New product alert: Learn about RegComply!

Customers
Login
Auditboard's logo

December 8, 2023 5 min read

Metrics for Reporting on Continuous Monitoring

No matter how far along you are in establishing continuous monitoring, you should be reporting on the performance of the InfoSec compliance program and events that impact the organization’s position on security, compliance, or risk. While metrics are typically the preferred method for capturing relative information in reports to stakeholders — not all metrics are created equal. 

AuditBoard’s new ebook, The InfoSec Survival Guide: Achieving Continuous Compliance, explores how metrics fit into a strong continuous monitoring program. Download the full guide here, and continue reading to learn about how to formulate metrics that will best serve your compliance program. 

Strong metrics should measure the performance of established measures (e.g., controls, baselines, SLAs) across tactical areas impacting the business, allowing you to escalate red flags or concerning trends to executive management. These consist of Key Risk Indicators (KRIs), Key Performance Indicators (KPIs), and analysis. The design of your continuous monitoring program should support your level and frequency of reporting metrics. 

The following is a general overview of the metrics used in continuous monitoring reporting: 

  1. KRIs. COBIT 5 for Risk defines KRIs as metrics that show the enterprise is or has a high probability of being, subject to a risk that exceeds the defined risk appetite. Because KRIs are pre-event metrics, they provide InfoSec the opportunity to engage with process owners and stakeholders before something becomes an issue. KRIs to consider tracking include:
    Number of critical systems or applicationsNumber of users with access to all records (in a critical system)Number of competitor data breaches in the past yearNumber of malicious firewall events month to monthPercent of third parties without a current security reviewPercent of incomplete security awareness training (or past due)Percent of systems without endpoint protection coveragePercent of systems with past due security patches
  2. Number of critical systems or applications
  3. Number of users with access to all records (in a critical system)
  4. Number of competitor data breaches in the past year
  5. Number of malicious firewall events month to month
  6. Percent of third parties without a current security review
  7. Percent of incomplete security awareness training (or past due)
  8. Percent of systems without endpoint protection coverage
  9. Percent of systems with past due security patches
  10. KPIs. Key performance indicators are metrics that provide executive management and sometimes the board with a snapshot of how your security program is functioning over time. Use KPIs to illustrate a story about your environment when updating management. KPIs to consider tracking include:
    Compliance status by frameworkControl effectiveness by processNumber of phishing emails reported, last campaignNumber of phishing failures per quarterPercent of vulnerabilities remediated in/out of SLAPercent of completed policy acknowledgments 
  11. Compliance status by framework
  12. Control effectiveness by process
  13. Number of phishing emails reported, last campaign
  14. Number of phishing failures per quarter
  15. Percent of vulnerabilities remediated in/out of SLA
  16. Percent of completed policy acknowledgments 
  17. Issues Management Effectiveness. KPIs specific to the performance of your issues management program are often what management is interested in most. Issue KPIs to consider tracking include:
    Number of new high-risk InfoSec findingsIssues identified by root causeIssues that are repeatedly identified Issues by department, owner, or systemThe trend of past due action plansExpiring risk acceptances
  18. Number of new high-risk InfoSec findings
  19. Issues identified by root cause
  20. Issues that are repeatedly identified 
  21. Issues by department, owner, or system
  22. The trend of past due action plans
  23. Expiring risk acceptances

To learn more about creating a strong foundation for reporting on continuous monitoring, download the full ebook, The InfoSec Survival Guide: Achieving Continuous Compliance.

You may also like to read

Featured image
InfoSec

AI Governance: Automated Control Testing for ITRC

LEARN MORE
Featured image
InfoSec

Commanding Compliance: Demystify the Common Control Set

LEARN MORE
Featured image
InfoSec

Practical Steps for Applying NIST CSF 2.0 to Third-Party Risk Management

LEARN MORE

Discover why industry leaders choose AuditBoard

SCHEDULE A DEMO
upward trending chart
confident business professional