ETIS Library of Security KPIs - FINAL
ETIS Library of Security KPIs - FINAL
ETIS Library of Security KPIs - FINAL
Disclaimer
This document contains material which is the copyright of certain ETIS members and may
not be reproduced or copied without permission.
The commercial use of any information contained in this document may require a license
from the proprietor of that information.
Contents
CONTENTS ............................................................................................................ 3
ABBREVIATIONS .................................................................................................. 4
1 INTRODUCTION .............................................................................................. 5
1.1 BACKGROUND ................................................................................................. 5
1.2 PURPOSE AND LIMITATIONS ................................................................................. 6
1.3 ACKNOWLEDGEMENTS ........................................................................................ 6
2 CONTEXT AND GUIDANCE ............................................................................... 7
2.1 CONCEPT AND DEFINITIONS ................................................................................. 7
2.2 ESTABLISHING EFFECTIVE INFORMATION SECURITY KPIS ............................................... 9
2.3 MATURITY LEVELS............................................................................................11
3 SPECIFICATION OF KPIS .............................................................................. 14
3.1 BUSINESS VALUE.............................................................................................15
3.2 RISK MANAGEMENT ..........................................................................................16
3.3 VULNERABILITY MANAGEMENT ..............................................................................19
3.4 IDENTITY & ACCESS MANAGEMENT .......................................................................22
3.5 SPAM AND MALWARE PROTECTION .........................................................................24
3.6 AUDITING AND COMPLIANCE................................................................................28
3.7 SECURITY INCIDENTS .......................................................................................30
3.8 BUSINESS CONTINUITY MANAGEMENT ....................................................................33
3.9 SECURITY RESOURCING .....................................................................................34
REFERENCES ....................................................................................................... 38
Abbreviations
AT A1 Telekom Austria
BCM Business Continuity Management
CAPEX CAPital Expenditure
CEO Chief Executive Officer
CIO Chief Information Officer
CISO Chief Information Security Officer
CSO Chief Security Officer
CTO Chief Technical Officer
DT Deutsche Telekom
fte full time equivalent
IAM Identity and Access Management
IT Information Technology
KPI Key Performance Indicator
KSI Key Security Indicator
OPEX Operational EXpenditure
RTP Risk Treatment Plan
SIEM Security Incident and Event Management
SLA Service Level Agreement
SOx Sarbanes Oxley
TC Telefónica
VC Vimpelcom
1 Introduction
“I like it”
– Ronald Reagan, clarifying his statement to Gorbachev
1.1 Background
Key Performance Indicators (KPIs) are quantifiable variables that reflect the (critical)
success factors of an organisation. KPIs help an organisation define and measure progress
towards organisational objectives and support decision making processes. The concept of
KPIs has existed since the early 1960s and since been embraced in various industries and
working areas. In retail businesses, for example, a KPI might be the percentage of income
that stems from recurring customers. Similarly, a university might see the student
graduation rate as a key indicator of its performance, whilst customer service departments
might look at the percentage of calls answered within the first minute of waiting time.
Assessing performance by means of KPIs has also become common practice for (internal
and commercial) suppliers of IT services. IT related KPIs usually focus on continuity
aspects, e.g. the availability of IT systems and services, the mean time between failures
and the mean time to repair. Such KPIs are often found in Service Level Agreements
(SLAs) between IT suppliers and their customers.
Information security is a business function that has traditionally had difficulty to quantify
its objectives and performance in terms of KPIs. Faced with ever growing pressure on
budgets and manpower, CSOs and CISOs in the telecoms industry have increasingly been
seeking ways to quantify – preferably even monetise - their often intangible objectives and
achievements. Here, the underlying intent was usually to prove their business value
towards executive management and justify the need to maintain (or expand) their
budgets. Unfortunately, establishing effective information security KPIs has turned out to
be a tedious endeavour. The complexity of the matter was clearly revealed in the telco
security benchmark held among ETIS members in the past years. Most telcos that took
part in this benchmark indicated a strong desire to embrace the concept of information
security KPIs. To date, however, many have not been able to actually define and
implement such KPIs and those that have often indicate that the information security KPIs
they were able to devise are too technical for their (business) audiences.
The value of establishing information security KPIs is strongly recognised within the ETIS
Information Security Working Group. Participants in this group therefore took it upon
themselves to establish a library of information security KPIs to serve as a reference
document for the entire ETIS community. This document presents said library.
1. Provide context and guidance. This document intends to supply ETIS members with
a clear insight into the concept of information security KPIs, including applicable
definitions, and tangible guidance for establishing specific KPI programmes that will be
effective within the individual telco organisations.
2. Suggest actual information security KPIs. This document presents a total of 37
information security KPIs. This specification may serve as a starting point from which
the ETIS members can adopt the elements that are suitable for their own context.
In the remainder of this document, these objectives are addressed in separate chapters.
When going through this library, readers should be aware that the specification of
information security KPIs (see chapter 3) is limited to KPIs that are presently in use
among the ETIS member telcos. These 37 KPIs should by no means be interpreted as the
definitive set of information security KPIs for telecoms providers, but rather as a starting
point for members to develop their own specific set. Here, please note that the KPIs
specified in chapter 3 are predominantly technical of nature. Members that suggested
these KPIs often indicate that they do not fully appeal to the information needs of business
and executive management. Depending on member preferences, the library might be
expanded with a set of “business oriented” information security KPIs in a later stage.
1.3 Acknowledgements
This library would not exist in its present form without the kind and competent
contributions of those participating in the ETIS security group. ETIS would like to thank
the delegates of A1 Austria Telekom, Deutsche Telecom, TDC, Telefónica, Teliasonera and
Vimpelcom for their efforts to this end. A special thank you is in order for Aleksandra Sowa
and Göran Laxén, who both contributed a valuable section to the context and guidance
chapter.
Ever since information security is recognised as a core business process, the need for
effective measurement of that process has been growing. Information security metrics and
KPIs provide means to support this need. Using metrics and KPIs, an organisation is able
to assess whether its information security strategies and approaches are actually working
as effectively as they should. Moreover, metrics and KPIs help an organisation understand
the extent to which information security contributes to its overall objectives.
This chapter introduces the concept of information security KPIs and related terms and
provides guidance on how to use them effectively in a telco organisation.
ETIS member telcos – or any organisation for that matter – will have security policies and
objectives they strive to achieve. Responsible functionaries, e.g. the company’s CSO or
members of the board to which the CSO reports, will have a desire to monitor the status
and progress of such policies and objectives so that they can take appropriate decisions
and/or actions where required. Hence these functionaries have an information need, which
we define as follows:
Information security KPIs are a means to address this information need in a quantitative
fashion. Here, we define information security KPIs as follows:
Key Performance Indicators (KPIs) are used by organisations as steering vehicles for
management. Thus, information security KPIs essentially facilitate evaluation, decision
making and governance of information security on tactical or strategic level. Such
information security KPIs usually work best when accompanied by so called decision
criteria, i.e. predefined quantitative values of the KPI that trigger specific decisions or
actions. To this end, we introduce the following definition:
Decision criteria thresholds, targets or patterns used to determine the specific need
for action that might be triggered by a KPI
This brings us to the issue of actually determining a KPI value and the confusion that
sometimes arises when distinguishing between metrics and KPIs. The National Institute of
Standards and Technology (NIST) in his Special Publication 800-55 [NIST] provides the
following definition of metrics:
“metrics are tools designed to facilitate decision making and improve performance and
accountability through collection, analysis, and reporting of relevant performance-related
data. The purpose of measuring performance is to monitor the status of measured
activities and facilitate improvements in those activities by applying corrective actions,
based on observed measurements”
For the purpose of this document, we shall maintain a more compact definition:
What metrics and KPIs have in common is that both are derived from the business goals of
the organisation (see also following section). However, a KPI is an indicator that is
material for an organisation (it is a key indicator) and fundamental for management
decision making. Mortensen [Mortenson] defined seven key characteristics of KPIs:
In practice, a metric is something that can be measured directly on or via some object of
measurement whilst information security KPIs are determined by processing such metrics
in an analytical model and thus transforming the measurable date into a shape that
appeals to the information need of the target audience. As an example, one might for
instance measure the number of active passwords in an organisation (first metric) by
conducting a query on the company’s IAM system (first object of measurement). Possibly,
the target audience’s information need is best satisfied by presenting the number of
passwords per employee of the organisation. In that case, it will also be necessary to
determine the company’s present headcount (second metric), for instance by querying an
Note that the terminology introduced above will also be employed in the actual
specification of information security KPIs, as presented in the following chapter.
