You are on page 1of 8

WHITE PAPER

Key Performance
Indicators (KPIs) for
Security Operations
and Incident Response.
Identifying Which KPIs Should Be Set, Monitored and Measured.
Contents.
This document contains confidential and proprietary information
for use only by DFLabs S.p.A and its intended recipients and
must not be disclosed to unauthorized individuals without prior,
written consent.

Key Performance Indicators (KPIs). 3

Why Measure KPIs? 3

Which KPIs Should be Measured? 3

How Many KPIs Should be Measured? 5

Final Thoughts. 6

Example Key Performance Indicators (KPIs). 7


Key Performance Indicators (KPIs).
What is a Key Performance Indicator operations may have similar goals, most
(KPI)? At its core, a KPI is a way of security operations goals are less finite.
measuring the success or failure of a Most security operations goals are more
business goal, function or objective, and a focused on positive or negative trends
means of providing actionable information over time than achieving a specific target.
on which decisions can be based. Goals
Here will discuss why KPIs are important,
in other business units are often clearly
how to choose the best KPIs for a given
defined; for example, marketing may
organization, and how many KPIs are
have a goal of increasing web traffic by
appropriate.
20% over the next year. While security

Why Measure KPIs?


Much of the security operations process Quality KPIs serve as a security program
focuses around the analysis of data and enabler and driver for continuous
the identification of patterns and trends. improvement. The threat landscape
This is true of both the tactical functions is a dynamic and ever-changing
of security operations – looking for attack environment, and effective security
patterns and trends of malicious activity, operations programs require actionable
as well as the strategic functions of information on which decisive action
security operations – identifying program can be based. KPIs help ensure that a
gaps and making long-term program security operations program continues
decisions. The measurement and analysis to remain effective and that any process
of well thought out KPIs can have a or technology gaps are addressed
tremendously positive impact on both appropriately.
the tactical and strategic functions of a
security operations program.

Which KPIs Should be Measured?


Determining which KPIs should be program that the KPIs can inform results
Quality KPIs serve as measured shouldn’t start with KPIs at in the same critical failures.
a security program all. KPIs should focus on assessing a
Avoid tracking unnecessary KPIs which
goal or function and providing actionable
enabler and driver information on which decisions can
will not inform the decision-making
process in some way. KPIs which do
be made. The most effective way to
for continuous develop meaningful KPIs is to start by
not inform the decision-making process
serve no real purpose to the organization
improvement. identifying which security operations
and serve only to muddy the waters. In
goals or functions are the most critical
addition, most KPIs come with some
to the security operations program.
level of cost. Be it time or money
Think of identifying KPIs like performing
spent changing a process to enable
a risk assessment; critical risks must
measurement of the KPI, time spent by
be identified before any solutions can
the analyst recording the KPI, or time
be identified. Identifying a solution,
spent by management calculating and
then trying to find a risk that the
assessing the KPI, there is almost always
solution will address will result in an
an associated cost. Some level of cost/
ineffective risk management program
benefit analysis should be performed
which does not address the most critical
when determining if a given KPI is
risks. Identifying KPIs then trying to
appropriate.
find aspects of the security operations
When choosing KPIs to measure, quality ANALYST SKILLS As in prevention and detection,
should be valued above quantity. technology is often used to increase the
Does the present skillset of analysts
Each KPI should have meaning to the efficiency and success of the mitigation
match the organization’s present needs?
organization and add value to the process. However, this efficiency and
Gaps in analysts’ skillsets can lead to
security program. There are many success can only be realized if the
inefficiencies in the incident management
different methods to evaluating the technologies are effective. Ineffective
process leading to increased risk to the
effectiveness of a KPI; here we will use mitigation technologies can lead to
organization. Utilizing KPIs to measure
the acronym SMART. Each KPI should be: less efficiency and success than if the
analysts’ present skillsets and comparing
entire mitigation process was performed
•S
 imple – KPIs should not be overly them to the organization’s present
manually, resulting in greater impact
complicated to measure. It should needs can identifying gaps in training
from the incident. Utilizing KPIs to
be clear what the purpose of each and personnel, which when addressed
measure the performance of mitigation
KPI is and how it impacts the security can improve the overall readiness of the
technologies can identify gaps where
program. organization.
additional technology may benefit the
•M
 easurable – A KPI must be able to be organization, as well as ways in which the
measured in some way, quantitatively DETECTION SUCCESS use of existing mitigation technologies
or qualitatively. The method by which How effective are your prevention and can be modified to increase efficiency.
each KPI is measured should be clearly detection technologies? Are they prone
defined and consistent. to false positives or false negatives? PROCESS SUCCESS
•A
 ctionable – KPIs should be used as Prevention and detection technologies
How effective are the processes and
a driver for decisions. The purpose of should function as force multipliers and
procedures? Processes and procedures
a KPI is to measure performance, and assets to the security team. Ineffective
are a critical component in the success
if necessary, take some action based prevention and detection technologies
of any security operations team.
on the results. A KPI which is not mean that security incidents are more
However, to be successful processes
actionable serves little to no purpose. likely to be missed and that analysts are
and procedures cannot remain static.
forced to spend more time performing
•R
 elevant – Each KPI should be a They must be continually reassessed
manual analysis. Utilizing KPIs to
measurement of the function being and adjusted to ensure that they are
measure the performance of prevention
assessed; in this case, the security allowing the security team to address
and detection technologies can identify
program. KPIs which are simple, security incidents in the most effective
gaps where additional technology may
measurable and actionable, but are not and efficient manner possible. Poorly
benefit the organization, as well as
relevant to the function being assessed designed processes and procedures
ways in which existing prevention and
will be of little value. can lead to confusion, frustration,
detection technologies can be tuned to
analysts going “off script” and a dramatic
•T
 ime Based – KPIs can and should increase efficiency.
increase in the impact of a security
be used to show changes over time. incident. Utilizing KPIs to measure the
An effective KPI should be able to KEY RISKS performance of current processes and
be collected and grouped by various What are the key risks faced by the procedures allows the organization to
time intervals to show variations and organization? Organizations are faced ensure that processes and procedures
patterns. with a myriad of risks, and a limit remain optimized and as effective as
SMART KPIs will be different for each budget to address those risks. Most possible against a wide range of security
organization; it is simply not possible organizations are faced with the arduous incidents.
to create a one size kits all list of KPIs process of deciding which risks should
(although a list of example KPIs is be addressed, and which risks must be WORKLOAD
provided in the next section as a starting accepted. Utilizing KPIs to help identify
Is the workload per analyst appropriate?
point). However, it is possible to consider which risks pose the greatest potential
Analysts who are overworked are
the components of a successful security impact to the organization allows
more likely to take shortcuts or miss
operations program which should be the security team to feed actionable
key indicators of security incidents.
assessed utilizing KPIs. Most security information back in to the overall risk
Overworked analysts are also more
operations KPIs should be targeted at assessment process, maximizing the
likely to seek other opportunities, taking
assessing at least one of these common effectiveness of the organization’s limited
their valuable training and experience
components. The six most common time and financial resources.
elsewhere. Utilizing KPIs to measure
components of a successful security analyst workload can identify staffing
operations program are: MITIGATION SUCCESS inefficiencies which may be resulting in
How effective are the mitigation undue risk to the organization.
technologies? Once a security incident
has been identified, it must be mitigated.
How Many KPIs Should
be Measured?
KPIs provide the critical information • Is possible to track the KPI in a
required to make fact-based decisions. meaningful way, and if so, how much
However, tracking too many KPIs can extra work will be created by tracking
become a burden to the analysts from this KPI?
which the information is derived, and
• Can the KPI be adapted in some way to
place decisions makers in a state of
address any potential shortcomings or
information overload. So how many KPIs
increase applicability?
should an organization be tracking? Some
people say three per goal, while other The initial round of KPI brainstorming
suggest five to nine total. In reality, will likely result in a very long list of
somewhere around either of those figures potential KPIs. If it does not, it is possible
is probably appropriate for the average that not all aspects of the security
security operations program. Much like operations program have been considered
the KPIs themselves, what is right for the as thoroughly as they should have been.
program and the organization is far more After this initial round of brainstorming
important than any hard number. the KPI list should go through several
additional iterations, removing KPIs
Here are a few more items to consider in
which do not meet the criteria in this
determining which KPIs should make the
and previous sections. At the end of
list:
this process, the KPIs that remain will be
• Will the KPI provide value to a wide the most effective and efficient drivers
variety of groups or users, or just a few of success for the security operations
individuals? program.
• Will the KPI inspire the most meaningful
change in the organization?

Final Thoughts The goals and


There will never be a set of “correct” KPIs objectives for each
to measure; the goals and objectives for
each organization will always be different,
organization will
and the organization’s KPIs should always be different,
reflect the individual priorities. The key
to choosing KPIs which will have a real, and the organization’s
actionable impact on the organization’s
security program is to ensure that the
KPIs should reflect
KPIs are SMART, focus on the six most the individual
common components of a successful
security operations program, and are used priorities.
to further the security program.
Example Key Performance Indicators (KPIs).
As previously discussed, security each KPI is appropriate for an individual for each KPI, and which of the six most
operations KPIs will vary from organization should be determined common components of a successful
organization to organization. To be through a detailed assessment of the security operations program are being
effective, it is crucial that KPIs which are organizations security operations program assessed.
selected based on the SMART criteria. and assessment against the SMART
This list is intended to be used as a
The following is a list of example KPIs criteria. In addition, the following list
primer to inspire ideas to identify the
which should be applicable at some level provides examples of why each KPI may
most important KPIs for an organization.
to most organizations. Whether or not be important, possible measurements

KPI Why Do We Care? Possible Measurements Assessment of:

How many devices are being monitoring?


Number of devices Number of devices
Is the number increasing or decreasing? Workload
being monitored Number of devices / analyst
Why?

