Security Metrics and Measurement

  1. Core Security Metric Domains
    1. Vulnerability Management Metrics
      1. Vulnerability Discovery and Coverage
        1. Vulnerability Scanning Coverage
          1. Percentage of Assets Scanned
            1. Scan Frequency Compliance
              1. Coverage by Asset Type
              2. Vulnerability Detection Effectiveness
                1. Time to Detect Vulnerabilities
                  1. Detection Rate by Severity
                    1. False Positive Rates
                  2. Vulnerability Remediation Performance
                    1. Time to Remediate Vulnerabilities
                      1. By Severity Level
                        1. Critical Vulnerabilities
                          1. High Severity Vulnerabilities
                            1. Medium Severity Vulnerabilities
                              1. Low Severity Vulnerabilities
                              2. By Asset Criticality
                                1. Mission-Critical Assets
                                  1. High-Value Assets
                                    1. Standard Assets
                                  2. Mean Time to Patch (MTTP)
                                    1. By Vulnerability Type
                                      1. By System Category
                                    2. Vulnerability Inventory Management
                                      1. Number of Open Vulnerabilities
                                        1. By Severity Classification
                                          1. By Asset Type
                                            1. By Business Unit
                                            2. Vulnerability Aging Analysis
                                              1. Age Distribution
                                                1. Overdue Remediation Tracking
                                                2. Vulnerability Re-opening Rate
                                                  1. Root Cause Analysis
                                                    1. Prevention Measures
                                                3. Incident Response and Management Metrics
                                                  1. Incident Detection Performance
                                                    1. Mean Time to Detect (MTTD)
                                                      1. By Incident Type
                                                        1. By Detection Method
                                                        2. Detection Source Analysis
                                                          1. Automated Detection
                                                            1. Manual Detection
                                                              1. External Notification
                                                            2. Incident Response Timeliness
                                                              1. Mean Time to Acknowledge (MTTA)
                                                                1. By Severity Level
                                                                  1. By Response Team
                                                                  2. Mean Time to Contain (MTTC)
                                                                    1. Containment Effectiveness
                                                                      1. Escalation Procedures
                                                                      2. Mean Time to Resolve (MTTR)
                                                                        1. Resolution Quality Metrics
                                                                          1. Customer Satisfaction
                                                                        2. Incident Volume and Classification
                                                                          1. Number of Security Incidents
                                                                            1. By Incident Type
                                                                              1. Malware Infections
                                                                                1. Phishing Attacks
                                                                                  1. DDoS Attacks
                                                                                    1. Insider Threats
                                                                                      1. Data Breaches
                                                                                      2. By Severity Classification
                                                                                        1. Critical Incidents
                                                                                          1. High Priority Incidents
                                                                                            1. Medium Priority Incidents
                                                                                              1. Low Priority Incidents
                                                                                              2. By Source or Vector
                                                                                            2. Incident Management Efficiency
                                                                                              1. Incident Backlog Management
                                                                                                1. Number of Unresolved Incidents
                                                                                                  1. Average Age of Open Incidents
                                                                                                  2. Resource Utilization
                                                                                                    1. Response Team Workload
                                                                                                      1. Escalation Frequency
                                                                                                    2. Incident Cost Analysis
                                                                                                      1. Cost per Incident
                                                                                                        1. Direct Response Costs
                                                                                                          1. Indirect Business Impact
                                                                                                            1. Recovery Costs
                                                                                                            2. Total Cost of Incidents
                                                                                                              1. Monthly and Annual Totals
                                                                                                                1. Cost Trend Analysis
                                                                                                            3. Identity and Access Management (IAM) Metrics
                                                                                                              1. Access Governance Metrics
                                                                                                                1. Privileged Access Management
                                                                                                                  1. Percentage of Privileged Accounts
                                                                                                                    1. Privileged Access Review Frequency
                                                                                                                      1. Number of Privileged Access Violations
                                                                                                                        1. Privileged Session Monitoring
                                                                                                                        2. User Access Lifecycle Management
                                                                                                                          1. Account Provisioning Time
                                                                                                                            1. Access Recertification Completion Rate
                                                                                                                              1. Time to De-provision Access
                                                                                                                                1. Number of Orphaned Accounts
                                                                                                                                2. Role-Based Access Control (RBAC) Effectiveness
                                                                                                                                  1. Role Assignment Accuracy
                                                                                                                                    1. Role Review Frequency
                                                                                                                                      1. Segregation of Duties Violations
                                                                                                                                    2. Authentication Security Metrics
                                                                                                                                      1. Password Policy Compliance
                                                                                                                                        1. Percentage of Users Compliant
                                                                                                                                          1. Number of Policy Violations
                                                                                                                                            1. Password Reset Frequency
                                                                                                                                            2. Multi-Factor Authentication (MFA) Metrics
                                                                                                                                              1. MFA Adoption Rate
                                                                                                                                                1. Coverage by System or Application
                                                                                                                                                  1. MFA Bypass Incidents
                                                                                                                                                  2. Authentication Failure Analysis
                                                                                                                                                    1. Failed Login Attempts
                                                                                                                                                      1. Account Lockout Frequency
                                                                                                                                                        1. Suspicious Authentication Activity
                                                                                                                                                      2. Identity Risk Indicators
                                                                                                                                                        1. Dormant Account Management
                                                                                                                                                          1. Number of Inactive Accounts
                                                                                                                                                            1. Account Cleanup Frequency
                                                                                                                                                            2. Access Anomaly Detection
                                                                                                                                                              1. Unusual Access Patterns
                                                                                                                                                                1. Off-Hours Access Attempts
                                                                                                                                                                  1. Geographic Access Anomalies
                                                                                                                                                              2. Security Awareness and Training Metrics
                                                                                                                                                                1. Phishing Simulation Performance