In the 1980s Basili and Weiss [Basili] introduced the so called Goal Question Metrics
approach (GQM. GQM essentially serves to select and implement metrics. The GQM
principle consists first in expressing business goals of the organization. From these goals,
questions describing these goals are derived. Finally, each question is analysed in terms of
what metrics is needed to answer each question. As metrics are defined, measurements
and other metrics have to be identified, to define qualitative or quantitative value of the
metrics
1. List the major business goals of the organisation (focus: information security).
(1a. we can derive information security goals from the business goals as a
intermediate step, alike COBIT does for IT goals)
2. Derive from each goal the questions that must be answered to determine if the goals
are being met.
3. Identify metrics that help to evaluate the questions.
4. Decide what must be measured to value the metrics.
GOAL
Metrics involve measurements (and sometimes also other metrics) that concern main
attributes of information security. These are:
1. Processes
(characteristics: internal and external)
Processes are measured to inform on duration, cost, effectiveness and efficiency of
information security measures and activities. Examples of process measurements (or
metrics) are the duration of the process or activity, the effort associated with a process
or activity and the number of incidents of a specified type arising during process or
activity
2. Products
(characteristics: internal and external)
By “products” we mean not only a delivered security product (or measure) but also the
test versions, documents and prototypes produced during the development, testing
and delivery process. All these process outputs can be measured in term of quality,
size, etc. External and internal attributes are distinguished as follows:
- External product attributes depend on product behaviour and environment that
influence the measure. Example of external attributes are: usability,
integrity,efficiency, testability, reusability, portability, operability.
- Internal products attributes are easy to measure in terms of size, length,
functionality, correctness.[22, p.78] Code clarity is an example of internal attribute
according to defined rules like "avoid GOTO".
3. Resources
(characteristics: internal and external)
Resources are measurable entities like personnel, materials and methods. Measuring
resources help managers to understand and control the process. Programmer’s
productivity is often measured in terms of lines of code.
- Internal attributes of a product, process or resource are those that can be measured
purely in terms of the product, process or resource itself. In other words, an internal
attribute can be measured by examining the product, process or resource on its own,
separate from its behaviour.
- External attributes of a product, process or resources are those that can be measured
only with respect to how the product, process or resource relates to its environment.
Here, the behaviour of the process, product or resource is important, rather than the
entity itself.
According to Fenton and Pfleeger, data that will be collected and measurements that are
made to satisfy metrics must fulfil several essential properties:
- Correctness
The data were collected according to the exact rules of definition of the metrics. For
example, if comments are not supposed to be included in the lines of codes count, then
a check for correctness assures that no comments were counted.
- Accuracy
This property refers to the differences between the data and the actual value. For
example, time measurement will be less accurate on an analog clock than on a digital
one.
- Precision
This refers to the number of decimal places needed to express the data.
- Consistency
Data must be consistent from one measuring device or person to another, without
large differences in value.
- Time-Stamped
We must know exactly when data has been collected in order to allow comparison.
- Replicated
Data definition must be accurate to allow other person to replicate the same
measurement.
Objectivity, reliability and integrity of data are other data properties that are named by
other authors, the latest (integrity) especially if the results of the measurements are used
for monitoring information security and are reviewed by external auditors or investigators
(in fraud investigation, for instance).
There are generally two main ways to collect data - the manual and the automated. The
main benefit of using metrics is that not cemeteries of data are produced, but only the
material and substantial data, which satisfy identified metrics are collected. Its quantity
has to be manageable.
In order to be successful with KPI implementations they need to be chosen with care,
depending on the need in the organization, so that the purpose with them is clear. We
have noted that the current situation vary a lot between different organizations. One
important aspect is the maturity of the information security process. As the maturity level
increases the need for KPIs will change. At the first steps it may be sufficient to measure if
there is a process in place at all, while at higher maturity levels it may be more useful to
implement KPIs where the performance of the process is measured.
The maturity model proposed here is focused on process maturity and may be used as a
reference, when planning KPI implementation. It may make it possible to foresee what is
required for a successful KPI implementation. The reader should be aware of, however,
that organization, people, influence on the line organization and tools are issues that may
be useful to consider as well.
When planning for KPI implementation it helps to know the current maturity level of the
information security process in your organization. At maturity level 1 everything is handled
in an Ad Hoc manner. Measuring performance will not be asked for, or even utilized, since
responsibilities are unclear, needed tools are missing and even if heroic efforts are made
by individuals it will solve a problem once, but there will be no lasting impact. On the other
hand at maturity level 5 carefully chosen KPIs will have clear receivers needing the
information in order to take appropriate action by fine tuning an already well defined
process. Hence, there is a good chance that the KPI implementation will succeed.
1 2 3 4 5
Initial Managed Defined Quantitatively Optimized
managed
Characterisation
There is no Informal An information A more The information
systematic processes occur security process systematic and security process
information by managing is developed by documented is a part of the
security process the same type the information information organization’s
in place. The of issues in a security security process culture. There is
process is similar way. Co- function, due to is developed by a balance
characterized operation with pressure from the information between
by the and hand over the line security reactive and
responsible to other units is organization function, and it preventive
person’s made. Security and focussing is used by the actions towards
background and benefits are on the security staff problems.
skills and it will recognized. prioritized and the line
be dependent of issues. organization.
the current Focus is not
priorities and limited to
work load. detection and
reactive
actions.
Examples of suitable KPIs
KPIs measured KPIs measured KPIs measured KPIs measured KPIs measured
once, in order repeatedly. E.g. continuously, continuously continuously
3 Specification of KPIs
This chapter specifies information security KPIs presently in use among the members of
the ETIS Information Security Working Group. These KPIs are structured in to nine distinct
categories:
• Business value – KPIs that indicate the direct contribution and value of corporate
security teams towards business and operations
• Risk management – KPIs that indicate the effectiveness of risk management
processes and controls
• Vulnerability management –KPIs that address the effect of vulnerability scanning
and security testing activity and the company’s ability to effectively manage any
vulnerabilities found in IT systems
• Identity & Access Management (IAM) – KPIs currently in this category address the
company’s ability to manage administrator rights and access credentials
• Spam and malware protection – KPIs that assess the effectiveness of provisions to
protect against spam, viruses and other malware.
• Auditing and compliance – KPIs that address the company’s follow-up on audit
findings and specific compliance aspects.
• Security incidents – KPIs that appraise nature and severity of security incidents
encountered by the company as well as the follow up actions such incidents trigger.
• Business Continuity Management (BCM) – KPIs in this category currently focus on
existence and effectiveness of technical recovery plans
• Security resourcing – KPIs with respect to security budgets and manpower. Here it
should be noted that some members might consider these as benchmarking items
rather than actual KPIs.
