1. ISACA
CISM Review Manual
15th Edition. Domain 2: Information Risk Management
Section 2.4
"Information Risk Monitoring and Reporting" (p. 98)
emphasizes that risk monitoring activities
such as vulnerability scanning
must be reported to senior management to ensure they are aware of the organization's risk posture. Key Risk Indicators (KRIs) are identified as a primary tool for this reporting
translating technical findings into metrics that indicate the level of risk exposure.
2. National Institute of Standards and Technology (NIST) Special Publication (SP) 800-55 Rev. 1
Performance Measurement Guide for Information Security. Section 2.3
"Audiences for Measures
" states that senior management requires high-level reports to understand the effectiveness of the security program and the level of risk to the organization's mission. This supports using structured metrics (Answer A) to communicate the business impact of vulnerabilities rather than just reporting their existence.
3. Fenz
S.
& Ekelhart
A. (2011). Formalizing Information Security Knowledge. In Proceedings of the 44th Hawaii International Conference on System Sciences. (p. 4). This publication discusses the need for formal models to communicate security-related information. It implicitly supports the use of structured metrics
stating
"A major challenge is to provide the right information at the right time in the right format to the right person
" which is the goal of metrics-based reporting to senior management. DOI: 10.1109/HICSS.2011.138