🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use Metrics and KPIs to Drive Periodic Reviews of Your Cybersecurity Awareness Program — Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-5

Practical guidance on defining, collecting, and using metrics and KPIs to run compliant periodic reviews of your cybersecurity awareness program under ECC 2:2024 Control 1-10-5.

March 29, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Periodic reviews of a cybersecurity awareness program are only useful if they are driven by clear, measurable metrics and KPIs; under the Compliance Framework and ECC – 2 : 2024 Control 1-10-5, you must collect, analyze, and document evidence that the program is effective and improving organizational security posture.

Why KPIs matter for ECC 2:2024 Control 1-10-5

The Compliance Framework expects documented, repeatable review processes — not just ad-hoc training events. KPIs translate program activities into evidence: they show leadership whether the training reduces risky behavior (leading indicators) and whether that reduction correlates to fewer security incidents (lagging indicators). For compliance auditors, a dashboard of properly defined KPIs and a record of periodic reviews demonstrate you meet the control requirement.

Core metrics and KPIs to track (practical list)

Start with a compact set of measurable KPIs tied directly to Control 1-10-5 objectives. Useful KPIs include: phishing simulation click-through rate (CTR) and click-to-report ratio; training completion rate by target date; average assessment score for core modules; time-to-corrective-action for policy violations; repeat-offender percentage; security incident rate attributable to human error; percentage of privileged users who completed role-based training. For each KPI define formula, data source, and acceptable threshold (example KPI formulas below).

Example KPI formulas and data sources

Make formulas explicit so auditors and reviewers can reproduce results. Example formulas: - Phishing CTR = (number of simulated phishing clicks / number of simulated phishing messages delivered) * 100. - Reporting Rate = (number of phishing reports / number of simulated phishing messages) * 100. - Training Completion = (users who completed required module by due date / users assigned) * 100. Data sources: LMS export (CSV/SCORM), phishing platform reports (e.g., KnowBe4), SIEM/Email gateway logs, HR/AD for active employee lists. A small org can implement with CSV exports and Power BI/Google Sheets; larger orgs should integrate via APIs to a GRC or SIEM for automation.

Implementation steps for small businesses (actionable)

1) Map required evidence: list what Control 1-10-5 requires (periodic reviews, documented outcomes) and map each requirement to 1–2 KPIs. 2) Choose tools: LMS + phishing simulation + simple dashboard (Google Sheets/Power BI/Grafana). 3) Instrument data collection: schedule weekly exports or use APIs; for example pull phishing results via platform API (JSON), store in a small database or CSV, and use a script to compute KPIs. 4) Baseline and targets: run three months of data to establish baselines (e.g., baseline phishing CTR = 15%), then set realistic targets (reduce CTR to <7% in 12 months). 5) Schedule periodic review meetings (quarterly recommended for small businesses), attach KPI reports, minutes, and action tracker to your compliance evidence folder.

Technical detail: automating a KPI

Small businesses can automate the phishing CTR calculation with a simple SQL or spreadsheet query. Example SQL (pseudocode) against a phishing_results table: SELECT campaign_id, SUM(CASE WHEN action='click' THEN 1 ELSE 0 END) * 100.0 / COUNT(*) AS phishing_ctr FROM phishing_results WHERE delivery_date BETWEEN '2026-01-01' AND '2026-03-31' GROUP BY campaign_id; Schedule a nightly cron job to run ETL, refresh the dashboard, and archive raw data for audit retention (keep 12–24 months depending on Compliance Framework retention policy).

Real-world scenario for a small business (50 employees)

Acme Consulting (50 employees) implements quarterly phishing simulations and monthly micro-training. Baseline after 3 months: phishing CTR = 18%, reporting rate = 8%, training completion by due date = 65%. They set targets: CTR < 5% within 12 months, reporting rate > 40%, and training completion > 90%. Remediation workflow: anyone who clicks is assigned a 15-minute remedial micro-course and scheduled for a follow-up simulation within 60 days. During quarterly reviews the security owner presents KPI trends, root-cause analysis for persistent clickers (role-based issues, new hires), and a documented plan (evidence for Control 1-10-5). Auditors requested the dashboard PDF, LMS completion reports, and meeting minutes — all provided from the documented process.

Compliance tips, best practices, and risks of non-implementation

Compliance tips: start with a small, defensible set of KPIs; use both leading (training completion, simulated behavior) and lagging (incident rate) indicators; document KPI definitions, data sources, retention, and the review cadence in the Compliance Framework evidence library. Best practices include tying KPIs to business risk (e.g., exposure of privileged accounts), involving HR to address repeat offenders, and keeping raw logs for audit (signed export files, hashed backups). Risks of not implementing: failing Control 1-10-5 can lead to failed audits, inability to prove program effectiveness after an incident, higher likelihood of successful phishing attacks, regulatory penalties, and erosion of customer trust.

In summary, to satisfy ECC – 2 : 2024 Control 1-10-5 you must treat metrics and KPIs as the backbone of your periodic reviews: define clear KPIs, automate collection where possible, baseline and set targets, run documented periodic reviews with stakeholders, and retain the artifacts auditors will request. For small businesses, simple tooling and a disciplined cadence will provide strong, auditable evidence that your security awareness program is effective and improving organizational resilience.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes