Measuring team effectiveness

SOC

Metric

Definition

Meaning

Mean Time to
Detection (MTTD)

Average time the SOC takes to
detect an incident.

How effective the SOC is at processing
important alerts and identifying real
incidents.

Mean Time to
Resolution (MTTR)

Average time that transpires
before the SOC takes action
and neutralizes the threat.

How effective the SOC is at gathering
relevant data, coordinating a response,
and taking action.

Total cases
per month

Number of security incidents
detected and processed by
the SOC.

How busy the security environment is and
the scale of action the SOC is managing.

Types of
cases

Number of incidents by type:
web attack, attrition (brute force
and destruction), email, loss
or theft of equipment, etc.

The main types of activity managed
by the SOC, and where preventative
security measures should be focused.

Analyst
productivity

Number of units processed per
analyst — alerts for Tier 1,
incidents for Tier 2, threats
discovered for Tier 3.

How effective analysts are at covering
maximum possible alerts and threats.

Case escalation
breakdown

Number of events that enter
the SIEM, alerts reported,
suspected incidents, confirmed
incidents, escalated incidents.

The effective capacity of the SOC at each
level and the workload expected for
different analyst groups.

SIRT

Metric

Definition

Meaning

Detection
success

Number of alerts by dept, team, site.

How effective the detection solution is.
If the SOC is not the greatest
source of alerts you have a problem.

Detection to
decision

The time it takes for activity
to be detected and processed
through the system to determine
if action is required.

How effective analysts, detection tools,
SIEM, etc. are.

Decision
speed

The time it takes to make a
decision: includes the time needed
to get all hands on deck.

Decisions are made on every alert and
are heavily influenced by the number of
alerts ahead in the queue and how much
additional research an analyst must conduct.

False positive
rates

The percentage of alerts that
upon investigation are revealed
to not be valid threats.

False positives can reduce a security team’s
confidence in its tools and draws attention
away from serious underlying problems.
False positive feedback loops are to be
included in the process, and the only thing
worse than a false positive is an overlooked
false negative.

Time to
mitigation/
containment

The time it takes to see a security
concern, identify the
impact, determine the course of
action and implement it.

These numbers can vary widely but over
time trends will appear, providing
useful insight about where you need to
invest for additional protection,
remediation and automation capabilities.

Resources


Last update: 2025-05-12 12:50