Designing Metrics That Deliver: How SABSA Transforms Metrics Programmes

Rob Campbell
4 min readDec 24, 2024

--

Building an effective cybersecurity metrics programme requires more than just tracking numbers — it demands a strategic approach that connects metrics to business outcomes, risk management, and operational performance. In my previous article, “Building an Effective Metrics Programme: A Strategic Roadmap for Cybersecurity Professionals,” we explored the foundational principles for metrics programme success. This article takes the conversation to the next level, focusing on how the SABSA framework empowers organisations to design and deliver those outcomes.

Revisiting the Metrics Challenge

Effective metrics programmes are built on three pillars: relevance, alignment, and actionability. Metrics must resonate with stakeholders, align with business objectives, and drive decisions. However, many organisations struggle to achieve this. Metrics often remain disconnected from strategic goals, overly technical, or difficult to interpret.

SABSA offers a proven methodology to overcome these challenges. By embedding metrics design into its layered framework, SABSA ensures that security initiatives are meaningful, measurable, and strategically aligned.

Using SABSA to Build Metrics Programmes

SABSA structures security architecture across six layers, each addressing specific stakeholder concerns and organisational needs. Let’s explore how these layers contribute to building an effective metrics programme.

1. Establishing Strategic Relevance (Contextual Layer)

Purpose: The Contextual layer defines the “why” of the metrics program. It captures business drivers, goals, and risk appetites that shape the overall security strategy.

How to Use SABSA:

  • Collaborate with SMTs to identify core business drivers, such as revenue growth, regulatory compliance, or customer satisfaction.
  • Map these drivers to security objectives and establish Key Risk Indicators (KRIs) to measure risk exposure.

Example:

  • Business Driver: Protect customer data to maintain trust.
  • KRI: Number of customer data breach incidents.
  • Outcome: Demonstrates alignment between security measures and brand reputation.

By starting with the Contextual layer, organisations anchor metrics in the business priorities that matter most to stakeholders.

2. Linking Metrics to Business Functions (Conceptual Layer)

Purpose: The Conceptual layer models the organisation’s business domains, processes, and security attributes. It identifies the stakeholders responsible for key outcomes and links metrics to their priorities.

How to Use SABSA:

  • Define business and security attributes for each domain (e.g., confidentiality, integrity, availability).
  • Tailor metrics to the specific concerns of stakeholders, such as CEOs, CFOs, or CISOs.

Example:

  • Domain: eCommerce platform.
  • CEO Concern: Availability for revenue generation.
  • Metric: Uptime percentage of eCommerce platform (KPI).

The Conceptual layer ensures metrics are relevant to the people responsible for driving organisational success.

3. Designing Control Effectiveness Metrics (Logical Layer)

Purpose: The Logical layer translates high-level goals into actionable control objectives, processes, and requirements. Metrics at this layer validate whether controls are working as intended.

How to Use SABSA:

  • Define control objectives and map them to specific KCIs (Key Control Indicators).
  • Use process models to identify workflow steps that require measurement.

Example:

  • Control Objective: Encrypt sensitive data.
  • KCI: Percentage of systems with encryption enabled.
  • Process Metric: Time to deploy encryption updates across all systems.

Logical-layer metrics provide actionable insights into the performance and effectiveness of security controls.

4. Operationalising Metrics (Physical and Component Layers)

Purpose: The Physical and Component layers focus on implementing technical controls, mechanisms, and configurations. Metrics here provide granular insights into system performance and vulnerabilities.

How to Use SABSA:

  • Identify technical controls (e.g., anti-malware, identity access management).
  • Develop metrics that assess their operational effectiveness.

Example:

  • Physical Layer Metric: Percentage of endpoints with updated anti-malware signatures.
  • Component Layer Metric: Malware detection rate by endpoint.

Metrics at these layers are critical for feeding higher-level insights and identifying operational gaps.

5. Governing and Scaling the Metrics Programme (Management Layer)

Purpose: The Management layer provides oversight, ensuring that metrics are governed, reviewed, and continuously refined.

How to Use SABSA:

  • Establish clear governance structures for metrics, including roles, responsibilities, and review processes.
  • Define thresholds and targets for metrics to ensure alignment with risk appetites.

Example:

  • Governance Metric: Percentage of risks with treatment plans (KPI).
  • Review Metric: Policy compliance rates across departments.

The Management layer ensures that the metrics programme is sustainable, scalable, and adaptable to evolving business needs.

From Theory to Practice: A SABSA Metrics Case Study

Imagine a retailer facing challenges in protecting customer data, maintaining eCommerce uptime, and ensuring compliance. Using SABSA, the organisation develops a metrics programme that:

  1. Aligns KRIs with business risks like downtime and data breaches.
  2. Tracks KCIs for controls such as anti-malware and encryption.
  3. Monitors KPIs for operational performance, such as incident response times.

This layered approach provides a comprehensive view of the retailer’s security posture while delivering actionable insights to stakeholders.

Key Takeaways: How SABSA Delivers Metrics Outcomes

  1. Relevance: SABSA starts with business drivers and tailors metrics to stakeholder concerns, ensuring metrics are meaningful.
  2. Alignment: By mapping metrics across its architecture layers, SABSA provides traceability from strategic objectives to technical measures.
  3. Actionability: SABSA integrates governance and review processes, ensuring metrics inform decisions and drive continuous improvement.

Getting Started with SABSA-Driven Metrics

To implement SABSA for metrics:

  1. Engage Stakeholders: Collaborate with SMTs and architects to define business drivers and risk appetites.
  2. Develop Layered Metrics: Use SABSA’s layers to create KRIs, KCIs, and KPIs that align with organisational goals.
  3. Start Small: Pilot the approach in a single domain, such as anti-malware or identity management.
  4. Leverage Automation: Use tools to streamline metrics collection, analysis, and visualisation.
  5. Refine and Expand: Continuously evaluate metrics effectiveness and scale the programme incrementally.

Final Thoughts: Metrics That Matter

SABSA provides a powerful framework for designing and delivering metrics programmes that are relevant, aligned, and actionable. By embedding metrics into its architecture, SABSA ensures that security efforts are measurable, impactful, and business-aligned.

In the evolving cybersecurity landscape, organisations cannot afford to rely on disconnected or superficial metrics. SABSA offers the roadmap to create metrics that truly matter — metrics that demonstrate security’s value, support informed decision-making, and drive strategic outcomes.

Read the foundational article “Building an Effective Metrics Programme: A Strategic Roadmap for Cybersecurity Professionals” for more context.

--

--

Rob Campbell
Rob Campbell

Written by Rob Campbell

Enterprise Security Architect with 30+ years’ experience, aligning security with business goals through strategy, architecture, and SABSA-driven solutions.

No responses yet