COMPASS

COMPASS: COMPASS stands for "Compliance Oversight and Monitoring for Proactive Application Security Status." and represents the key elements of compliance status in the context of application security. It emphasizes the need for oversight and proactive monitoring to ensure compliance with security standards and regulations. It highlights the importance of maintaining a vigilant approach to assess and manage the security status of applications in alignment with compliance requirements.

Compliance status for application security refers to the degree to which an organization's applications and related security practices align with relevant security standards, regulations, and industry best practices. It involves assessing and maintaining adherence to specific requirements aimed at safeguarding the confidentiality, integrity, and availability of applications and associated data. Here are the key aspects of compliance status for application security:

  1. Security Standards and Regulations: Compliance status involves evaluating whether applications meet the requirements set forth by applicable security standards and regulations. Examples include the Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and ISO 27001. Compliance status ensures that applications meet the specific security controls and practices mandated by these standards and regulations.

  2. Security Policy Compliance: Compliance status includes assessing whether applications adhere to the organization's internal security policies and guidelines. These policies define the security requirements and practices expected within the organization and may cover areas such as access control, secure coding practices, vulnerability management, incident response, and data protection. Compliance status ensures that applications align with the established security policies.

  3. Security Assessments and Audits: Compliance status involves conducting security assessments and audits to evaluate the effectiveness of application security controls. These assessments may include penetration testing, vulnerability assessments, code reviews, and security architecture reviews. Compliance status is determined based on the findings and recommendations resulting from these assessments.

  4. Security Controls Implementation: Compliance status assesses the implementation of specific security controls within applications. This includes evaluating the presence and effectiveness of controls such as access controls, encryption mechanisms, secure authentication, logging and monitoring, secure configuration, and secure coding practices. Compliance status ensures that applications have appropriate security controls in place to mitigate risks.

  5. Incident Response and Reporting: Compliance status includes the establishment of incident response processes and the ability to promptly respond to security incidents. It also involves meeting reporting requirements, such as notifying affected individuals or regulatory bodies within the specified timeframes. Compliance status ensures that applications have a robust incident response capability and can fulfill reporting obligations in case of security incidents.

  6. Documentation and Record-Keeping: Compliance status involves maintaining appropriate documentation and records to demonstrate compliance efforts. This includes documenting security policies, procedures, risk assessments, security control implementations, and incident response activities. Compliance status ensures that applications have a comprehensive set of documentation to support their compliance with security requirements.

  7. Compliance Monitoring and Remediation: Compliance status requires ongoing monitoring of application security controls to ensure continuous adherence to compliance requirements. It involves regularly assessing and remediating any identified gaps or vulnerabilities. Compliance status ensures that applications are continuously monitored and that any non-compliant areas are promptly addressed.

Regular assessments and reviews are conducted to determine the compliance status of applications. These assessments may be internal or external, conducted by auditors or compliance teams. Achieving and maintaining compliance status for application security is crucial to protect sensitive data, maintain customer trust, meet legal and regulatory obligations, and mitigate security risks associated with applications.

COMPASS Metrics

Compliance status metrics for application security are used to measure the level of adherence to security standards, regulations, and industry best practices within the application development process. These metrics help organizations assess their compliance posture, identify gaps, and prioritize remediation efforts. Here are some commonly used compliance status metrics for application security:

  1. Compliance Coverage: This metric measures the percentage of security controls or requirements defined by relevant standards or regulations that are implemented and in place within the application. It provides an overall view of the application's compliance with specific security frameworks, such as ISO 27001, PCI DSS, HIPAA, or GDPR.

CC = (Number of Compliance Controls Implemented / Total Number of Compliance Controls) * 100.

  • The Compliance Coverage metric represents the percentage of compliance controls implemented out of the total number of compliance controls applicable to application security. It can be calculated by dividing the number of compliance controls implemented by the total number of compliance controls and multiplying the result by 100.

  • For example, if there are 50 compliance controls applicable to application security and 40 of them have been implemented, the CC would be 80% ((40 / 50) * 100 = 80%).

  • Measuring CC helps organizations assess the extent of compliance coverage in their application security practices. A higher CC indicates a higher proportion of compliance controls implemented, demonstrating a more comprehensive approach to meeting regulatory and industry requirements. It helps organizations identify areas where additional controls need to be implemented to improve compliance coverage and mitigate potential compliance risks.

  1. Control Effectiveness: This metric assesses the effectiveness of implemented security controls in achieving compliance objectives. It measures the degree to which security controls mitigate identified risks and align with the requirements specified by applicable standards or regulations.

