Table 7-3 Measures template and instructions
Candidate Measures A number of example candidate measures are provided in Table 7-4. Additional details on these measures, including how they are calculated and used, are provided in SP 800-55, Rev 1.
Information Security Performance Measurement Implementation
Once developed, information security performance measures must be implemented and integrated into ongoing information security management operations. For the most part, it is insufficient to simply collect these measures once (although some activities only require the collection of data for one particular purpose, such as certification and accreditation, described later in this chapter). Performance measurement is an ongoing, continuous improvement operation.
Percentage of the organization's information systems budget devoted to information security
Percentage of high vulnerabilities mitigated within organizationally defined time periods after discovery
Percentage of information systems personnel that have received security training
Average frequency. of audit records review and analysis for inappropriate activity
Percentage of new systems that have completed certification and accreditation prior to their implementation
Percentage approved and implemented configuration changes identified in the latest automated baseline configuration
Percentage of information systems that have conducted annual contingency plan testing
Percentage of users with access to shared accounts
Percentage of incidents reported within required time frame per applicable incident category
Percentage of system components that undergo maintenance in accordance with formal maintenance schedules
Percentage of media that passes sanitization procedures testing
Percentage of physical security incidents allowing unauthorized entry into facilities containing information assets
Percentage of employees who are authorized access to information systems only after they sign an acknowledgment that they have read and understood the appropriate policies
Percentage of individual screened before being granted access to organizational information and information systems
Percentage of vulnerabilities remediated within organizationally specified time frames
Percentage of system and service acquisition contracts that include security requirements and/or specifications
Percentage of mobile computers and devices that perform all cryptographic operations using organizationally specified cryptographic modules operating in approved modes of operations
Percentage of operating system vulnerabilities for which patches have been applied or that have been otherwise mitigated