory exposure (PCI DSS, HIPAA, DORA) generally see higher event-driven trigger rates because the regulatory feed adds material event volume. Programmes on heavy cloud or SaaS footprints generally see higher event-driven trigger rates because asset and credential change rates are higher. The cost-modelling implication is that the event-driven budget should be set as a fraction of total renewal cost (often 20 to 40 percent at maturity) rather than as a residual after the calendar budget is set. Underfunding the event-driven path is one of the more common failure modes in cadence design and one of the less visible at the moment the cadence is being decided.

Severity-banded cadence defaults

Running one cadence across the whole register is rarely the right answer. The per-cycle cost is highest on criticals (the highest review and re-validation load per record), the decay rate is highest on criticals (KEV and EPSS revisions disproportionately affect this band), and the avoided cost is also highest on criticals (audit reconstruction on a critical decay is materially more disruptive than on a low). The cadence design therefore reads better when bands are decoupled.4,5,8,10

Severity bandDefault cadenceWhy
CriticalMonthlyHighest decay sensitivity; bounded population; highest avoided cost on every dimension; KEV and EPSS revisions concentrate here.
HighQuarterlyBulk-population middle band; aligns with operational quarter-end and most audit walkthrough cycles; per-cycle cost manageable at quarterly intervals.
MediumSemi-annualLower decay sensitivity; longer interval acceptable; per-record review time low so the absolute cycle cost is bounded.
Low and informationalAnnual (with event-driven supplement)Floor cadence for PCI DSS 12.3.4 alignment; long-tail decay is dominated by event-driven path not by time-driven sweep.

All bands carry the event-driven path on top of the calendar cadence. KEV listings, approver departures, compensating control changes, and asset transfers route to renewal regardless of where the band sits on the calendar. The defensible exception to this default is regulatory or contractual obligation that pins the cadence on a specific band; PCI DSS 12.3.4 explicitly requires annual review on compensating controls inside cardholder data environment scope, and the operational design has to honour that floor regardless of the cost trade-off.4

Approver bandwidth as the binding constraint

Approvers are a bounded resource and approver bandwidth is the constraint that decides what cadence the programme can actually run. A workspace with three named approvers for the security exception register cannot absorb monthly renewal across 2,500 acceptances regardless of the platform discipline, because the approver-time budget does not exist at that volume.2,8

  • Rubber-stamp renewal: the approver signs off without reading the rationale. The audit citation passes field presence and fails active validity.
  • Delegation without record: the approver verbally delegates to a deputy whose decision is not captured on the record. The audit citation cannot trace the actor.
  • Sweep skip: the cycle runs against a subset; the rest is documented as not-yet-reviewed. The next cycle inherits the carry-forward.

Each failure mode is the predictable consequence of designing cadence faster than approver bandwidth supports. The honest design treats approver bandwidth as the binding constraint and prices the cadence against it: extend the approver pool, narrow the population that needs approver-level review (delegate low and informational acceptances to control owners rather than to risk owners), or stretch the cadence to fit the bandwidth. Reading the cadence design against named approver headcount surfaces the bandwidth constraint before it produces the failure mode rather than after.

The bandwidth check is a single calculation. Active acceptances by band times per-acceptance review time by band gives total review minutes per cycle. Divided by named approver bandwidth at the cadence interval (less time-off, less competing demands), the number reads as the load factor on the approver pool. Above 80 percent the rubber-stamp and skip failure modes start showing up; above 100 percent the cadence is structurally unachievable.

Why pairing cadence to the audit cycle is a worse trade-off

The audit-cycle-aligned cadence design is common and predictable. The audit-week reconciliation reads the register once a year, the renewal sweep runs once a year immediately before the audit, the register reads clean at the audit walkthrough, and the active-validity rate silently degrades for the following twelve months. The pattern produces a clean audit and a continuously decaying register, which is exactly the inverse of what the residual risk picture is supposed to read.1,3

The defensible design decouples the operational renewal cadence from the audit cycle. The operational cadence runs on the cost trade-off described above (monthly criticals, quarterly highs, semi-annual or annual long tail with event-driven supplements). The audit cycle reads against whatever the live record looks like at audit walkthrough time. Programmes that run the operational cadence continuously through the year carry a register that reads clean at every audit walkthrough rather than only at the scheduled one. Audit fieldwork on these registers usually shortens because the auditor can sample randomly across the year rather than only at the cadence anchor.

The same logic extends to multi-framework programmes. A programme audited against SOC 2 in Q2 and ISO 27001 in Q4 cannot run a single cadence aligned to one audit without degrading the residual risk picture against the other. The continuous operational cadence is the only design that survives multi-framework assessment without forcing the programme to choose which framework audit week to optimise for. The audit evidence half-life research covers the related dimension of evidence currency between audits.26

A worked cost example

Consider a programme with 50 critical, 200 high, 600 medium, and 1,500 low acceptances. Approver review time averages 10 minutes on criticals, 7 minutes on highs, 4 minutes on mediums, and 2 minutes on lows. Compensating control re-validation runs on 70 percent of acceptances at 15 minutes on criticals and highs, 8 minutes on mediums, and 3 minutes on lows. Governance reconciliation absorbs 4 minutes per record regardless of band. Live-record join cost is negligible on a record-of-truth platform.

Per-cycle cost under the severity-banded default (monthly criticals, quarterly highs, semi-annual mediums, annual lows) lands at roughly 28 hours per month on criticals, 64 hours per quarter on highs, 96 hours per half on mediums, and 100 hours per year on lows. Total annualised cost is approximately 900 hours, distributed continuously through the year, against a population of 2,350 active acceptances. Per-acceptance per-year cost lands near 23 minutes, which sits within reason for an active register.

Running monthly cadence across the whole register multiplies the cost on highs by three, mediums by six, and lows by twelve, pushing total annualised cost above 3,500 hours and consuming bandwidth that would otherwise sit on remediation and engagement work. The bandwidth absorption rarely shows up as a calendar-readable cost because it lands on the same approvers who run the remediation queue; the symptom is slower closure on open findings rather than a labour line on the renewal register.

Running annual cadence across the whole register cuts total annualised cost to roughly 360 hours but stretches the decay window to twelve months on every band. The audit reconstruction cost lands as a concentrated three to five day reconstruction sprint before the audit; the decay-driven SLA breach cost absorbs unplanned remediation bandwidth mid-cycle; the residual risk drift cost shows up at quarterly leadership review as a stale acceptance picture. The annualised labour saving against the severity-banded default is roughly 540 hours; the avoided audit reconstruction, decay-driven SLA breach, and residual risk drift cost on a realistic estimate is materially larger. The numbers vary by programme but the shape generalises: aggressive cadence overshoots cost without proportional decay gain; relaxed cadence buys back labour while losing audit defensibility and durability.17,18,19,20,21,22,23

Reading cadence against the live engagement record

A renewal sweep that produces spreadsheet output documents the decision but does not link it back to the live record. The audit citation reads the spreadsheet, verifies field presence (approver name, rationale text, expiry date, control reference), and cannot independently confirm that the approver is still in scope, that the control is still in place, or that the asset binding still resolves. The spreadsheet register decays from the moment the cycle closes.7,8,11

A renewal sweep that produces evidence on the live engagement record captures the timestamped state change by named actor against the original acceptance, attaches the supporting evidence (renewed rationale, updated control reference, refreshed asset binding) to the same record the acceptance lives on, and routes the activity log entry so the audit citation reads as a recorded action against the live record rather than as documentation against an exported snapshot. The cycle produces evidence rather than spreadsheet output.

The structural difference is whether the renewal artefact lives in the same system as the original acceptance or in a parallel system that has to be reconciled at audit time. Parallel-system designs push the live-record join cost into the audit-week sprint; same-system designs absorb the cost continuously through the year and produce a register that reads clean at every walkthrough rather than at the scheduled one. The cadence cost analysis above assumes the same-system design; parallel-system designs carry meaningful additional live-record join cost that pushes the optimal cadence further toward stretched intervals, which compounds the decay problem rather than mitigating it.

Five numbers for the leadership report

Leadership reads cadence economics through the durability and defensibility lens. The five-line report that survives reporting cycles places the trade-off explicitly on one dashboard.2,5,8

  • Active acceptance count by severity band: the population the residual risk picture is read against.
  • Cadence by band: the calendar frequency the programme is operating on (monthly criticals, quarterly highs, semi-annual mediums, annual long tail).
  • Renewal latency median: the event-driven response time between detected trigger and recorded renewal, revocation, or re-validation.
  • Per-cycle cost in attributable time: the cost the cadence is generating across approver review, control re-validation, governance reconciliation, and live-record join.
  • Avoided-cost estimate against decay: the cost the cadence is buying back in audit, SLA, and residual risk drift terms.

The cadence decision reads as a deliberate trade-off across the five numbers rather than as a calendar inheritance. Programmes that report only the cadence (annual review on schedule) or only the cycle completion percentage are operating under an implicit cost assumption the leadership view cannot validate or push back against. The five-line report makes the trade-off legible at quarterly review.

