Metrics Catalog

Define the numbers before they become decisions.

Use this catalog to decide which vulnerability operations metrics are useful, where they should come from, and how to avoid misleading dashboards.

Metrics rule: a metric is only useful when it has a clear owner, source, interpretation, review cadence, and action threshold. Counts without context can create noise faster than clarity.

Data DictionaryMethodology

Decision

Actionablemetric changes should trigger a next step

Source

Nameddata origin and freshness are visible

Owner

Accountableone role reviews and explains it

Caveat

Explicitlimits and blind spots are documented

The numbers worth tracking by workflow

Open Analytics

Triage pressure

What needs attention?

Track urgent items, KEV-linked items, exploited candidates, public PoC items, ransomware-relevant pressure, and new-since-last-review volume.

Defenders TodayUrgent Week

Patch execution

Can work move?

Track patch-ready items, owner assignment, target dates, blocked changes, fixed-version availability, rollback readiness, and overdue windows.

Patch WindowPatch Ops

Exposure fit

Does this affect us?

Track internet-facing, unauthenticated, edge appliance, identity, cloud, OT, and business-critical exposure indicators separately from severity.

Exposure OpsAttack Surface

Exception risk

What remains accepted or delayed?

Track no-patch items, approved exceptions, expired reviews, compensating-control coverage, residual risk, and trigger-based re-review events.

Exception Register

Detection readiness

Can SOC see enough?

Track hunt-ready items, telemetry gaps, IOC availability, rule drafts, high-noise detections, and follow-up owner assignment.

Detection ReadinessDetection Pack

Trust and freshness

Can we rely on the view?

Track source freshness, source confidence, disputed/rejected records, unavailable data, stale pages, and live-derived assumptions.

StatusTrust Review

Use metrics that create action, not anxiety

Patchable urgent items with owners

Better than raw critical count. It answers whether urgent work can actually move and who owns the next action.

Exposed high-risk items without a fix

Better than no-patch count alone. It combines exposure, fix availability, and compensating-control urgency.

Exceptions expiring this week

Better than total accepted risk. It prevents old decisions from becoming invisible permanent risk.

Evidence-complete versus evidence-missing

Better than ticket volume. It shows whether analysts have enough proof to make safe decisions.

Source freshness by decision page

Better than global uptime. It shows whether the specific page being used for a decision is current enough.

Detection coverage for exploited pressure

Better than rules written. It shows whether the SOC has visibility for the items most likely to matter.

Numbers that often mislead vulnerability programs

Open Methodology

Critical count without exposure

A high CVSS score does not mean the affected asset is reachable, used, exploitable, or business-critical.

Patch SLA without exception context

A missed SLA may be a real failure, or it may reflect a documented no-patch case with compensating controls.

Vendor volume without normalization

Large vendors can dominate counts because of disclosure volume, product breadth, or source coverage.

Exploit signal without confidence

Public PoC, exploit chatter, KEV status, and confirmed exploitation are different signals and should not be merged blindly.

Detection count without telemetry

A rule is not coverage if the needed logs, fields, or retention do not exist in the environment.

Green status without freshness

A page can render successfully while the upstream data behind it is stale, incomplete, or filtered empty.

Who should review which metric and when

Daily

Triage lead

Review urgent pressure, KEV, public PoC, exploited candidates, new blockers, and stale source warnings.

Weekly

Patch and risk owners

Review patch windows, blocked remediation, expiring exceptions, owner gaps, and no-patch mitigation status.

Weekly

SOC lead

Review detection readiness for exploited, ransomware-relevant, identity, edge, and public-PoC items.

Monthly

Program owner

Review maturity, evidence completeness, recurring vendor pressure, dashboard trust, and one improvement objective.