What Are Cybersecurity Metrics?
Metrics “can mean different things for different people, roles, departments and organizations,” says Randy Rose, vice president of security operations and intelligence at the Center for Internet Security (CIS). “At a high level, metrics are quantifiable and measurable data points that help tell the story of key objectives, such as effectiveness, efficiency or risk.”
Cybersecurity metrics are “quantifiable data points that measure how well your security program is actually working,” says Aparna Achanta, principal security architect at IBM and a member of the ISACA Emerging Trends Working Group.
The best way to think of metrics is as “vital signs for your organization’s digital health,” she says. “They translate activities like patching or user training into numeric values. Well-chosen metrics help leaders assess how effective controls are, spot trends and show improvement over time.”
LEARN MORE: How to counter the most common cybersecurity threats.
Categories and Types of Cybersecurity Metrics
Cybersecurity metrics will vary by organization and how they have built their security strategy, according to Rose. He says a key best practice is to align metrics with a framework like the National Institute of Standards and Technology’s Cybersecurity Framework, CIS Controls or something similar that informs an organization’s security model.
If NIST CSF is the model of choice, he says, then metrics would be aligned to the six core functions: identify, protect, detect, respond, recover and govern.
Metrics can be grouped by purpose and scope, Achanta says. Those include:
- Operational vs. strategic. Operational metrics “reflect day-to-day security tasks, such as time to apply patches or alerts handled per day,” she says. “Strategic metrics translate security performance into business impact or risk, such as estimated cost of a breach or ROI of security investments.”
- Technical vs. people vs. process. Technical metrics “measure systems and tools, such percent of devices with up-to-date anti-virus. People metrics cover user behavior like phishing-click rates or training completion. And process metrics track procedures such as audit pass rates, incident response times or policy compliance,” Achanta says.
- Leading vs. lagging. Leading (input) metrics “gauge preventive efforts; for example, percentage of endpoints fully patched or percent of staff who have taken security training. Lagging (outcome) metrics record results, such as the number of successful breaches or system downtime after an attack,” she says.
- Risk and vulnerability metrics. These metrics measure exposure through unpatched systems or misconfigured networks.
- Compliance and governance metrics. These are used to prove an organization is meeting regulations, such as HIPAA, or state-specific requirements, Achanta says.
- User behavior and awareness metrics. These metrics measure whether employees are clicking on phishing emails or following security policies, she says.
Click the banner below to read the 2024 CDW Cybersecurity Research Report.
