Balanced Scorecard

Strategy tree: IT Security Metrics

Scorecard: Security audit with Strategy2Act software 

This scorecard was created by AKS Security Expert, using Strategy2Act software.

Creation time stamp: 10.05.2006 0:16:45 

 

Vision tree: IT Security Metrics
Suggested solution:  Security audit with Strategy2Act software
  Learn strong and weak points of organization. Suggest possible ways to solve security problems.

Solution response:

Invest necessary means to integrate security costs into the system life cycle, check and approve system security plans for laptops
Score: 74 of 100
Scorecard:
IT Security Metrics DescriptionMeasureTargetScore
 Risk ManagementRisk Management measurements quantify the number of conducted system risk assessments and the degree of managerial involvement in the risk assessments procedures. 30
  Security PlanSecurity Plan metrics quantify the percentage of systems with approved system security plans and the percentage of current system security plans.     Comment: 90% coverage, except some laptops and pocket pc computersThe percentage of systems with approved system security plans100%7 of 12
  Security ControlsSecurity Controls metrics determine the efficiency of closing significant system weaknesses by evaluating the existence, the timeliness and effectiveness of a process for implementing corrective actions.     Comment: Measured for spam fighting, it required about 1 hour to install patch for all systems. Consider time for other possible threats.The time required for implementing corrective actions2 hours6 of 18
 Contingency PlanningContingency Planning measurements include the percentage level of critical data files and operations with an established backup frequency as well as the percentage of systems that have a contingency plan 20
  Backup FrequencyBackup Frequency depends on changes frequency and data value     Comment: We do backup two times a dayBackup frequency time period2-8 hours10 of 14
  Incident Response CapabilityIncident Response Capability metrics quantify the percentage of agency components with incident handling and response capability and the number of incidents reported to FedCIRC, NIPC, and local law enforcement     Comment: We need better reporting features for databaseThe number of components with incident handling and response capability80% of installed components6 of 6
 System Life Cycle 10
  OMB requirementThe percentage of systems that are in compliance with the OMB requirement for integrating security costs into the system life cycle     Comment: Need to be integrated, in case of data or hardware problems we will save some moneySystems with integrating security costs100%0 of 6
  Audit TrailsAudit Trails metrics quantify the percentage of systems on which audit trails provide a trace of user actions     Comment: 100% audit is possible now only for customer support employees, should consider to add a policy for other employeesSystems on which audit trails provide a trace of user actions90%3 of 4
 Personnel SecurityPersonnel Security metrics quantify the percentage of users with special access to systems who have undergone background evaluations. 20
  Security AwarenessSecurity Awareness metrics concern with the percentage of employees with significant security responsibilities who have received specialized training.     Comment: The latest training date is March, 2006Employees who have received specialized security training100%10 of 14
  Authentication and Authorize ProcessingAuthentication and Authorize Processing measurements     Comment: Most marketing materials are accessible without authorization, it's OK for our businessNon-public data that is accessible after authorization100%5 of 6
 Data IntegrityData Integrity metrics quantify the percentage of systems with automatic virus definition updates and automatic virus scanning and the percentage of systems that perform password policy verification 20
  Logical Access ControlsLogical Access Controls metrics concern with the number of users with access to security software that are not security administrators     Comment: We have about 20% of employees, it's a little more than it's really neededThe number of users with access to security software that are not security administrators10%8 of 4
  Anti-virus and spyware protectionThe number of systems protected with anti-virus, anti-spyware and firewall software     Comment: We have all computers with protection software installedThe number of systems protected with anti-virus, anti-spyware and firewall software100%10 of 16

 

This report was generated by Strategy2Act - balanced score card support program.

Find more report templates on www.strategy2act.com