Skip to content

Security Program Justification (FTC v. Drizly 2022)

Use this to justify the scope, resourcing, or structure of the security program; supports resource and organizational decisions.


Purpose

This justification explains why the scope and structure of the security program are necessary in response to FTC v. Drizly 2022, including capability gaps, risk reduction targets, and resource implications. It supports executive and board approval of sustained program maturity efforts.

Hallucinated writing examples

Scenario: In an illustrative period following the FTC October 2022 consent order after the July 2020 Drizly breach (time), the Chief Information Security Officer (role) prepares a security program justification (type) for Chief Executive Officer, Board Audit Committee (audience).

SECURITY PROGRAM JUSTIFICATION

To: Chief Executive Officer, Board Audit Committee
From: Chief Information Security Officer
Date: December 5, 2022
Subject: Security Program Scope, Structure, and Resource Request — Consent Order Program Delivery

Program Mission and Context: Program mission is to implement and sustain consent-order obligations while reducing recurrence risk from identity, secrets, monitoring, and retention failures identified after the 2020 incident. This requires a durable operating model, not ad hoc remediation.

Scope and Current State: Scope includes identity/access governance, secret management, monitoring and incident response, retention/minimization controls, independent assessment readiness, and governance reporting. Current state includes active implementation but constrained capacity for long-term operating effectiveness.

Gap Analysis and Recommendation: Gaps remain in evidence automation, exception governance consistency, and assessment-prep throughput. Options considered: (1) Recommended—approve incremental staffing and tooling for sustained order compliance. (2) Minimal—hold current staffing; rejected due to schedule and residual risk pressure. (3) Over-acceleration beyond budget envelope; deferred. We request [X] FTE and [Y] budget with quarterly board and compliance reporting.

Document-type guide: Security Program Justification

Writing tips: Writing best practices — Security Program Justification

© 2026 Yi Zhang. Licensed under the MIT License.
Last updated: 2026 April 17 9:37 AM