🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Track Progress and Measure Success: KPIs and Reporting for ECC Roadmap Execution — Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-2

Practical guide to defining KPIs, implementing reporting, and measuring ECC roadmap progress to meet Compliance Framework Control 1-1-2 requirements.

April 23, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Control 1-1-2 of the Essential Cybersecurity Controls (ECC – 2 : 2024) under the Compliance Framework mandates that organizations not only build an ECC roadmap but also measure progress and success against it using consistent KPIs and evidence-based reporting—this post explains how to define those KPIs, collect the necessary data, build practical dashboards, and operationalize reporting so small and midsize organizations can demonstrate continual compliance and risk reduction.

Define KPIs that map to control objectives and evidence requirements

Start by mapping Control 1-1-2 objectives and your Compliance Framework evidence requirements to a small set (5–8) of KPIs. Each KPI should have a clear owner, data source, calculation method, target threshold and collection frequency. Practical KPI examples tied to ECC roadmap execution include: percentage of roadmap milestones implemented, percent of required controls with evidence uploaded, average time-to-remediate (TTR) security gaps, weekly vulnerability closure rate, and control maturity index (CMI) by control family. Define each KPI as a formula (e.g., % controls implemented = implemented_controls / total_controls * 100) and store that definition in your compliance register so auditors can trace the calculation back to the raw data.

Sample KPIs, formulas and data sources

Here are concrete KPIs and where to get the data: 1) Roadmap Completion (%) = COUNT(controls.status="Implemented") / COUNT(all roadmap items) * 100 — data from your project tracker (Jira/GitHub Projects/Google Sheet). 2) Evidence Coverage (%) = COUNT(controls.evidence_uploaded = TRUE) / COUNT(controls.in_scope) * 100 — data from the compliance repository (SharePoint, Confluence, or a simple folder structure indexed by script). 3) Mean Time To Remediate (days) = AVG(close_date - open_date for vulnerabilities) — data from ticketing/vulnerability scanner (e.g., OpenVAS, Nessus, Qualys) and ITSM (e.g., ServiceNow, Freshservice). 4) Vulnerability Remediation Rate (%) per month = (vulns_closed_last_30_days / vulns_opened_last_30_days) * 100 — track via scanner APIs and a cron job that stores daily snapshots. For small businesses, these data sources can be a mix of free scanners, ticketing CSV exports, and a central Google Sheet or lightweight database.

Implementation: tooling, automation and dashboards

Practical implementation for small organizations should emphasize automation and reproducibility. Use scanner APIs (OpenVAS/Nmap/OWASP ZAP) to export vulnerability counts nightly to a CSV or a small PostgreSQL database. Use your project tracker API (Jira/GitHub) to pull control implementation statuses and evidence links. A simple pipeline: cron job → API pulls → normalize fields (control_id, status, evidence_url, owner, timestamp) → write to DB → scheduled SQL queries to compute KPIs → push results to a dashboard (Grafana, Power BI, or Google Data Studio). Example SQL to compute roadmap completion: SELECT (SUM(CASE WHEN status='Implemented' THEN 1 ELSE 0 END)::float / COUNT(*)) * 100 AS roadmap_completion FROM controls WHERE control_family='ECC'; Automate exports and store raw exports with timestamps for audit trails.

Reporting cadence, audience and governance

Define reporting cadence tied to stakeholder needs: operational KPIs for the SOC/IT team weekly, program-level KPIs for the CISO monthly, and executive scorecards quarterly. Assign KPI owners and a RACI so there is no ambiguity about who validates the data and who presents it. Include thresholds and traffic-light rules (green/amber/red) and escalation paths when KPIs cross defined tolerances. For example, if Mean Time To Remediate exceeds 30 days for high-risk findings, automatically create an escalation ticket to the CISO and include the incident in the next board report.

Real-world small-business scenario: imagine a retail company of 40 employees with constrained budget and no SIEM. They can implement Control 1-1-2 by (1) creating a single Google Sheet as the canonical control register, (2) using OpenVAS weekly scans and exporting CSVs, (3) using Zapier or simple Python scripts to append scan results and ticket closures to the sheet, (4) building a Google Data Studio dashboard that reflects roadmap completion, vulnerability trends, and evidence coverage, and (5) scheduling a monthly 15-minute compliance review with the owner, IT lead and CEO to review the dashboard and update priorities. This approach provides auditable exports and a demonstrable pattern of measurement without heavy tooling costs.

Compliance tips and best practices: keep KPI definitions immutable—store them in a version-controlled document (Git or Confluence with version history). Retain raw exports for at least your audit retention period (commonly 1–3 years). Use consistent timestamps and timezone settings for automated pulls so trend lines align. Where possible, derive KPIs from machine-readable sources (APIs) rather than manual entry; if manual entry is necessary, require two-person verification for key fields (owner + approver) and log the approver and timestamp. Implement automated alerts when KPIs degrade and include links to supporting artifacts in every report to speed audit verification.

Risk of not implementing this requirement: without consistent KPIs and reporting, organizations lose visibility into roadmap health, fail to prioritize remediation effectively, and cannot provide auditors or senior leaders with objective evidence that controls are being implemented. This results in extended exposure to known vulnerabilities, potential regulatory penalties, failed audits, and poor allocation of scarce security resources. For small businesses, the most immediate risk is a preventable breach caused by an unaddressed high-severity vulnerability that was invisible due to poor measurement practices.

Summary — implementing Control 1-1-2 is about turning intention into measurable action: define clear, auditable KPIs that map to ECC controls, automate data collection from scanners, ticketing and project trackers, establish a reporting cadence with owners and escalation paths, and present evidence-backed dashboards to stakeholders. Even small organizations with minimal budgets can implement practical pipelines (API pulls + Google Sheets/Data Studio or simple DB + Grafana) to demonstrate progress, reduce risk, and satisfy Compliance Framework audit expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes