SlideShare a Scribd company logo
Access Control
1. User Access Review Timeliness
2. Unauthorized Access Incidents
1. Delays in user access reviews
2. Instances of unauthorized access
Change Management
3. Change Request Handling Time
4. Failed Changes
3. Delays in handling change requests
4. Unsuccessful or unauthorized changes
IT Security Awareness
5. Employee Security Training
Completion
6. Policy Acknowledgment
5. Lack of awareness in security
6. Policy non-compliance by employees
IT Asset Management 7. Asset Inventory Accuracy
8. Unauthorized Asset Changes
7. Incomplete or inaccurate asset data
8. Unauthorized asset modifications
Security Patch
Management
9. Timeliness of Security Patching
10. Patch Compliance Rate
9. Delays in applying security patches
10. Low compliance with patching
Data Backup and
Recovery
11. Backup Completion Timeliness
12. Data Recovery Success Rate
11. Backup failures or delays
12. Ineffective data recovery
Incident Response 13. Incident Response Time
14. Incident Escalation Rate
13. Slow response to security incidents
14. Increased incidents due to delays
Vendor Risk
Management
15. Vendor Risk Assessment
Completion
16. Vendor Compliance Monitoring
15. Incomplete or skipped assessments
16. Vendor non-compliance incidents
Compliance with
Regulations
17. Regulatory Compliance
18. Audit Trail Accuracy
17. Non-compliance with IT regulations
18. Missing or tampered audit logs
Category KPIs KRIs
IT General Controls KPIs and KRIs
Evaluate the effectiveness and risks of IT general controls to ensure a secure and compliant IT
environment.

More Related Content

PPTX
Vulnerability Management KPIs and KRIs
PPTX
Data Privacy KPIs and KRIs
PPTX
GRC Program KPIs and KRIs
PPTX
Incident Response KPIs and KRIs
PPTX
Third-Party Vendor Risk Management KPIs and KRIs
PPTX
Asset Management KPIs and KRIs
PPTX
Operational Technology (OT) Facility KPIs and KRIs
PDF
Incident Management Powerpoint Presentation Slides
Vulnerability Management KPIs and KRIs
Data Privacy KPIs and KRIs
GRC Program KPIs and KRIs
Incident Response KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIs
Asset Management KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIs
Incident Management Powerpoint Presentation Slides

What's hot (20)

PPTX
SIEM KPIs and KRIs
PPTX
Cyber IAM KPIs and KRIs
PDF
IT Risk Management
PPTX
SOX Section 404 KPIs and KRIs
PPTX
GDPR Compliance KPIs and KRIs
PPTX
Threat Intelligence KPIs and KRIs
PDF
Incident Response
PPTX
It audit methodologies
PDF
Business Continuity Management
PPTX
Risk Assessment KPIs and KRIs:
PPTX
Risk Management
PPTX
SIEM in NIST Cyber Security Framework
PDF
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
PDF
IBM QRadar Security Intelligence Overview
PDF
Cissp combined notes
PPTX
Cissp- Security and Risk Management
PDF
Cybersecurity - Strategy, Policy and Practice
PDF
Cybersecurity risk management 101
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Iso 27001 awareness
SIEM KPIs and KRIs
Cyber IAM KPIs and KRIs
IT Risk Management
SOX Section 404 KPIs and KRIs
GDPR Compliance KPIs and KRIs
Threat Intelligence KPIs and KRIs
Incident Response
It audit methodologies
Business Continuity Management
Risk Assessment KPIs and KRIs:
Risk Management
SIEM in NIST Cyber Security Framework
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
IBM QRadar Security Intelligence Overview
Cissp combined notes
Cissp- Security and Risk Management
Cybersecurity - Strategy, Policy and Practice
Cybersecurity risk management 101
Cybersecurity roadmap : Global healthcare security architecture
Iso 27001 awareness
Ad

Similar to IT General Controls Key Performance Indicator & Key Risk Indicator (20)