                                                                                                                                                                  1. Phishing Click Rates
                                                                                                                                                                    1. Overall Click Rate
                                                                                                                                                                      1. Click Rate by Department
                                                                                                                                                                      2. Phishing Reporting Rates
                                                                                                                                                                        1. Suspicious Email Reports
                                                                                                                                                                          1. Reporting Response Time
                                                                                                                                                                          2. Credential Submission Rates
                                                                                                                                                                            1. Data Entry on Fake Sites
                                                                                                                                                                              1. Credential Harvesting Success
                                                                                                                                                                              2. Repeat Offender Analysis
                                                                                                                                                                                1. Multiple Failure Tracking
                                                                                                                                                                                  1. Targeted Training Effectiveness
                                                                                                                                                                                2. Training Program Effectiveness
                                                                                                                                                                                  1. Training Completion Rates
                                                                                                                                                                                    1. By Department or Business Unit
                                                                                                                                                                                      1. By Employee Role
                                                                                                                                                                                        1. By Training Module
                                                                                                                                                                                        2. Training Assessment Scores
                                                                                                                                                                                          1. Pre-training Assessments
                                                                                                                                                                                            1. Post-training Assessments
                                                                                                                                                                                              1. Knowledge Retention Testing
                                                                                                                                                                                              2. Training Currency
                                                                                                                                                                                                1. Percentage of Current Training
                                                                                                                                                                                                  1. Training Refresh Compliance
                                                                                                                                                                                                2. Policy and Compliance Awareness
                                                                                                                                                                                                  1. Security Policy Acknowledgment
                                                                                                                                                                                                    1. Acknowledgment Rate
                                                                                                                                                                                                      1. Acknowledgment Timeliness
                                                                                                                                                                                                        1. Policy Update Communication
                                                                                                                                                                                                        2. Compliance Training Metrics
                                                                                                                                                                                                          1. Regulatory Training Completion
                                                                                                                                                                                                            1. Certification Maintenance
                                                                                                                                                                                                        3. Endpoint Security Metrics
                                                                                                                                                                                                          1. Endpoint Protection Coverage
                                                                                                                                                                                                            1. Anti-Malware Deployment
                                                                                                                                                                                                              1. Percentage of Devices Protected
                                                                                                                                                                                                                1. Protection Software Currency
                                                                                                                                                                                                                  1. Update Compliance Rate
                                                                                                                                                                                                                  2. Endpoint Detection and Response (EDR)
                                                                                                                                                                                                                    1. Agent Deployment Rate
                                                                                                                                                                                                                      1. Agent Health Status
                                                                                                                                                                                                                        1. Detection Capability Coverage
                                                                                                                                                                                                                      2. Endpoint Configuration Management
                                                                                                                                                                                                                        1. Device Encryption Status
                                                                                                                                                                                                                          1. Percentage of Encrypted Devices
                                                                                                                                                                                                                            1. Encryption by Device Type
                                                                                                                                                                                                                              1. Encryption Policy Compliance
                                                                                                                                                                                                                              2. Configuration Compliance
                                                                                                                                                                                                                                1. Security Baseline Adherence
                                                                                                                                                                                                                                  1. Configuration Drift Detection
                                                                                                                                                                                                                                    1. Remediation Tracking
                                                                                                                                                                                                                                  2. Endpoint Threat Landscape
                                                                                                                                                                                                                                    1. Malware Detection and Response
                                                                                                                                                                                                                                      1. Malware Incidents by Type
                                                                                                                                                                                                                                        1. Detection and Cleanup Time
                                                                                                                                                                                                                                        2. Unauthorized Software Management
                                                                                                                                                                                                                                          1. Number of Unauthorized Applications
                                                                                                                                                                                                                                            1. Software Whitelist Compliance
                                                                                                                                                                                                                                              1. Remediation Rate
                                                                                                                                                                                                                                          2. Network Security Metrics
