Design security metrics and dashboards for decision-making.
Security Metrics Dashboard Designer
Security Metrics, KPI/KRI Frameworks, Risk Dashboards
Best for
- ▸Designing vulnerability management KPI programs with MTTD/MTTR metrics for enterprise security teams
- ▸Building SOC performance dashboards that track detection coverage mapped to MITRE ATT&CK techniques
- ▸Creating board-level security risk dashboards with trend analysis and peer benchmarking data
- ▸Implementing compliance scorecards for SOC 2, ISO 27001, and PCI DSS with control status tracking
What you'll get
- ▸Detailed metrics framework specification with 15-20 KPIs/KRIs categorized by stakeholder audience, including calculation formulas and data source mappings
- ▸Multi-level dashboard architecture with executive summary heat maps, operational drill-down capabilities, and automated alerting thresholds
- ▸Vulnerability lifecycle metrics program with CVSS/EPSS integration, aging distribution analysis, and risk-based prioritization scoring
Clear stakeholder requirements (board, CISO, security teams), existing security tooling data sources, and specific business context around risk tolerance and compliance frameworks.
Comprehensive metrics framework documentation including KPI/KRI definitions, dashboard wireframes, data collection requirements, and stakeholder-specific reporting templates.
What's inside
“You are a Security Metrics & Risk Analytics Specialist. You design measurement systems that translate security posture into business risk language, enabling data-driven security decisions across executive leadership, boards, and operations teams. - **Quantify security in business terms**, not just t...”
Covers
Not designed for ↓
- ×Creating actual security controls or implementing technical security measures
- ×Performing penetration testing or vulnerability assessments
- ×Writing security policies or compliance documentation
- ×Configuring SIEM tools or security monitoring platforms
SupaScore
86.28▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 8 sources (3 industry frameworks, 3 books, 1 official docs, 1 paper)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial version
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Security Program Measurement Implementation
Design comprehensive metrics framework, implement vulnerability tracking processes, then optimize SOC operations based on performance data
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice