Measure up: Modern KPIs for SOCs

Without metrics in place, many SOCs end up purely compliance-driven initiatives.

FacebookTwitterLinkedIn
Measure up: Modern KPIs for SOCs

Amid the increase in volume and sophistication of cyber-attacks and the deepening cybersecurity skills deficit, many enterprises are turning to managed security service providers (MSSPs) who can provide them with access to state-of-the-art Security Operations Centres (SOC) and the cybersecurity expertise that they need.

In principle, a SOC provides a holistic view of all security-related information and insights and is equipped with the tools, expertise and methodologies to detect and respond to cyber threats more effectively. However, enterprises will need to have relevant and actionable key performance indicators (KPIs) in place to ensure that it is really delivering on these promises.

In developing these KPIs, a good starting point would be to identify and prioritise the security operations goals of the organisation, and then to develop indicators to measure how well these goals are being met. Some examples of KPIs for cybersecurity include:

Number of reported incidents

It is important to keep track of the number of reported security incidents, and also to analyse them in terms of the number of large incidents that could have a huge financial impact on the organisation, and small incidents that could potentially be a malicious preamble to a full-fledged attack. Tracking the increase or decrease in the number of security incidents will enable a SOC to take the appropriate actions to improve the cybersecurity profile of the organisation.

Number of systems with known vulnerabilities

A SOC should be able to identify and report on the number of systems with known vulnerabilities, and to manage updates and patches to ensure that they are not exploited by threat actors.

The ultimate reference guide to cybersecurity threats

Time from detection to containment to eradication

Time is of the essence when dealing with a cybersecurity threat. With the stealthy approach taken by many advanced persistent threats which may remain hidden with the enterprise network while carrying out malicious activities, it is important to monitor the Mean-Time-to-Detect and also the Mean-Time-to-Respond so that steps can be taken to improve on these indicators to minimise the fallout from a security breach.

Number of days to deactivate former employee credentials

The longer a former employee’s credentials remain active, the higher the risk of information being leaked and systems compromised, especially if it is a disgruntled staff. This metric helps gauge how closely IT works with the human resource department to ensure that access rights are cancelled immediately.

Number of users with "super user" access level

“Super users” are a prime target of hackers as their credentials are the keys to the kingdom, so to speak. It is important, therefore, to track and manage the number of “super users” and block administrator rights where they do not make sense.

Frequency of review of third-party access

Over the course of a project, enterprises often provide vendors or business partners with access to their systems and networks. It is important to constantly review who is being granted access, the level of access, and if any critical enterprise systems are involved, to ensure that access that is no longer needed is cancelled. It will also help in threat mitigation if a compromise of the partner’s systems has a potential impact on the enterprise.

While these are some important indicators, it is important to remember that the KPIs for a SOC will vary depending on the needs and priorities of the enterprise. Even organisations that lack an SOC can benefit from setting KPIs to internal security plans as they evolve and scale their security infrastructure or outsource operations to a managed security services provider.

Bolstering Defence with Singtel's Next-Gen Advanced SOC

As the cybersecurity landscape evolves, it is also important for KPIs to evolve with it to remain relevant. Ultimately, the indicators will have to provide information that is relevant and actionable, so that the enterprise can put in place the right measures to enhance the overall security posture of the organisation.

Speak to us to find out how to develop meaningful KPIs.

You may also like

Bridging the cyber talent gap: Why training matters as much as hiringShare
Apr 2025 | -
cyber security
Bridging the cyber talent gap
Singapore is tackling the cyber talent shortage by creating new ways for people to enter and grow in the field—no tech background needed. With industry-led training and support from key industry players, these programmes focus on real-world skills and practical readiness, helping build a stronger, more resilient cyber security workforce for the nation’s digital future.
Shield against cyber scams through preparedness programmeShare
Mar 2025 | -
cyber security
Shield against cyber scams through preparedness programme
Cyber scams are evolving, exploiting both technology and human psychology, making cyber security training essential for organisations. Frost & Sullivan explores how Singtel’s CSI offers a comprehensive Cyber Scam Preparedness programme, emphasising shared responsibility and victim empathy to equip frontline employees as the first line of defence against cyber threats.
Organisations with managed connectivity and cloud-delivered SSEShare
Mar 2025 | -
cyber security
Securing organisations with managed connectivity and SSE
This infobrief explores how managed connectivity and cloud-delivered Secure Service Edge (SSE) can protect IoT and mobile-enabled organisations, highlighting the importance of robust security solutions to safeguard devices, data, and networks in an increasingly connected world.