Cadence design across programme sizes

Programme size shifts both the cost components and the constraint shape. The cadence that fits a small programme rarely fits a large one and vice versa.5,8

Programme sizeCadence patternBinding constraint
Small (under 500 acceptances)Monthly criticals; quarterly long tail; light event-driven path.Approver bandwidth often the binding constraint at this size because approvers are also operational owners.
Medium (500 to 2,000 acceptances)Monthly criticals; quarterly highs; semi-annual mediums; annual lows; robust event-driven path.Governance reconciliation often the binding constraint because the bulk-population middle band drives the most labour.
Large (2,000 to 10,000 acceptances)Monthly criticals; quarterly highs; annual long tail; heavy event-driven path; delegated approver pools.Approver coordination overhead grows non-linearly past 5,000 acceptances; delegation policy becomes the binding design choice.
Very large (over 10,000 acceptances)Severity-anchored templates reduce per-record review time; event-driven path does most of the disruption work; calendar cadence is supplementary.Per-record review time becomes the binding constraint; the cadence design lives or dies on template reuse.

The design choice should be revisited at each material register growth threshold. A programme that crosses from 1,500 to 3,000 active acceptances over a calendar year usually needs to revise the cadence design rather than continuing the previous interval; the per-acceptance cycle cost has not changed but the absolute cycle cost and the approver coordination overhead have grown materially. Programmes that grow into a new size band without revisiting the cadence design end up at the most common failure mode: the cadence stayed the same, the labour cost did not, and the gap absorbs from the remediation queue.

How SecPortal supports the cadence design

SecPortal keeps the exception artefact, the approver decision, the compensating control reference, and the renewal event on the same engagement record. The cadence design implementation lives across several verified platform capabilities.18,19,20,21,22,23

  • Findings management holds the acceptance fields on the finding (status, rationale, approver, expiry, compensating control reference) so the operational view and the audit view read against the same record.
  • Team management with RBAC supplies the active workspace user catalogue (owner, admin, member, viewer, billing roles) that the approver field references, so departed approvers surface as inactive references rather than as silent stale data.
  • Activity log with CSV export captures the timestamped chain of acceptance, renewal, revocation, and compensating-control-update events by user so each cycle produces evidence rather than spreadsheet output, with 30-, 90-, or 365-day retention depending on plan.
  • Notifications and alerts route renewal work to the current approver, programme manager, or governance lead so the cycle is visible at the moment the cadence triggers.
  • Engagement management groups findings, acceptances, and assets to a versioned engagement record so per-engagement governance stays consistent across cycles.
  • Compliance tracking maps findings and acceptances to ISO 27001, SOC 2, Cyber Essentials, PCI DSS, NIST, and additional framework catalogues with CSV export so the per-framework governance citation reads against the same record.

The platform does not pick the cadence for the programme, does not auto-renew acceptances, does not push to ticketing systems through packaged connectors, does not enforce approver bandwidth limits, and does not provide an automated approver workflow engine. It does keep the cycle artefact, the approver decision, the compensating control reference, and the framework mapping on one record so the cadence question is reproducible at any moment between reporting cycles. The cadence design choice and the approver pool sizing remain governance decisions for the programme.

The operational pages that complement the cadence design are the vulnerability acceptance and exception management workflow and the security exception register template; the latter holds the artefact structure the live record reads against. For broader programme context, the vulnerability remediation SLA policy guide and the risk-based vulnerability management buyer guide cover the upstream SLA decisions and the buyer evaluation context the exception register sits inside.

For GRC, internal security, AppSec, and vulnerability management teams

The cadence design has different operating implications across the audience layers that read against the same register.

  • Record the per-band cadence on the policy document and on the live record so the audit citation reads the cadence design as a documented governance choice rather than as inferred behaviour.
  • Capture per-cycle cost in attributable time across approver review, control re-validation, governance reconciliation, and live-record join so the cadence trade-off is legible at quarterly review.
  • Track renewal latency on the event-driven path separately from cadence on the time-driven path so the leadership read separates the two response surfaces.
  • Read approver bandwidth as the binding constraint and report load factor by approver so over-cadence design surfaces before the rubber-stamp failure mode arrives.
  • Pair the renewal cycle to the same engagement record the original acceptance lives on so each cycle produces evidence rather than spreadsheet output.
  • Decouple operational cadence from the audit cycle so the register reads clean at every audit walkthrough rather than only at the scheduled one.

