Every week, dozens of data breaches are reported with some reaching into the tens, or even hundreds of millions of individuals impacted.
Customers and regulators alike are increasingly concerned about the information security programs of organizations and how they plan to prevent security incidents and safeguard sensitive data.
As a result, many laws and regulations have been established to promote cybersecurity risk management and to protect confidential information that may be stored or transferred across organizations.
These industry-specific and general data protection laws tend to be extensive and require constant monitoring to ensure regulatory compliance across your organization and your vendors' organizations.
That's why it's important to establish a set of security metrics that measure the effectiveness of, participation in the use of security controls. A well-chosen set of metrics will help guide future security decision-making and improve the security posture of your organization.
Without a quantitative approach to threat intelligence, organizations become more susceptible to attacks which can impact revenue and reputation. Read our post on the average cost of a data breach to learn more.
Security metrics or cybersecurity metrics are a measurable value that demonstrates how well a company is achieving its cybersecurity risk reduction goals. Organizations use security metrics at multiple levels to evaluate how well they are meeting their security standards and information security management requirements.
High-level security metrics may focus on the overall performance of the organization and are typically owned by the Chief Information Security Officer (CISO) or CTO and shared with senior management, while low-level security metrics may focus on penetration testing, vulnerability scan, security training, and risk assessment results. Low-level metrics are typically owned by security teams made up of security professionals who report into the CISO.
While the main goal of security metrics is to assess how well your organization is reducing security risk, there are also different metrics that can provide insight into the performance of the program itself. These metrics are often provided by security tools designed to provide real-time, actionable feedback.
Regardless of what metrics you pick, remember that they should be quantifiable and influence day-to-day behavior as well as the long-term strategy. They should also comply with your information security, data security, mobile security, and network security frameworks.
And ideally, you should have a set of metrics that are easily understandable for non-technical stakeholders, such as shareholders, Board members, and regulators. Hard numbers and industry benchmarks are a great way to avoid confusion while highlighting key areas for improvement.
As Peter Drucker said, what gets measured, gets managed. If you can't measure the results of your security efforts, you won't know how you're tracking.
Cybersecurity isn't a one-time affair. Cyber criminals and the cyber attacks they employ are constantly evolving, and the processes and technology needed to combat them must continuously evolve to stay relevant.
You need to have metrics in place to assess the effectiveness of the security controls you have invested in.
Security metrics are important for two main reasons:
These seven principles will help you choose the right security metrics for your organization:
Following these principles will help you identify data and services needed to build the metrics you need. It's important to remember your business environment will influence what data is collected to form your security metrics. These metrics will also depend on the technology you deploy, security controls you use, and the number of third-party vendors you outsource to.
Your security posture (or cybersecurity posture) is the collective security status of the software, hardware, services, networks, information, vendors and service providers your organization uses.
The most important metric to track your security posture is a security rating or cybersecurity rating.
A security rating is a data-driven, objective, and dynamic measurement of your organization's security posture. It is created by a trusted, independent security ratings platform, much like a credit rating is created by an outside party.
Just like credit ratings, security ratings aim to provide a quantitative metric of cybersecurity risk.
The higher the organization's security rating, the better its overall security posture.
Security ratings help security and risk leaders:
According to Gartner, cybersecurity ratings will become as important as credit ratings when assessing the risk of existing and new business relationships…these services will become a precondition for business relationships and part of the standard of due care for providers and procurers of services. Additionally, the services will have expanded their scope to assess other areas, such as cyber insurance, due diligence for M&A and even as a raw metric for internal security programs.
Read more about security ratings here.
Beyond your security rating, you should consider tracking:
Read our post on the 14 cybersecurity KPIs to track.
Security metrics can help ensure you are meeting any applicable regulatory requirements, such as PCI DSS, HIPAA, GDPR, CCPA, CPS 234, LGPD, PIPEDA, FIPA, The SHIELD Act, GLBA, and FISMA.
The metrics you choose to track need to effectively measure your organization's ability to maintain regulatory and general data protection requirements. This is not only useful for improving your cybersecurity program, but can also help you avoid fines, lawsuits, and other penalties.
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from major credit card schemes.
PCI DSS aims to increase controls around cardholder data to reduce credit card fraud. PCI compliance requires that you meet twelve requirements:
Examples of metrics that are helpful for addressing PCI DSS compliance include:
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was signed into federal law by President Bill Clinton on 21 August 1996.
Of particular importance to security professionals are the HIPAA Privacy Rule and HIPAA Security Rule.
