ACL White Paper Kri Basics It Governance
ACL White Paper Kri Basics It Governance
ACL White Paper Kri Basics It Governance
KRI BASICS
FOR IT
GOVERNANCE
How information technology and information security can
implement this crucial part of risk management.
This document will give you a foundational understanding of KRIs and guide you
towards getting started with your own KRI program.
WHITE PAPER | IT GOVERNANCE
By the time you’ve finished reading this white paper, you’ll be armed
with enough information to start implementing your own KRI program.
Contents
Indicators: purpose and role in your organization. . . . . . . . . . . . . . . . 3
What do KRIs do?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Leading, lagging, and current KRIs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
How many KRIs should you have?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Good KRI checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2
The purpose and role of KPIs, KRIs, and KCIs
Before we dig into KRIs, we first want to look at the type of metrics that well-governed
organizations track. These include:
Indicator metric What does it measure? What’s the purpose? Who is the audience?
Key Performance Indicator KPIs measure how They provide directional Strategic KPIs: Most often
(KPI) effectively the organization insight on how you’re executive management and
is achieving its business progressing towards the board.
objectives. strategic objectives, or the Operational KPIs: Most
effectiveness of specific often managers, operational
business processes or process owners, and
control objectives. department heads.
Key Risk Indicator KRIs measure how risky They provide early warning Strategic KRIs: Most often
(KRI) certain activities are signals when risks (both executive management and
in relation to business strategic and operational) the board.
objectives. move in a direction Operational KRIs: Most
that may prevent the often managers, operational
achievement of KPIs. process owners, and
department heads.
Key Control Effectiveness KCIs measure how well They provide direct insight Most often front-line
Indicator (KCI) controls are working. into a specific control activity, control activity owners.
procedure, or process which
was not implemented or
followed correctly.
1 2 3
AUTOMATED
KRI EXCEEDS RISK IS
WORKFLOW
THRESHOLD MITIGATED
TRIGGERED
Risk of customer
More than one login Alerts are sent and
data breach has
using the same ID follow-up tasks
been reduced
assigned
4 5 6
Example:
The organization has a (1) strategic objective to minimize the possibility of a data breach. A (2) key risk in this case could be
the breach of customer information. So, a (3) KRI might be the number of concurrent system logins using the same ID.
Once a certain (4) threshold is met (more than one login using the same ID), (5) alerts and follow-up workflows can be set
to engage the appropriate people so they will (6) take action, which results in reduced risk of customer data breach.
Any number of KRIs can be applied to this model. It’s a great way
to get started with automating some more of those repetitive,
monotonous (yet critical) tasks.
4
Leading, lagging, and current KRIs
KRIs can provide information on the current state of your risk, as well as events that might happen in the future, or events
that happened in the past. These are classified as:
1 Leading indicators. Emerging risk trends for events that 2 Current indicators. Where you currently sit with your
might happen in the future and need to be addressed. risk exposure. For example, the number of staff who
For example, the number of employees who click on haven’t completed mandatory security training.
fake phishing emails. 3 Lagging indicators. Events which took place in the past
and could occur again. For example, the time between
employee termination and deletion of accounts.
»» intended audience.
6
Example KRIs to get you started
Now you know what KRIs do, what makes a good KRI, and how KRIs differ (and relate to) KPIs and KCIs. The next step is
identifying the KRIs that would work for your organization or team. But choosing which KRIs to implement isn’t always as
easy as picking from a universal set of indicators—especially when it comes to IT governance.
First, each business or organization has a number of Second, KRIs are not static. They need to be monitored and
different factors that come into play—like objectives, updated as your business objectives change and evolve.
culture, products, processes, and other activities—that will This will be unique to almost every organization and the
define which KRIs should be monitored. For IT governance, main reason why going off a list shouldn’t be your only
your lists of KRIs will vary based on the products you offer, approach.
who you’re regulated by, where you are operating, and your
organization’s unique objectives and priorities.
To provide some potential KRIs for IT governance, we first looked to the Global Cyber Risk Perception Survey by Marsh and
Microsoft to determine what risks are top of mind with IT execs. The data showed that the risks which have the highest
potential impacts on the business include (in order):
1 Business interruption.
2 Reputational damage.
3 Breach of customer information.
4 Data or software damage.
5 Extortion or ransomware.
6 Third-party liability resulting from systems breaches.
7 Disruption/interruption of industrial systems or other
operational technology.
8 Loss/theft of intellectual property.
9 Contingent business interruption (supply chain).
10 Physical property damage and/or bodily injury.
These risks could damage an organization—possibly to the
point of collapse. So it’s surprising to learn that one-third of
IT execs surveyed by Deloitte admit they have little or no IT
governance process in place.
While each organization will have unique enterprise or
organizational risks, we’ve defined 15 KRI examples, linked
to the top three risks from the Global Cyber Risk Perception
Survey by Marsh and Microsoft.
Business Interruption
Associated Risk Measurable KRI Nature Why you should track this Applicable
Vendor service Number of applications All Without an SLA, your organization may be
interruption currently running engaging with a high-risk vendor. The vendor
in the organization may not adhere to your regulations (?) or they
without a service level could end service at any moment, causing a
agreement. disruption in the business.
ISP failure Number of ISP outages. Leading High numbers of outages can be an indicator
that it’s time to change providers. Especially if
you provide online services, outages can mean
business comes to a full stop.
Loss of data Number of system Lagging New or upgraded software can cause backup
backup failures due to failure, or there could be misconfigurations
software failure. due to overly customizable software that
result in backup failures.
Lack or misappropriation Total discrepancy Lagging Being overspent in IT can mean critical or
of IT budget (dollars) of IT budget new tools go unfunded. Being underspent can
versus actual. mean IT is overlooking important investments,
or is not budgeting correctly.
Lack or misappropriation Average amount of All Higher time to close tickets can indicate a lack
of IT personnel time to resolve IT of resources, which may lend itself to larger,
support requests. undiscovered issues which could interrupt the
business.
Reputational Damage
Associated Risk Measurable KRI Nature Why you should track this Applicable
8
Breach of Customer Information
Associated Risk Measurable KRI Nature Why you should track this Applicable
Shared login credentials Number of concurrent Lagging Could indicate an employee has
system logins using the shared their login credentials with an
same ID. unauthorized individual who should not
have access to confidential information.
Improper security Total number of users All This could indicate that one employee
assignments with similar roles but may be accessing customer data files that
dissimilar security they should not.
assignments.
Malware Number of employees Leading By setting up and testing employees
who click on IT-sent with fake phishing emails, you can
phishing emails. identify employees that require additional
security training.
Employees unaware Pass/fail results for Leading Employees who fail or do not complete
of what defines employee information security training on a regular basis
confidential information security training increase risk of customer information
initiatives. being shared.
Hackers access systems Number of users whose Leading Employees who don’t update passwords
via password cracking passwords are over on a regular basis can expose the
expiry/change date. organization to increased risk of breach.
WHITE PAPER | IT GOVERNANCE
Many organizations use a combination of bottom-up and top-down, particularly to capture KRIs into the appropriate
context of strategic versus operational. We’ve included a blank worksheet here with an example to help you uncover
your own KRIs.
DEFINE
BUSINESS ESTABLISH SET KEY MONITORING
SOURCES OF
OBJECTIVE KRI THRESHOLDS FREQUENCY
RISK
Number of concurrent
Minimize the possibility Users sharing login More than one login
system logins using the Real-time.
of a data breach. credentials. using the same ID.
same user ID.
10
Next steps: Workflows and reporting
www.acl.com/it/information-technology-governance
www.acl.com/it/it-governance-software
WHITE PAPER | IT GOVERNANCE
Additional resources
Developing Practical Key Risk Indicators for Operational Risks
in Technology, the RMA Journal, 2008
Managing IT risk in a fast-changing environment EMEIA FSO IT
Risk Management Survey June 2013
Risk Reporting & Key Risk Indicators, a case study
IT Applications for ACL Data Analytics
About ACL
We deliver software solutions that transform audit,
compliance, and risk management. With intuitive software,
embedded regulatory content, and on-demand training, we
help break down the silos across teams and create
consistency throughout your financial institution.
Our cloud-based governance, risk management and
compliance (GRC) platform and flagship data analytics
products are used within all levels of financial institutions.
And with over 30 years of experience (not to mention over
900 current banking and credit union clients), ACL quickly
helps customers like you be more competitive, keep the
cost of compliance down, and balance your risks to achieve
growth targets.
Visit us online at www.acl.com
© 2019 ACL Services Ltd. ACL and the ACL logo are trademarks or registered trademarks of ACL Services Ltd.
12 white-paper-IT-KRI-v3 All other trademarks are the property of their respective owners.