For GRC and compliance teams, internal security teams, AppSec teams, vulnerability management teams, and security engineering teams, the operating commitment is to keep the cycle artefact and the original acceptance record on the same live record so the cadence question is reproducible without a metrics-collection sprint. The aged compensating control half-life research covers the compensating control side of the renewal cycle in more depth.25

For security leadership and audit committees

Security leaders and audit committees read cadence economics through the residual risk lens. The leadership question is whether the residual risk position the programme is choosing to carry is the position the programme is actually carrying. Cadence is the operational discipline that holds the two views together.

  • Read cadence by severity band, renewal latency, per-cycle cost, and avoided-cost estimate together as one trade-off rather than as separate operational metrics.
  • Investigate cadence stretches that coincide with rising decay rate; the gap is usually approver bandwidth or governance reconciliation cost being absorbed silently.
  • Pair the cadence report with the exception register growth, the decay rate, and the renewal latency so the durability picture stays visible.
  • Tie cadence design to the same engagement record the audit evidence comes from so the leadership read and the audit read are the same record rather than two reports.

The leadership-side platform discipline that supports this is covered on SecPortal for CISOs and security leaders, which describes how findings, retests, exceptions, and reporting hold the defensible read of programme health between reporting cycles rather than only at quarterly review week. The multi-framework control crosswalk economics research covers the adjacent compliance-cost dimension that compounds with cadence cost when the exception register reads against multiple framework citations.

Conclusion

Exception renewal cadence is a deliberate cost decision rather than a calendar inheritance from the audit cycle. The per-cycle cost has four components (approver review, compensating control re-validation, governance reconciliation, live-record join). The avoided cost has three components (audit reconstruction, decay-driven SLA breach, residual risk drift). The event-driven path runs against triggering conditions independent of cadence and needs explicit budget on top of the calendar path. The optimal cadence sits where marginal per-cycle cost crosses marginal avoided cost; that point depends on population, severity mix, approver bandwidth, and event-driven decay rate, not on the audit calendar. Severity-banded cadence (monthly criticals, quarterly highs, semi-annual mediums, annual long tail with event-driven supplements) is the defensible default for most enterprise programmes; the design choice should be revisited at each material register growth threshold.

Treating cadence as a property of the live engagement record rather than as a periodic spreadsheet sweep is the highest-leverage discipline for defensible governance evidence. The platform you use does not have to pick the cadence for the programme. It does have to keep the cycle artefact, the approver decision, the compensating control reference, the framework mapping, and the activity log on one engagement record so the cadence question is reproducible at any moment between reporting cycles.

Frequently Asked Questions

Sources

  1. AICPA, SOC 2 Trust Services Criteria (TSC) 2017 with 2022 Revisions
  2. ISO/IEC, ISO 27001:2022 Information Security Management Systems
  3. ISO/IEC, ISO 27002:2022 Information Security Controls
  4. PCI Security Standards Council, PCI DSS v4.0 with 12.3 Risk Acceptance and 12.3.4 Compensating Controls
  5. NIST, SP 800-53 Revision 5: Security and Privacy Controls with PM-9, CA-5, RA-7
  6. NIST, Cybersecurity Framework (CSF) 2.0 with GV.RM Risk Management Strategy
  7. NIST, SP 800-137 Information Security Continuous Monitoring (ISCM)
  8. NIST, SP 800-39 Managing Information Security Risk
  9. NIST, SP 800-40 Rev. 4 Guide to Enterprise Patch Management Planning
  10. CIS, Critical Security Controls v8.1 (Safeguards 7.1 through 7.7)
  11. European Union, Digital Operational Resilience Act (DORA) Articles 5 and 6 ICT Risk Management
  12. HHS, HIPAA Security Rule Risk Management 164.308(a)(1)(ii)(B)
  13. FIRST, Common Vulnerability Scoring System (CVSS) Specification
  14. FIRST, Exploit Prediction Scoring System (EPSS)
  15. CISA, Binding Operational Directive 22-01 Known Exploited Vulnerabilities (KEV)
  16. CMU SEI, Stakeholder-Specific Vulnerability Categorization (SSVC)
  17. OWASP, Risk Rating Methodology
  18. SecPortal, Findings Management
  19. SecPortal, Team Management and RBAC
  20. SecPortal, Activity Log
  21. SecPortal, Engagement Management
  22. SecPortal, Compliance Tracking
  23. SecPortal, Notifications and Alerts
  24. SecPortal Research, Risk Acceptance Decay Rate
  25. SecPortal Research, Aged Compensating Control Half-Life
  26. SecPortal Research, Audit Evidence Half-Life

Run the renewal cycle on the live engagement record

SecPortal keeps the exception artefact, the approver decision, the compensating control reference, and the renewal event on one versioned engagement record so the cadence question is reproducible at any moment between reporting cycles and each cycle produces evidence rather than spreadsheet output.