                                                                                                                                                                                                                                            1. Network Access Control
                                                                                                                                                                                                                                              1. Firewall Management
                                                                                                                                                                                                                                                1. Firewall Rule Review Frequency
                                                                                                                                                                                                                                                  1. Number of Rules Reviewed
                                                                                                                                                                                                                                                    1. Rule Optimization Metrics
                                                                                                                                                                                                                                                    2. Network Segmentation Effectiveness
                                                                                                                                                                                                                                                      1. Segment Isolation Testing
                                                                                                                                                                                                                                                        1. Cross-Segment Traffic Analysis
                                                                                                                                                                                                                                                          1. Micro-segmentation Coverage
                                                                                                                                                                                                                                                        2. Network Monitoring and Detection
                                                                                                                                                                                                                                                          1. Intrusion Detection and Prevention
                                                                                                                                                                                                                                                            1. IDS/IPS Alert Volume
                                                                                                                                                                                                                                                              1. True Positive Rate
                                                                                                                                                                                                                                                                1. False Positive Rate
                                                                                                                                                                                                                                                                  1. Alert Response Time
                                                                                                                                                                                                                                                                  2. Network Traffic Analysis
                                                                                                                                                                                                                                                                    1. Baseline Traffic Patterns
                                                                                                                                                                                                                                                                      1. Anomalous Traffic Detection
                                                                                                                                                                                                                                                                        1. Bandwidth Utilization Security
                                                                                                                                                                                                                                                                      2. Network Infrastructure Security
                                                                                                                                                                                                                                                                        1. Port and Service Management
                                                                                                                                                                                                                                                                          1. Number of Open Ports
                                                                                                                                                                                                                                                                            1. Unused Port Identification
                                                                                                                                                                                                                                                                              1. Service Hardening Status
                                                                                                                                                                                                                                                                              2. Network Device Security
                                                                                                                                                                                                                                                                                1. Device Configuration Compliance
                                                                                                                                                                                                                                                                                  1. Firmware Update Status
                                                                                                                                                                                                                                                                                    1. Access Control Implementation
                                                                                                                                                                                                                                                                                2. Application Security (AppSec) Metrics
                                                                                                                                                                                                                                                                                  1. Secure Development Lifecycle
                                                                                                                                                                                                                                                                                    1. Developer Security Training
                                                                                                                                                                                                                                                                                      1. Percentage of Developers Trained
                                                                                                                                                                                                                                                                                        1. Training Frequency and Currency
                                                                                                                                                                                                                                                                                          1. Secure Coding Competency
                                                                                                                                                                                                                                                                                          2. Security Testing Integration
                                                                                                                                                                                                                                                                                            1. Percentage of Applications Tested
                                                                                                                                                                                                                                                                                              1. Testing Frequency
                                                                                                                                                                                                                                                                                                1. Test Coverage Metrics
                                                                                                                                                                                                                                                                                              2. Application Vulnerability Management
                                                                                                                                                                                                                                                                                                1. Static Application Security Testing (SAST)
                                                                                                                                                                                                                                                                                                  1. Vulnerabilities Found per Scan
                                                                                                                                                                                                                                                                                                    1. Vulnerability Density Metrics
                                                                                                                                                                                                                                                                                                    2. Dynamic Application Security Testing (DAST)
                                                                                                                                                                                                                                                                                                      1. Runtime Vulnerability Detection
                                                                                                                                                                                                                                                                                                        1. Penetration Testing Results
                                                                                                                                                                                                                                                                                                          1. Web Application Firewall Effectiveness
                                                                                                                                                                                                                                                                                                          2. Vulnerability Remediation
