✏️ Manual Metrics Editor

ℹ️ Note: Use this page to manually update metrics that cannot be automatically fetched. Empty fields will use automated values if available. Your changes will be reflected on the dashboard immediately.
🎯 Information Security Maturity Model
-
Average Score
0
Optimizing (5)
0
Need Attention (0-2)
0: Incomplete
1: Performed
2: Managed
3: Established
4: Predictable
5: Optimizing
📋
Information Security Policies
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🏢
Organisation of Information Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
💼
Asset Management
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🤝
Supplier Relationships
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
Compliance
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🔐
Access Control
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
⚙️
Operational Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
📡
Communications Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🔧
System Acquisition, Development and Maintenance
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🚨
Information Security Incident Management
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🛡️
AppSec Compliance & Governance Metrics
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing

📝 Maturity Level Descriptions

Customize the descriptions shown in the dashboard legend for each maturity level.

📅 Historical Maturity Data
ℹ️ Historical Phases: Enter historical maturity levels for trend analysis. These will be displayed as additional layers on the radar chart.
📊 2023 Maturity Levels
📋
Information Security Policies
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🏢
Organisation of Information Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
💼
Asset Management
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🤝
Supplier Relationships
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
Compliance
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🔐
Access Control
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
⚙️
Operational Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
📡
Communications Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🔧
System Acquisition, Development and Maintenance
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🚨
Information Security Incident Management
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🛡️
AppSec Compliance & Governance Metrics
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
📊 2024 Maturity Levels
📋
Information Security Policies
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🏢
Organisation of Information Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
💼
Asset Management
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🤝
Supplier Relationships
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
Compliance
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🔐
Access Control
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
⚙️
Operational Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
📡
Communications Security
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🔧
System Acquisition, Development and Maintenance
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🚨
Information Security Incident Management
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
🛡️
AppSec Compliance & Governance Metrics
0
Incomplete
1
Performed
2
Managed
3
Established
4
Predictable
5
Optimizing
📊 Key Metrics
🛡️ Security Incidents
Incidents registered in last 6 months
🔒 Anti-Virus Coverage
Percentage (%)
Protected users
Total users
⚠️ Critical Vulnerabilities (AWS)
Total issues
Remediated issues
🌐 Microsoft Security Stats

Data fetched automatically from Jira (SEC-3417 children). Add description/link below:

💻 CORP Asset Management

Override API values from Drata. Leave empty to use automatic values.

Leave total empty to show 100% progress

Overall device compliance percentage

🔐 Operational Security

Percentage of devices with disk encryption enabled

Percentage of users with MFA enabled

Percentage of devices with automatic updates enabled

Overall security compliance score

Percentage of users actively using 1Password

Percentage of user devices covered by Admin by Request

Number of whitelisted/approved applications

Number of phishing emails reported by users last quarter

Number of phishing emails blocked by email protection last quarter

Total phishing emails received (blocked + not blocked) last quarter

Number of open vulnerabilities in production environment

Number of open vulnerabilities in corporate environment

Number of devices enrolled in MDM

📊 Vendor Management

Total number of vendors

Vendors with ACTIVE status

Vendors with APPROVED status

Vendors currently under review

Vendors with CRITICAL impact level

Vendors with MAJOR impact level

Vendors with MODERATE impact level

Vendors using SSO authentication

Vendors not using SSO authentication

🔒 Application Security Maturity

Score threshold is 79. Enter score (0-100), risk level (Low/Medium/High/Critical), and alignment percentage for each product.

📋 Exception Management

Active exception issues tracked in Jira

Manual count of exceptions per team (enter numbers)

Overall vendor status overview

Distribution of vendor impact levels

SSO vs Non-SSO authentication distribution

🎫 Issue Management

Active issues tracked in Jira SECIMT project

Issues with Critical priority

Issues with High priority

Issues assigned to PROD team member

Issues assigned to CORP team member

Upload an Excel file with monthly issue counts for Identification, Analysis, Remediation, and Closure stages

Expected format: Column A = Month names (May, Jun, Jul, Aug, Sep, Oct, Nov)
Columns B-E = Identification, Analysis, Remediation, Closure (numbers)

🤝 Customer Trust

Metrics showing customer trust in our security work - deals influenced by security

Total ARR from deals influenced by security (e.g., "$2.5M")

List of top 5 customers with security-influenced deals (one per line)

List of top 3 products involved in security-influenced deals (one per line)

Number of security escalations year-to-date

Number of visits to the Trust Center page

ARR supported year to date (e.g., "$1.2M")

Names of customers contributing to ARR supported

Most common request types

CoPilot usage - sessions in last 90 days

📋 Customer Requests

Metrics for the right column of Customer Trust section

Total new customer requests year to date

List of new audit requests from SECCOM year to date (one per line)

Customer downloads of compliance documents from Trust Center

🔐 SECCOM Requests (AUTO)

These metrics are automatically fetched from Jira SECCOM project

Description for open SECCOM requests metric

Description for cumulative SECCOM requests

Description for quarterly SECCOM requests

Description for ageing SECCOM requests