Most security programs have controls. Endpoint protection, identity management, vulnerability scanning, network monitoring. What they usually don't have is any systematic way to extract a risk signal from those controls and communicate it in terms that mean something to leadership.

Key Risk Indicators fill that gap. They're the measurements that tell you whether your controls are actually working: not whether they're installed and running, but whether they're reducing your exposure. A KRI program answers one question: given what my controls are reporting right now, how is our risk posture trending?

Start with the question you're answering

Before you pick a single KRI, decide what you're trying to communicate and to whom.

If your audience is the board, you need KRIs that connect to business outcomes. Not "mean time to patch" in isolation, but "unpatched critical vulnerabilities in the systems that process customer payment data." The risk has to be anchored to something that matters to the people in the room.

If your audience is your own team and operational leadership, you can go deeper and more technical. Detection coverage rates, authentication failure trends, policy exception counts: these are the signals that tell your security team where to focus.

Most programs need both layers, and the operational layer feeds the executive one. Design for that translation from the start.

The four categories every program needs

Exposure indicators

What percentage of your attack surface has adequate protection? Endpoint coverage rates, MFA enrollment, patch compliance on critical systems, network segmentation effectiveness. These tell you how well you've reduced your attackable surface.

Detection indicators

Is your monitoring catching what it should? Mean time to detect, alert coverage rate, log source completeness, and the ratio of tuned to untuned detections tell you whether your detection layer is functioning or just producing noise.

Response indicators

When something is found, how fast are you closing it? Mean time to remediate by severity, SLA compliance on critical vulnerabilities, and open exceptions by age tell you whether your response processes are working.

Posture trend indicators

Is your overall risk posture improving, degrading, or flat? These are composite signals: a risk score calculated across your domain-level KRIs, tracked quarter over quarter. The direction matters as much as the absolute value.

Picking your first KRIs

The most common mistake is starting with too many. Fifteen KRIs you don't have good data for is worse than five you can actually measure and trust. Start narrow.

For each KRI you're considering, ask three questions.

Can you get this data today from your existing controls?

If the answer is no, the KRI goes on a future list. Building a KRI program doesn't mean buying new tools. It means extracting signal from the tools you already have.

Does this KRI actually move?

A KRI that never changes isn't an indicator, it's a checkbox. KRIs need to be sensitive enough to catch real changes in your control environment. If your MFA enrollment has sat at 98% for 18 months and doesn't move, it isn't giving you useful signal. Track it less often or replace it with something that moves.

Does movement tell you something you can act on?

An indicator that goes amber and produces no clear next step isn't useful. The best KRIs are wired directly to a response. Endpoint coverage drops below 95% and someone owns the gap list. Mean time to remediate critical vulnerabilities crosses 14 days and a specific process is broken.

Setting thresholds

Thresholds define when a KRI moves from green to amber to red. Most programs either set arbitrary thresholds ("green is above 90%") or copy industry benchmarks without checking whether those benchmarks reflect their own risk appetite.

A better approach: set your initial thresholds based on what your controls actually produce today, then adjust for risk tolerance. If your current endpoint coverage is 94%, a green threshold of 95% puts you immediately in amber, which is fine if 94% genuinely represents elevated risk for your environment and misleading if it doesn't. Know why you're setting the threshold where you are.

Three factors should drive the values.

Your attack surface

A 6% endpoint coverage gap in a flat network where all systems are equivalent is different from a 6% gap that includes three executive machines with privileged access to your core systems. Thresholds need environmental context.

Your threat profile

Organizations with high-value data or regulated environments should set tighter thresholds. Opportunistic ransomware actors look for low-hanging fruit, so your thresholds for basic hygiene indicators should reflect that you are a target.

What you can actually remediate

A threshold you consistently miss isn't a useful signal. If 98% MFA enrollment is genuinely unachievable because of legacy systems, set your amber threshold at 95% and red at 90%, and document why. A KRI that's perpetually red for structural reasons you can't fix loses its signal value fast.

The measurement cadence

Not all KRIs need the same frequency. Some signals are best checked daily (active vulnerability counts on critical systems), some weekly (patch compliance, authentication anomalies), and some monthly (vendor risk posture, policy exception aging, access review completion).

The wrong approach is measuring everything monthly on a fixed schedule. A daily-frequency KRI checked monthly has low signal value. By the time you see the movement, you've missed the window to respond. Build your cadence around each signal's natural rate of change. Fast-moving indicators get checked frequently. Slower structural ones get reviewed on a longer cycle.

Documenting your definitions

Each KRI needs a definition document before it goes into production. It doesn't have to be long, but it has to answer what exactly is being measured (including the data source and how the value is calculated), what the thresholds are and why, who owns the KRI, what the response is when it goes amber or red, and how often it's measured and reviewed.

Without these definitions, KRI values are ambiguous. If your endpoint coverage rate is "percentage of active workstations running EDR" in Q1 and "percentage of all CMDB assets running EDR" in Q2, you aren't measuring the same thing. Define it precisely from the start.

Common failure modes

Measuring outputs instead of outcomes

"Number of patches applied this month" is an output. "Percentage of critical vulnerabilities remediated within SLA" is an outcome. The first tells you your team was busy. The second tells you whether your patching program is reducing risk.

Using the program as a report card

KRIs are for decision-making. If your monthly review produces a status report that goes to leadership and generates no action items, you're using it wrong. Every amber or red KRI should produce a next step, an owner, and a timeline.

Adding KRIs without retiring old ones

Programs accumulate. Run a review cycle, annually at minimum, where you ask whether each KRI is still earning its place. If a control matures to the point where its KRI consistently stays green without intervention, retire it or replace it with something harder.

Reporting without context

A single data point isn't a risk signal, it's just a number. KRIs only tell a story as a trend. A 94% endpoint coverage rate means different things depending on whether it was 91% last quarter (improving) or 97% (declining). Always report trend alongside the current value.

Connecting KRIs to financial exposure

The final step, and the one that makes your program genuinely board-ready, is connecting KRI movements to financial estimates.

This doesn't require a full quantification model for every KRI. It does require that, for your most significant risks, you've done enough analysis to say: when this KRI goes red, it increases our estimated exposure in this scenario by roughly this amount.

That connection is what turns a security operations tool into a business risk management tool. Without it, you're showing your board a dashboard. With it, you're showing them what their decisions actually cost.

The measurement layer, built for you.

Draxis extracts KRI values directly from your existing security controls, with no manual measurement and no spreadsheet maintenance. The AI expert panel maps your KRI signals to financial exposure and tracks posture trends continuously. When something changes, you know what it means for the business, not just for the dashboard.

See how Draxis builds your KRI program →