Each of the above categories corresponds to a specific section of this chapter. The actual
KPIs are all presented in the following format:
For the implementation guidance component, members presently using the respective
KPIs were asked to provide recommendations with respect to
• The source of measurement, e.g. specific IT systems from which the required base
metrics might be extracted
• The method of measurement, i.e. how the base metrics might be quantified
• Reporting formats for the KPIs that have proven successful
• Decision criteria, i.e. the criteria by which the KPI may trigger business decisions
• Viable frequencies for measuring and reporting the KPI
The KPI specification addresses these issues to the extent that members were willing and
able to provide tangible suggestions. Note that the KPIs presented below are based on
inputs from A1 Telekom Austria, Deutsche Telekom, TDC, Telefónica and Vimpelcom.
KPI calculation A
*100
B
Implementation guidance Base metric B will usually require a manual count, for
instance based on risk analysis reports. Base metric A might
be available from a central IT system repository or otherwise
be delivered by the internal IT unit.
The member presently employing this KPI reports it in a bar
chart that depicts differences among different group
companies (subsidiaries). This bar chart is refreshed on a
yearly basis.
KPI calculation A
*100
B
KPI calculation A
B
Implementation guidance Base metric A is usually available via the internal IT
helpdesk. Automated measurement is a possibility if
a) the security helpdesk registers incoming calls in a
database of some sort and
b) this database allows helpdesk employees to categorise
the call as “request for access credential recovery”
If such automated measurement is not easily implemented,
the helpdesk team could simply be instructed to count the
number of credential recovery requests manually and report
this number via e-mail or some other practical means.
The member presently employing this KPI reports it in a bar
chart that depicts differences among different group
companies (subsidiaries). This bar chart is refreshed on a
yearly basis.
Please note that the blue line represents the virus mitigation
percentage, whilst the red line indicates the update level of
the anti-virus solution (i.e. the extent to which virus
definitions are up to date – a different but related KPI).
In this graph the red line represents spam e-mails whilst the
blue line represents e-mails delivered to end user inboxes,
KPI calculation A
*100
B
Implementation guidance Base metrics can be retrieved from IT operations unit,
provided they maintain a log of reinstallations and
corresponding root causes. Arrangements to this end should
be made with the corresponding departments. If the
member’s organisation maintains an IT helpdesk or similar
team, this seems like the most likely candidate to make
working arrangements with since this is will be the
notification point that first identifies the need to reinstall an
end user system.
Note that a possible reporting format is presented under the
implementation guidance for KPI #K8. The member that
uses this format, reports the KPI on a monthly basis.
B
Implementation guidance Members that have a (company wide) incident registration
solution in place will usually be able to quantify both base
metrics directly from that system. Here, an important
requisite is that date and time both detection and closure are
registered accurately for each individual incident.
Members that don’t have an incident registration system in
place might gather base metrics A and B manually, e.g. via
audit or incident reports or through dialogue with the
operational departments that actually handled the incident.
© 2012 Participants in ETIS Information Security Working Group Page 32 of 38
Date: July 27th 2012
ETIS Library of Information Security KPIs
KPI calculation A
B
Implementation guidance Information security budgets can usually be abstracted from
the year plans (formal budgets) of departments with specific
information security responsibilities. In many cases these
plans can all be gathered from a single financial/ control
unit. If this is not feasible, each relevant department could
be asked to deliver base metric A for their specific context
and the outcome could be summed up manually.
Base metric B could be quantified by means of a headcount
among departments that have information security
responsibilities, but might also be available via corporate HR.
The member presently employing this KPI reports it in a bar
chart that depicts differences among different group
companies (subsidiaries). This bar chart is refreshed on a
yearly basis.
Note: some members might find it more suitable to quantify
base metric B as the number of information security ftes
rather than employing a headcount that might include part-
time employees.
References
[Basili] Basili, V.R. and Weiss, D.M. A methodology for collecting valid
software engineering data. IEEE Transactions of Software
Engineering 10 (6) (Nov. 1984), 728–738