Number of events / hour ( / analyst)


How many events are being handling? Cost to value
Number of events / day ( / analyst)
Total number of Is the number increasing or decreasing? Key risks
Number of events / month ( / analyst)
events Why? Workload
Number of events / year ( / analyst)
Are the current staffing levels adequate?
Number of events / event type

Number of events per device or host /


How many events are received for each day
device or host?
Number of events per device or host /
Detection
Are there certain devices or hosts which month
success
Number of events are more prone to security issues, causing
Number of events per device or host /
per device or host increased risk? Why? Key risks
year
Are there certain devices or hosts which
Number of events / device or host type
are more prone to false positive events?
Why? Number of events / operating system
type

How many events are received for each


service or application?
Detection
Are there certain services or applications
Number of events Number of events / service success
which are more prone to security issues,
per service or
causing increased risk? Why? Number of events / application Key risks
application
Are there certain services or applications
which are more prone to false positive
events? Why?

How many events are received for


account? Detection
Number of events / account success
Number of events Are there certain accounts (users) which
per account are more likely to perform risky behavior, Number of events / user Key risks
leading to security events and increased
risk? Why?

How many events are received per Number of events / department


Number of events geographic location, office, etc.?
Number of events / office Key risks
per location Are certain locations more prone to
security events? Why? Number of events / region

Number of false positives / hour

How many false positive events are Number of false positives / day
Number of false received? Is this acceptable? Number of false positives / month Detection
positive alerts Can the number of false positive events success
Number of false positives / year
be reduced? How?
Percentage of events that are false
positives
KPI Why Do We Care? Possible Measurements Assessment of:

Measured in minutes, hours or days…


How long is it taking your organization
to detect a security event? Is this Average time to detection Detection
Time to detection acceptable? Average time to detection / technology success
Are there ways this time to detection can Average time to detection / event type Process success
be reduced? How?
Outliers

How long is it taking your organization to


resolve an actual security event? Is this Measured in minutes, hours or days…
acceptable?
Average time to resolution
Are there process or technology Mitigation
Average time to resolution / event type success
Time to resolution improvements that can be made to reduce
this time? What are they? Average time to resolution / resolution Process success
strategy
Are additional staff or training required?
How many staff or what additional Outliers
training is required?

How long is it taking your organization


Measured in minutes, hours or days…
to determine that an event is a false
positive? Is this acceptable? Average time to identify
Time to identify Analyst skills
event as false Are analysts spending too much time Average time to identify / technology
positive investigating false positives? Why? Process success
Average time to identify / event type
Is additional training required? What
Outliers
kind?

How many analysts are being assigned to


each event? Is it the proper number? Average number of analysts / event

Are too many analysts being assigned Average number of analysts / event type Analyst skills
Number of analysts to one event meaning that they are not Average number of analysts (per level) / Cost to value
assigned available to response to other events? event
Why? Workload
Average number of analysts (per level) /
Are too few analysts being assigned to an event type
event due to staff shortages?

How many events are being escalated and


to what level?
Average number of events / level
Are events being escalated too quickly or
not soon enough? Why? Average number of events / level / (time
Analyst skills
period)
Escalation level Are there improvements to the escalation Cost to value
process that can make event handling Escalation level / event type
more efficient? What are they? Process success
Escalation level / technology
Is the training for each level sufficient to Average time (min or hours) to escalate
produce the desired skill level? If not,
what additional training is required?

Are certain detection technologies more


or less effective at detecting security Total number of events / technology
events? Why? Total number of events / technology / Detection
(time period) success
Are certain detection technologies more
Event source
prone to false positives? Why? Total number of false positives / Key risks
How often are users or analysts manually technology
detecting an event before it is detected
by a detection technology? Why?
About Us.
DFLabs is an award-winning and increasing the return on invest­ment for
recognized global leader in Security existing security technologies.
Orchestration, Automation and Response
As its flagship product, IncMan SOAR has
(SOAR) technology.
been adopted by Fortune 500 and Global
Its pioneering purpose-built platform, 2000 organizations worldwide.
IncMan SOAR, is designed to manage,
The company’s management team has
measure and orchestrate security
helped shape the cyber security industry,
operations tasks, including security
which includes co-editing several industry
incident qualification, triage and
standards such as ISO 27043 and ISO
escalation, threat hunting & investigation
30121.
and threat containment.
DFLabs has operations in Europe, North
lncMan SOAR harnesses machine
America and EMEA.
learning and automation capabilities to
augment human analysts to maximize the For more information, visit our website
effectiveness and efficiency of security www.dflabs.com or connect with us on
operations teams, reducing the time Twitter @DFLabs.
from breach discovery to resolution and

CONTACT US:

BOSTON - UNITED STATES LONDON - UNITED KINGDOM MILAN - ITALY


150 State Street 1 Primrose Street Via Bergognone, 31
Boston, 02109 London, EC2A 2EX 20144, Milan
T – +1 201 579 0893 T – +44 203 286 4193 T – +39 0373 82416
E – sales@dflabs.com E – sales@dflabs.com E – sales@dflabs.com

CUSTOMER SUPPORT:

T – +39 0373 82416


E – support@dflabs.com

You might also like