Ensuring repeatability is important when selecting an information security metric, but it is not the most important factor. Repeatable metrics provide consistent and reliable data, which is crucial for tracking progress over time and making comparisons. However, repeatability alone is not enough to ensure that the metric is useful and meaningful. Aligning the metric to the IT strategy and ensuring that it supports the overall objectives of the organization is more critical, as this will ensure that the metric provides relevant and valuable information that can be used to drive meaningful improvements in information security.
I respectfully disagree. A security metric should align to business strategy, but not every security metric need align to IT strategy. For example, security resource management (metric: cost per user for security services) is integral to business strategy but is not impacted by and does not impact IT strategy.
Answer is Repeatability.
Looks like a semi trick question, IT strategy is too narrow of a focus as CISSPST mentions. Metrics can be used for many things. However, without repeatability the metric is worthless.
B is the best answer because When an information security metric is "aligned to the IT strategy," it means that the metric directly reflects and supports the overall goals and objectives of the organization's IT strategy, ensuring that security efforts are focused on protecting the most critical business assets and aligning with the broader IT roadmap.
While IT strategy encompasses the broader implementation of technology within an organization to meet its goals, the security strategy specifically focuses on protecting the organization's information and technology assets from threats and vulnerabilities. Ideally, information security metrics should align with the security strategy, which in turn should be developed in alignment with both the IT strategy and the overarching business objectives.
Given the context of the available options and considering the importance of the security focus, the priority shifts to ensuring the metrics are not only aligned but also practical and actionable. Since "aligning to the security strategy" is not explicitly provided as an option, the focus should indeed revert to the fundamental qualities that make a metric useful for security purposes.
Thus, Option A. Ensuring the metric is repeatable becomes significant
B Metrics should be SMART Specific Measurable Attainable Relevant and Timely.. aligning the metric with your strategy makes it more relevant is the logic i used.
I would say A but AIO 2nd means B
A formal metrics program provides qualitative and quantitative data on the effective-
ness of many elements of an organization’s security program and operations. Metrics can
be developed via the SMART method: specific, measurable, attainable, relevant, and
timely. Metrics must align with the organization’s mission, strategy, and objectives. Some
metrics can be used to report on results in the recent past, but some metrics should serve
as leading indicators or drive a call to action by the leadership team
Strategic Alignment
For a security program to be successful, it must align with the organization’s mission,
strategy, goals, and objectives. A security program strategy and objectives should contain
statements that can be translated into key measurements—the program’s key perfor-
mance and risk metrics
B. Aligning the metric to the IT strategy
When selecting an information security metric, it is most important to align the metric with the overall IT strategy and business objectives. This ensures that the metric is relevant and meaningful in the context of the organization's goals. Metrics should be tied to specific objectives and key performance indicators (KPIs) that support the strategic direction of the organization.
When selecting an information security metric, the most important consideration is to ensure that the metric is repeatable.
A repeatable metric is one that can be consistently and reliably measured over time. It should be based on well-defined criteria, standardized measurement methods, and clear data collection processes. By having a repeatable metric, organizations can track and compare security performance consistently, identify trends, and measure progress towards security goals effectively.
When Metric is measure quantitatively, it simply mean it is measurable and can be evaluated and will help proper investment into information security
Selected Answer: D
The most important thing about metrics is that they are tracking what matters to the business. With this in mind (B) is the correct answer.
Rationale:
A. It is great to have consistency, but it doesn't matter if it doesn't track anything meaningful.
(C) and (D) are different ways of measuring things. One isn't better than the other, but again... they need to measure something meaningful which is (B).
When selecting an information security metric, it is MOST important to define the metric in quantitative terms (Option D). This means that the metric should be measurable and expressed in numerical values.
Quantitative metrics use numerical data to measure and report on specific aspects of information security, such as the number of incidents, the time taken to resolve an issue, or the percentage of systems that are compliant with security policies
CISM AIO 2nd - Security metrics are often used to observe technical IT security controls and processes and determine whether they are operating properly.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Broesweelies
Highly Voted 1 year, 9 months agoCISSPST
1 year, 1 month agoPerseus_68
1 year, 1 month agoangellorv
Highly Voted 6 months, 1 week ago5fd6335
Most Recent 6 days, 16 hours agograndMa
3 weeks, 4 days agoalifjouj
2 months, 2 weeks agohelg420
6 months, 1 week agoc041644
7 months, 1 week agoe891cd1
8 months, 4 weeks agosphenixfire
1 year, 2 months agosphenixfire
1 year, 2 months agooluchecpoint
1 year, 2 months agodrewl25
1 year, 3 months agoAz900500
1 year, 5 months agorichck102
1 year, 5 months agodark_3k03r
1 year, 6 months agoAbhey
1 year, 6 months agobambs
1 year, 7 months agodedfef
1 year, 7 months agoMSKid
2 years ago