SlideShare a Scribd company logo
1 of 1
Access Control
1. User Access Review Timeliness
2. Unauthorized Access Incidents
1. Delays in user access reviews
2. Instances of unauthorized access
Change Management
3. Change Request Handling Time
4. Failed Changes
3. Delays in handling change requests
4. Unsuccessful or unauthorized changes
IT Security Awareness
5. Employee Security Training
Completion
6. Policy Acknowledgment
5. Lack of awareness in security
6. Policy non-compliance by employees
IT Asset Management 7. Asset Inventory Accuracy
8. Unauthorized Asset Changes
7. Incomplete or inaccurate asset data
8. Unauthorized asset modifications
Security Patch
Management
9. Timeliness of Security Patching
10. Patch Compliance Rate
9. Delays in applying security patches
10. Low compliance with patching
Data Backup and
Recovery
11. Backup Completion Timeliness
12. Data Recovery Success Rate
11. Backup failures or delays
12. Ineffective data recovery
Incident Response 13. Incident Response Time
14. Incident Escalation Rate
13. Slow response to security incidents
14. Increased incidents due to delays
Vendor Risk
Management
15. Vendor Risk Assessment
Completion
16. Vendor Compliance Monitoring
15. Incomplete or skipped assessments
16. Vendor non-compliance incidents
Compliance with
Regulations
17. Regulatory Compliance
18. Audit Trail Accuracy
17. Non-compliance with IT regulations
18. Missing or tampered audit logs
Category KPIs KRIs
IT General Controls KPIs and KRIs
Evaluate the effectiveness and risks of IT general controls to ensure a secure and compliant IT
environment.

More Related Content

What's hot

Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
Alan McSweeney
 

What's hot (20)

Introduction - Supplier governance
Introduction - Supplier governance Introduction - Supplier governance
Introduction - Supplier governance
 
Data Privacy KPIs and KRIs
Data Privacy KPIs and KRIsData Privacy KPIs and KRIs
Data Privacy KPIs and KRIs
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
Effective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesEffective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation Slides
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
 
Incident Management Best Practices
Incident Management Best PracticesIncident Management Best Practices
Incident Management Best Practices
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP)
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
 
Incident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesIncident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation Slides
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
 
Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Awareness iso 22301 danang suryo
Awareness iso 22301 danang suryoAwareness iso 22301 danang suryo
Awareness iso 22301 danang suryo
 
Incident and Problem management simplified
Incident and Problem management simplifiedIncident and Problem management simplified
Incident and Problem management simplified
 

Similar to IT General Controls Key Performance Indicator & Key Risk Indicator

Nebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setNebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this set
Faizan Khan
 
Predictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptxPredictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptx
rahulkuduthini
 

Similar to IT General Controls Key Performance Indicator & Key Risk Indicator (17)

RMF KPIs and KRIs
RMF KPIs and KRIsRMF KPIs and KRIs
RMF KPIs and KRIs
 
FedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsFedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIs
 
NERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsNERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIs
 
Operational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsOperational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIs
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIs
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIs
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIs
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIs
 
BCDR KPIs and KRIs
BCDR KPIs and KRIsBCDR KPIs and KRIs
BCDR KPIs and KRIs
 
Nebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setNebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this set
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
Breach response
Breach responseBreach response
Breach response
 
Data integrity challenges and solutions
Data integrity challenges and solutionsData integrity challenges and solutions
Data integrity challenges and solutions
 
Form p1005 policy on client file
Form p1005 policy on client fileForm p1005 policy on client file
Form p1005 policy on client file
 
Predictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptxPredictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptx
 
TGA presentation: Data Integrity - an international regulatory perspective
TGA presentation: Data Integrity - an international regulatory perspectiveTGA presentation: Data Integrity - an international regulatory perspective
TGA presentation: Data Integrity - an international regulatory perspective
 

More from Bim Akinfenwa

More from Bim Akinfenwa (13)

SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIs
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:
 
SDLC KPIs and KRIs
SDLC KPIs and KRIsSDLC KPIs and KRIs
SDLC KPIs and KRIs
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!
 
5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored
 
Future of wearable devices 2016
Future of wearable devices 2016Future of wearable devices 2016
Future of wearable devices 2016
 
Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063 Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063
 
5 Quotes to get over the lonely days
5 Quotes to get over the lonely days5 Quotes to get over the lonely days
5 Quotes to get over the lonely days
 
Project status one page
Project status one pageProject status one page
Project status one page
 
Epic content marketing strategy
Epic content marketing strategyEpic content marketing strategy
Epic content marketing strategy
 
Product Release Road-map Guide
Product Release Road-map GuideProduct Release Road-map Guide
Product Release Road-map Guide
 
Product user persona
Product user personaProduct user persona
Product user persona
 

Recently uploaded

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

IT General Controls Key Performance Indicator & Key Risk Indicator

  • 1. Access Control 1. User Access Review Timeliness 2. Unauthorized Access Incidents 1. Delays in user access reviews 2. Instances of unauthorized access Change Management 3. Change Request Handling Time 4. Failed Changes 3. Delays in handling change requests 4. Unsuccessful or unauthorized changes IT Security Awareness 5. Employee Security Training Completion 6. Policy Acknowledgment 5. Lack of awareness in security 6. Policy non-compliance by employees IT Asset Management 7. Asset Inventory Accuracy 8. Unauthorized Asset Changes 7. Incomplete or inaccurate asset data 8. Unauthorized asset modifications Security Patch Management 9. Timeliness of Security Patching 10. Patch Compliance Rate 9. Delays in applying security patches 10. Low compliance with patching Data Backup and Recovery 11. Backup Completion Timeliness 12. Data Recovery Success Rate 11. Backup failures or delays 12. Ineffective data recovery Incident Response 13. Incident Response Time 14. Incident Escalation Rate 13. Slow response to security incidents 14. Increased incidents due to delays Vendor Risk Management 15. Vendor Risk Assessment Completion 16. Vendor Compliance Monitoring 15. Incomplete or skipped assessments 16. Vendor non-compliance incidents Compliance with Regulations 17. Regulatory Compliance 18. Audit Trail Accuracy 17. Non-compliance with IT regulations 18. Missing or tampered audit logs Category KPIs KRIs IT General Controls KPIs and KRIs Evaluate the effectiveness and risks of IT general controls to ensure a secure and compliant IT environment.