You are on page 1of 4

WHITE PAPER

INFORMATION SECURITY METRICS

Abstract
Information Security Metrics are powerful tools that every
organization must use to measure and thereby improve
performance of controls. Security Metrics can also provide important
data points for an organization to ensure they prioritize between
areas of focus and justify resource spend (time and money).
What is an Information Security Metric?
An Information Security Metric is a “Patch Management Coverage” metric patch management process”. This metric
quantifiable measure that is used to characterizes the efficiency of the patch also serves as an indicator of the ease
track and assess the status of a specific management process by measuring with which security-related changes
information security process. (and the “percentage of total technologies can be pushed into the organization’s
underlying technologies/tools). For e.g.: managed in a regular or automated environment when needed.

How to establish an Information security metrics management program?


A simple Information security metrics This step includes finding the source of for the executive management using
management program can start with: the metrics (most likely a tool) and the Graphs for ease of decision making
format of the underlying data
• I dentifying goals and metrics: Identify • M
 anaging the metrics: This step
what information is important to the • C
 apturing and displaying the includes establishing a procedure or an
organisation and what metrics can be metrics: This step includes finalized automated mechanism (APIs etc.) for
built to provide that information representation of the metrics. It periodic data capture and upload for
is recommended to represent the generating the Security Metrics
• Defining the underlying data sets:
Information Security Metrics meant

External Document © 2020 Infosys Limited


SMART Metrics: 5. Timely: The frequency in which the Majority of the tools (For e.g.: eGRC tools)
Take a look at one of the ways to create/ metric reports data, should be in-line that facilitate IT risk management, contain
capture a good metric by understanding with the rate of change expected from a risk register which can be used to
the requirement of the SMART Metrics the underlying data or the goal the provide a report containing the following
system. What makes a Metric SMART? A metric is aligned to attributes:
metric that by definition covers all the A. List of open risk
CISO Metrics:
below goals can be termed as a SMART B. Inherent risk rating of each risk (For e.g.:
In this ever evolving and diverse Cyber
metric: Critical, High, Medium, Low)
Security world, CISO(s) often face the
1. Specific: Metrics should communicate challenge of consuming and tracking The above report can be used to create
information that is relevant to the goal data available from different security tools a metric (and the data set) that provides
for which they have been created deployed across multiple security domains. the number of open risks for a particular
2. Measurable: Metric should be They are constantly challenged with the month. The goal of the Metric can be
quantifiable and should be derived following set of questions: to keep a tab on the critical and high
from actual numbers. It’s important risks that are open. Another goal can be
• D
 o we have sufficient visibility into
to avoid metrics which are based on to pronounce any significant spike in a
various security domains?
estimates number of open risks, thereby creating a
• Is there enough consolidated/historical
3. Achievable: Achievable metrics are the case for further investigation.
data for IT security governance and
ones for which everything is in place to strategic decision making? The metric can be depicted in a bar
meet the metric generation graph with the “number of risks (grouped
• C
 an we set maturity levels and track our
4. Repeatable: A repeatable metric according to their risk rating)” on Y axis and
achievement against them?
is one that can be clearly defined, the “month (for last 6 months)” on the X
communicated and raw data can be The answer to the above lies in capturing axis. Trend of the “open critical risks” over
gathered and reported in the same metrics that are more suited for CXO needs. last 6 months can also be measured. The
manner by all the staff involved Example 1: Risk Management Metric. resultant view would be something like
depicted below:

External Document © 2020 Infosys Limited


Example 2: Metric in a security and A threshold can be set of the percentage of distribution of employees across various
awareness domain. One can have a metric employees who have completed security departments. The graph of this metric
that visualizes the number of employees awareness training as 90%. Accordingly, can be brought-up by clicking on the
who have completed a mandatory security one can measure the trend of this % respective bar of our previous L1 metric
awareness training vs the number of against the defined threshold. L2 metrics graph.
employees who have not. can also be built that highlights the

Information Security Metrics can be a for a required domain/area. Infosys please write to:
powerful tool for the CISO and CISO CyberSecurity Practice can help you and Sujatha Mudulodu, Practice Manager
organization. They can be used to measure your clients to build powerful security (Data Security, GRC & UVM),
trends and can help in prioritizing focus metrics and also capture/track them using <MSUJATHA@infosys.com> and/or
areas. They can also help in justifying the Infosys Cyber Gaze Platform. For more Gaurav Negi <gaurav.negi@infosys.com>
a spend or asking for more resources information on the Cyber Gaze platform,

About the Author


Gaurav Negi
Principal Consultant

Gaurav has over 17 years of experience across industries in the areas of Information Security Implementation and Consulting that include
Program Compliance Management, Information Risk Lifecycle Management and Implementation of e-GRC Framework/Tools. Gaurav has
worked with clients helping them with their SOX Compliance, ISO 27001 Implementations, PCI DSS Compliance, Data Privacy (Privacy Impact
Assessment Automation), eGRC Tool Automation/Transformation (RSA Archer) and Cloud Security Assessment. Gaurav holds a Bachelor’s
Degree in Computer Sciences. He also possesses industry recognized certifications like “SABSA Chartered Security Architect - Foundation
Certificate (SCF)” and “Certified Information Systems Auditor (C.I.S.A)”.

For more information, contact askus@infosys.com

© 2020 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys
acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this
documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the
prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.

Infosys.com | NYSE: INFY Stay Connected

You might also like