PPTX
RMF KPIs and KRIs
PPTX
FedRAMP Compliance KPIs and KRIs
PDF
Effective Information Security Risk and Controls Management
PDF
Demonstrating Information Security Program Effectiveness
PPTX
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
PPT
Security administrator kpi
PDF
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
PPTX
Data Governance KPIs and KRIs
PDF
Dit yvol5iss38
PPT
Information security analyst kpi
PPTX
Security metrics
PDF
Dit yvol3iss33
PPTX
What are the key cybersecurity KPIs that businesses.pptx
PDF
Telindus cybersecurity survey_report_2019
PDF
Telindus cybersecurity survey_report_2019
PDF
Credit Union Cyber Security
PPTX
Cyber metrics for KPIs and KRIs to measure risks and highlight trends
PPT
Cs461 06.risk analysis (1)
PDF
011918 incident analytics_service_fact_sheet_rs
PDF
Information Security Benchmarking 2015
RMF KPIs and KRIs
FedRAMP Compliance KPIs and KRIs
Effective Information Security Risk and Controls Management
Demonstrating Information Security Program Effectiveness
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Security administrator kpi
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Data Governance KPIs and KRIs
Dit yvol5iss38
Information security analyst kpi
Security metrics
Dit yvol3iss33
What are the key cybersecurity KPIs that businesses.pptx
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019
Credit Union Cyber Security
Cyber metrics for KPIs and KRIs to measure risks and highlight trends
Cs461 06.risk analysis (1)
011918 incident analytics_service_fact_sheet_rs
Information Security Benchmarking 2015
Ad

More from Bim Akinfenwa (14)

PPTX
BCDR KPIs and KRIs
PPTX
Cloud Deployment KPIs and KRIs
PPTX
NERC-CIP Compliance KPIs and KRIs
PPTX
SDLC KPIs and KRIs
PPTX
Key metrics and process in cyber security case scenario
PPT
In Good company: 10 People who failed but Never Quit. You can WIN also!
PDF
5 Reasons Africa Cant be ignored
PPT
Future of wearable devices 2016
PPT
Our Aspiration for the Africa we want: Agenda 2063
PPT
5 Quotes to get over the lonely days
PPT
Project status one page
PPT
Epic content marketing strategy
PPT
Product Release Road-map Guide
PPT
Product user persona
BCDR KPIs and KRIs
Cloud Deployment KPIs and KRIs
NERC-CIP Compliance KPIs and KRIs
SDLC KPIs and KRIs
Key metrics and process in cyber security case scenario
In Good company: 10 People who failed but Never Quit. You can WIN also!
5 Reasons Africa Cant be ignored
Future of wearable devices 2016
Our Aspiration for the Africa we want: Agenda 2063
5 Quotes to get over the lonely days
Project status one page
Epic content marketing strategy
Product Release Road-map Guide
Product user persona

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A comparative analysis of optical character recognition models for extracting...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...

IT General Controls Key Performance Indicator & Key Risk Indicator

  • 1. Access Control 1. User Access Review Timeliness 2. Unauthorized Access Incidents 1. Delays in user access reviews 2. Instances of unauthorized access Change Management 3. Change Request Handling Time 4. Failed Changes 3. Delays in handling change requests 4. Unsuccessful or unauthorized changes IT Security Awareness 5. Employee Security Training Completion 6. Policy Acknowledgment 5. Lack of awareness in security 6. Policy non-compliance by employees IT Asset Management 7. Asset Inventory Accuracy 8. Unauthorized Asset Changes 7. Incomplete or inaccurate asset data 8. Unauthorized asset modifications Security Patch Management 9. Timeliness of Security Patching 10. Patch Compliance Rate 9. Delays in applying security patches 10. Low compliance with patching Data Backup and Recovery 11. Backup Completion Timeliness 12. Data Recovery Success Rate 11. Backup failures or delays 12. Ineffective data recovery Incident Response 13. Incident Response Time 14. Incident Escalation Rate 13. Slow response to security incidents 14. Increased incidents due to delays Vendor Risk Management 15. Vendor Risk Assessment Completion 16. Vendor Compliance Monitoring 15. Incomplete or skipped assessments 16. Vendor non-compliance incidents Compliance with Regulations 17. Regulatory Compliance 18. Audit Trail Accuracy 17. Non-compliance with IT regulations 18. Missing or tampered audit logs Category KPIs KRIs IT General Controls KPIs and KRIs Evaluate the effectiveness and risks of IT general controls to ensure a secure and compliant IT environment.