                                                                                                                                                                                                                                                                                                            1. Time to Remediate Code Flaws
                                                                                                                                                                                                                                                                                                              1. Remediation Rate by Severity
                                                                                                                                                                                                                                                                                                                1. Re-introduction Rate
                                                                                                                                                                                                                                                                                                              2. Application Security Reviews
                                                                                                                                                                                                                                                                                                                1. Security Review Coverage
                                                                                                                                                                                                                                                                                                                  1. Percentage of Applications Reviewed
                                                                                                                                                                                                                                                                                                                    1. Review Frequency
                                                                                                                                                                                                                                                                                                                      1. Review Depth and Quality
                                                                                                                                                                                                                                                                                                                      2. Threat Modeling Metrics
                                                                                                                                                                                                                                                                                                                        1. Threat Model Coverage
                                                                                                                                                                                                                                                                                                                          1. Threat Identification Effectiveness
                                                                                                                                                                                                                                                                                                                            1. Mitigation Implementation Rate
                                                                                                                                                                                                                                                                                                                        2. Governance, Risk, and Compliance (GRC) Metrics
                                                                                                                                                                                                                                                                                                                          1. Control Effectiveness Measurement
                                                                                                                                                                                                                                                                                                                            1. Control Performance Scoring
                                                                                                                                                                                                                                                                                                                              1. Control Effectiveness Score
                                                                                                                                                                                                                                                                                                                                1. Scoring Methodology
                                                                                                                                                                                                                                                                                                                                2. Control Testing Coverage
                                                                                                                                                                                                                                                                                                                                  1. Percentage of Controls Tested
                                                                                                                                                                                                                                                                                                                                    1. Testing Frequency
                                                                                                                                                                                                                                                                                                                                      1. Test Result Analysis
                                                                                                                                                                                                                                                                                                                                    2. Policy and Exception Management
                                                                                                                                                                                                                                                                                                                                      1. Policy Compliance Metrics
                                                                                                                                                                                                                                                                                                                                        1. Policy Adherence Rates
                                                                                                                                                                                                                                                                                                                                          1. Policy Violation Tracking
                                                                                                                                                                                                                                                                                                                                            1. Policy Update Compliance
                                                                                                                                                                                                                                                                                                                                            2. Exception Management
                                                                                                                                                                                                                                                                                                                                              1. Number of Policy Exceptions
                                                                                                                                                                                                                                                                                                                                                1. Exception Approval Process
                                                                                                                                                                                                                                                                                                                                                  1. Exception Aging and Closure
                                                                                                                                                                                                                                                                                                                                                2. Audit and Assessment Management
                                                                                                                                                                                                                                                                                                                                                  1. Audit Finding Management
                                                                                                                                                                                                                                                                                                                                                    1. Number of Open Findings
                                                                                                                                                                                                                                                                                                                                                      1. Time to Close Findings
                                                                                                                                                                                                                                                                                                                                                        1. Finding Recurrence Rate
                                                                                                                                                                                                                                                                                                                                                        2. Assessment Program Metrics
                                                                                                                                                                                                                                                                                                                                                          1. Assessment Coverage
                                                                                                                                                                                                                                                                                                                                                            1. Assessment Frequency
                                                                                                                                                                                                                                                                                                                                                              1. Remediation Tracking