05 - Risk and Control Monitoring and Reporting v 2.0
05 - Risk and Control Monitoring and Reporting v 2.0
IT Risk Identification
Alert to reaching or
approaching an unacceptable Tracking mechanism
level of risk
Select meaningful set of controls
to monitor
KRI Selection • Consistent areas to measure
• Good indicators of health of
risk management program
• Areas that can be influenced
by management
Specific
Based on a clearly understood goal
Measurable
Able to be measured
Relevant
Directly related to a specific activity and goal
Timely
Grounded in a specific time frame
Sample of Possible KRIs
Number of unauthorized
Breaches of Service Level
devices discovered on a
Agreements (SLAs)
network
Number of misconfigured
Time to deploy new patches
systems
KRI Effectiveness
Measure areas of higher risk
Measure areas that are relatively easy to
measure
• Reliability – a good predictor of risk
level
• Sensitivity – accurately reflect changes
in risk
• Repeatable – consistent measurement
to detect trends and patterns
KRI Optimization
1 2
Collect and report on the Set KRI thresholds correctly
correct data
Quantitative
Set benchmarks
measurement
Sample KPIs
Self-asssessment
Automated assessment
Third party audits
• Internal
• External
Effectiveness of Assessments
Depends on:
• Complete and accurate data
• Skill of analyst
• Management support and
response
• Continuous scheduled reviews –
not ad-hoc
IS Audits
Provide an objective review of the
efficiency of IT operations
- Acquisition (the right product)
- Implementation
- Maintenance
- Disposal
Audit both technical and non-technical
aspects of the operations of
information systems
Vulnerability Assessment and Penetration
Tests
Vulnerability Assessments
Continuous Quantitatively
Optimization
improvement managed