Skip to main content

GOV-05.2: Key Risk Indicators (KRIs)

GOV 6 — Medium Govern

Mechanisms exist to develop, report and monitor Key Risk Indicators (KRIs) to assist senior management in performance monitoring and trend analysis of the cybersecurity and data protection program.

Control Question: Does the organization develop, report and monitor Key Risk Indicators (KRIs) to assist senior management in performance monitoring and trend analysis of the cybersecurity and data protection program?

General (10)
Framework Mapping Values
AICPA TSC 2017:2022 (used for SOC 2) (source) CC1.2 CC1.5 CC2.2 CC4.1
COBIT 2019 APO02.02 MEA01.04
COSO 2017 Principle 2 Principle 5 Principle 14 Principle 16
ISO 31000 2009 5.6
NIST AI 100-1 (AI RMF) 1.0 MEASURE 4.1 MEASURE 4.3
NIST CSF 2.0 (source) GV.RM-01
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) GOV-05.2
SCF CORE ESP Level 1 Foundational GOV-05.2
SCF CORE ESP Level 2 Critical Infrastructure GOV-05.2
SCF CORE ESP Level 3 Advanced Threats GOV-05.2
US (2)
Framework Mapping Values
US CERT RMM 1.2 HRM:SG3.SP2
US SSA EIESR 8.0 5.7

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to develop, report and monitor Key Risk Indicators (KRIs) to assist senior management in performance monitoring and trend analysis of the cybersecurity and data protection program.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to develop, report and monitor Key Risk Indicators (KRIs) to assist senior management in performance monitoring and trend analysis of the cybersecurity and data protection program.

Level 2 — Planned & Tracked

C|P-CMM2 is N/A, since a well-defined process is required to develop, report and monitor Key Risk Indicators (KRIs) to assist senior management in performance monitoring and trend analysis of the cybersecurity and data protection program.

Level 3 — Well Defined

Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Statutory, regulatory and contractual compliance requirements for cybersecurity and data protection are identified and documented. Recurring testing is utilized to assess adherence to internal standards and/or external compliance requirements.
  • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability.
  • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity and data protection.
  • Controls are standardized across the organization to ensure uniformity and consistent execution.
  • Corporate governance (executive oversight) exists for the cybersecurity and data privacy, which includes regular briefings to ensure executives have sufficient situational awareness to properly govern the organization.
  • Procedures are established for sensitive/regulated compliance obligations that are standardized across the organization.
  • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity and data protection controls for each system, application and/ or service of which they have accountability.
  • The organization designates one or more qualified individuals to govern the cybersecurity and data privacy programs (e.g., Chief Information Security Officer or Chief Privacy Officer).
  • Risk management processes are defined, to include materiality considerations.
Level 4 — Quantitatively Controlled

Cybersecurity & Privacy Governance (GOV) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Metrics are developed that provide management insight, per a quantitative understanding of process capabilities, to predict optimal performance, ensure continued operations and identify areas for improvement.
  • Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
  • Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
  • Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
  • Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
  • Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
  • Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving

Cybersecurity & Privacy Governance (GOV) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
  • Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.

Assessment Objectives

  1. GOV-05.2_A01 Key Risk Indicators (KRIs) are developed to assist senior management in performance monitoring and trend analysis of specific aspects of the organization's cybersecurity / data privacy program.

Evidence Requirements

E-GOV-13 Measures of Performance (Metrics)

Documented evidence of formal measure of performance that are used to track the health of the cybersecurity & data protection program (e.g., metrics, KPIs, KRIs).

Cybersecurity & Data Protection Management

Technology Recommendations

Micro/Small

  • Manually-generated metrics

Small

  • Manually-generated metrics
  • Governance, Risk & Compliance (GRC) solution

Medium

  • Manually-generated metrics
  • Governance, Risk & Compliance (GRC) solution

Large

  • Manually-generated metrics
  • Governance, Risk & Compliance (GRC) solution

Enterprise

  • Manually-generated metrics
  • Governance, Risk & Compliance (GRC) solution

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.