The Privacy Rule establishes a set of national standards for the protection of patients' rights and protected health information (PHI). The major goal of the Privacy Rule was to strike a balance between the confidentiality, integrity, and availability (CIA triad) of healthcare data while still being able to protect the public's health and well being.
The HIPAA Security Rule establishes a national set of security standards for protecting certain health information that is held or transferred in electronic form. The Security Rule operationalizes the protections contained in the Privacy Rule by addressing the technical and non-technical safeguards.
Examples of metrics to track to ensure HIPAA compliance include:
The European Union's (EU) General Data Protection Regulation (GDPR) is an extraterritorial law designed to protect the personally identifiable information (PII) of EU citizens.
As an extraterritorial law, it applies to any organization handling EU citizen data, regardless of whether they are in the EU or not. It aims to provide users with greater access to their sensitive data.
Furthermore, any third-party vendors you use must also be compliant with GDPR. This is why vendor risk management (VRM) has become so important.
Fines for non-compliance are significant, either:
Examples of metrics to track for GDPR compliance include:
The California Consumer Privacy Act (CCPA) or AB 375 is a new law that became effective on January 1, 2020, designed to enhance consumer privacy rights and protection for residents in the state of California by imposing rules on how businesses handle their personal information.
The CCPA is akin to GDPR and is the most extensive consumer privacy legislation passed in the United States to date.
Examples of metrics to track for CCPA compliance include:
CPS 234 is an APRA Prudential Standard that aims to ensure that an APRA-regulated entity takes measures to be resilient against information security incidents (including cyber-attacks) by maintaining an information security capability commensurate with information security vulnerabilities and threats.
It applies to all APRA-regulated entities and failure to comply with CPS 234 can result in the loss of RSE license.
Examples of metrics to track CPS 234 compliance include:
Read more about how to comply with CPS 234.
The Brazilian General Data Protection Law (Lei Geral de Proteção de Dados Pessoais or LGPD) is a new law that was passed by the National Congress of Brazil on August 14, 2018 and comes into effect on August 15, 2020.
The LGPD creates a legal framework for the use of personal data of individuals in Brazil, regardless of where the data processor is located just as CCPA and GDPR have for Californians and Europeans respectively.
Examples of metrics to track for LGPD compliance are:
Read more about LGPD compliance.
The Personal Information Protection and Electronic Documents Act (PIPEDA) is the federal privacy legislation for private-sector organizations in Canada.
PIPEDA became law in April 13, 2000 to promote trust and data privacy in ecommerce and has since expanded to include industries like banking, broadcasting and the health sector.
Examples of metrics to track for PIPEDA compliance are:
Read more about PIPEDA compliance.
The Florida Information Protection Act of 2014 (FIPA) came into effect July 1, 2014, expanding Florida's existing data breach notification statute requirements for covered entities that acquire, use, store or maintain Floridian's personal information.
FIPA is similar to CCPA, GDPR, and LGPD albeit less extensive. Examples of metrics to track FIPA compliance include:
Read more about FIPA compliance.
The New York Stop Hacks and Improve Electronic Data Security Act (SHIELD Act) or Senate Bill 5575, was enacted on July 25, 2019 as an amendment to the New York State Information Security Breach and Notification Act. The law goes into effect on March 21, 2020.
The goal of the SHIELD Act is to update New York's data breach notification laws to keep pace with current technology by broadening the scope of information covered under the notification law, as well as broadening the scope of what a data breach is.
Examples of metrics to ensure compliance with the SHIELD Act include:
Read more about SHIELD Act compliance.
The Gramm-Leach-Bliley Act (GLBA) is a federal law in the United States that requires financial institutions to explain how they share and protect their customers' nonpublic personal information (NPI).
There are three major components of the GLBA, designed to work together to govern the collection, disclosure, and protection of customers' nonpublic personal information (NPI), namely:
Examples of metrics to ensure compliance with GLBA include:
The Federal Information Security Management Act of 2002 (FISMA) is a United States federal law that defines a comprehensive framework to protect government information, operations, and assets against natural and manmade threats.
The framework is further defined by the National Institute of Standards and Technology (NIST) who has published standards and guidelines such as FIPS 199 Standards for Security Categorization of Federal Information and Information Systems, FIPS 200 Minimum Security Requirements for Federal Information and Information Systems and the NIST 800 series.
FISMA requires federal agencies to develop, document, and implement an agency-wide information system that supports their operations and assets, including those provided or managed by third-parties.
Examples of metrics that can help with FISMA compliance include: