Compliance Metrics Catalogue
Search through our comprehensive library of KPIs and metrics designed by industry experts.
Want to know more about our policies and calculations?
Approved exceptions that are not past due (Primary KPI)
Percentage of open and approved policy exceptions that have not exceeded their due dates.
Breakdown of responses for completed campaigns
Breakdown of compliant and noncompliant user responses for the last six completed phishing campaigns.
Breakdown of responses for in progress campaigns
Breakdown of compliant versus noncompliant responses for in progress phishing campaigns.
Closed Vulnerabilities — Mean Time to Remediate
For Closed Vulnerabilities, mean time to remediate by Severity or other customer specified criteria.
Compliance by Category
Breakdown of compliance by product Category.
Compliance by Category
Breakdown of compliance by customer specified categories of privileged users, e.g., people with privileged access, service accounts with privileged access, privileged accounts not logged onto within 45 days, etc.
Compliance by Product
Breakdown of compliance by specific product.
Compliance by UAR type
The compliance percentage broken down by type of UAR, for example, reviews of privileged access, reviews of users of applications in scope for Sox, etc.
Configuration compliance by OS
Breakdown of compliance by Operating System.
Configuration compliance by device types
Breakdown of compliance by Device Type or Device Type Group. For example, policy exception compliance percentage for all laptops, or all end user devices.
Device Inventory Compliance
Percentage of devices that have complete information documented.
Devices Active on Non-CMDB Sources
Number of devices that are active on Non-CMDB sources but are not present in the CMDB.
Devices Missing Required Fields
Percent of devices that are missing required fields.
Devices compliant secure hardening baselines (Primary KPI)
Percentage of devices that have a customer-specified level of compliance with the customer’s secure configuration baseline.
Devices compliant with expected security tools (Primary KPI)
Percentage of devices that have the expected coverage for customer-configured security product categories, such as EDR or Zero Trust, where the product is active within a customer-specified time period, such as 7 days, and running the expected version.
Devices with No Activity
Number of devices that have no recorded activity on Non-CMDB sources but are shown as active within the CMDB.
Exceptions approaching due date
Breakdown of policy exceptions into the following groups:
- Exceptions that have more than 100 days until their due date.
- Exceptions that have less than or equal to 100 days and more than 50 days until their due date.
- Exception due in 50 days or less.
Exceptions by state and due date
A graph for each policy risk level (e.g., critical, high, medium) showing these three statuses:
- Open and not exceeded the due date (compliant, i.e., not past due)
- Open and exceeded the due date (open and noncompliant)
- Closed
Logins using MFA as required (Primary KPI)
The percentage of all logins where MFA was required per customer security policy and MFA was used.
MFA compliance by application
Compliant and noncompliant MFA logons by application.
Number of vulnerabilities opened or closed recently
Number of vulnerabilities opened and closed within the past 7, 14, or 30 days.
Open Vulnerabilities — Within or exceeded SLA
For Open Vulnerabilities, graphs showing breakdown of number of days until the SLA is reached, and number of days past due if SLA exceeded.
Phishing simulation responses compliant with organizational policy (Primary KPI)
Percentage of the total number of emails sent in the last six phishing campaigns with a compliant response (did not open, opened by did not take a noncompliant action, or opened and reported as a phishing email.
Privileged accounts compliant with PAM policy (Primary KPI)
Percentage of customer-designated privileged users that are onboarded and managed by the customer’s Privilege Access Management solution.
Required assessment compliance by vendor risk classification
Table showing assessment required for each vendor, and if they are up-to-date, and if any are past due.
- Shows one row for each vendor classification level (tier), and one column for each assessment type.
Required fields compliance in vendor inventory
Breakdown of required fields as specified by the customer in their security policy.
- Shows one row for each customer-configured rule that checks if a field in the third-party system of record has an expected value.
- Shows one column for each vendor classification level (tier).
Security Training by due dates
Breakdown of security training coming due (e.g., due in 30 days, due in 60 days), and training that is past due.
Security Training completed by due dates (Primary KPI)
Percentage of customer-configured security training that was completed by its assigned due date out of all assigned security training. There can be multiple training courses being reported per staff member.
Security training compliance by training course
Breakdown of training compliance by customer-configured security training courses.
Third-party vendors compliance with TPRM policies (Primary KPI)
Percentage of active third-parties that have all customer-specified required fields (e.g., owner, classification/tier, etc.) documented in the customer’s source of record and for which all necessary assessments are up to date.
UARs completed by due dates (Primary KPI)
Percentage of UARs out of the total number of required UARs that have been completed by their due date. This will be over a customer-specified period so that the customer can align the reported status with an audit cycle. E.g., if the customer has a six-month cycle for their SOC 2 audits, what is the compliance percentage for UARs over the six-month period.
User noncompliance with MFA
Users with the highest number of noncompliant MFA logons.
Vendors used by organization/department
Number of Vendors per Organization is a breakdown of which organizations within the customer’s enterprise make of or own the relationship with the vendor.
Vendors within customer's risk classification levels (i.e., tiers)
Graph showing the number of third parties in each of the customer’s classification levels (i.e., tiers), such as critical, high, medium, etc.
Vulnerabilities compliance with SLA (Primary KPI)
Percentage of vulnerabilities that have been remediated within the customer’s SLA (usually based on vulnerability Severity) or that are still open but within SLA. If the customer does not have an SLA for certain vulnerabilities, such as those with Low Severity, they are not included in this calculation.