CE = (Number of Effective Controls / Total Number of Controls) * 100.

  • The Control Effectiveness metric represents the percentage of effective controls out of the total number of controls implemented for application security compliance. It can be calculated by dividing the number of effective controls by the total number of controls and multiplying the result by 100.

  • For example, if there are 50 controls implemented for application security compliance and 40 of them are determined to be effective, the CE would be 80% ((40 / 50) * 100 = 80%).

  • Measuring CE helps organizations assess the effectiveness of their controls in achieving application security compliance. It provides insights into the overall performance of implemented controls and helps identify areas where improvements or adjustments may be necessary to enhance compliance effectiveness. A higher CE indicates a greater proportion of controls that are effectively implemented and functioning as intended, contributing to a stronger compliance posture.

  1. Compliance Assessment Findings: This metric tracks the number and severity of non-compliance findings identified during compliance assessments, audits, or reviews. It helps identify areas where the application falls short of compliance requirements and guides remediation efforts.

CA = (Number of Compliance Requirements Met / Total Number of Compliance Requirements) * 100.

  • The Compliance Assessment metric represents the percentage of compliance requirements met out of the total number of compliance requirements applicable to application security. It can be calculated by dividing the number of compliance requirements met by the total number of compliance requirements and multiplying the result by 100.

  • For example, if there are 50 compliance requirements applicable to application security and 40 of them are met, the CA would be 80% ((40 / 50) * 100 = 80%).

  • Measuring CA helps organizations assess their level of compliance with applicable regulations, standards, and policies in the context of application security. It provides a quantitative measure of compliance performance and helps identify areas where additional efforts may be needed to ensure full compliance. A higher CA indicates a higher proportion of compliance requirements met, demonstrating a stronger compliance posture and reduced compliance risks.

  1. Compliance Audit Completion Rate: This metric measures the percentage of scheduled compliance audits or assessments that have been completed within the defined time frame. It reflects the organization's commitment to regularly evaluate and validate compliance with security standards and regulations.

CACR = (Number of Completed Compliance Audits / Total Number of Scheduled Compliance Audits) * 100.

  • The Compliance Audit Completion Rate metric represents the percentage of completed compliance audits out of the total number of scheduled compliance audits for application security. It can be calculated by dividing the number of completed compliance audits by the total number of scheduled compliance audits and multiplying the result by 100.

  • For example, if there were 10 scheduled compliance audits for application security and 8 of them were completed, the CACR would be 80% ((8 / 10) * 100 = 80%).

  • Measuring CACR helps organizations assess the effectiveness and timeliness of their compliance audit processes in relation to the scheduled audits. It provides insights into the organization's ability to successfully complete compliance audits within the planned timeframe. A higher CACR indicates a higher completion rate, demonstrating a more efficient compliance audit process and a proactive approach to monitoring and evaluating application security compliance.

  1. Remediation Time: This metric measures the average time taken to address identified compliance gaps or issues. It assesses the speed and efficiency of the organization's remediation efforts in bringing the application into compliance with applicable security requirements.

RT = (Total Time to Remediate Non-compliant Findings / Total Number of Non-compliant Findings)

  • The Remediation Time metric represents the average time taken to remediate non-compliant findings identified during the application security compliance assessment. It can be calculated by dividing the total time taken to remediate non-compliant findings by the total number of non-compliant findings.

  • For example, if the total time taken to remediate non-compliant findings is 30 days and there are 10 non-compliant findings, the RT would be 3 days (30 days / 10 findings = 3 days).

  • Measuring RT helps organizations assess the efficiency and effectiveness of their remediation efforts in addressing non-compliant findings. It provides insights into the average time it takes to resolve identified compliance gaps in the application security controls. A lower RT indicates a more prompt and efficient remediation process, demonstrating a proactive approach to maintaining compliance with relevant regulations and standards in application security.

  1. Compliance Training Completion Rate: This metric tracks the percentage of individuals involved in the application development process who have completed the required compliance training. It indicates the level of awareness and understanding of security and compliance requirements among personnel.

CTCR = (Number of Employees Completed Compliance Training / Total Number of Employees Requiring Compliance Training) * 100.

  • The Compliance Training Completion Rate metric represents the percentage of employees who have completed the required compliance training out of the total number of employees who are required to undergo compliance training for application security. It can be calculated by dividing the number of employees who have completed compliance training by the total number of employees requiring compliance training and multiplying the result by 100.

  • For example, if there are 200 employees who need to undergo compliance training for application security and 180 of them have completed the training, the CTCR would be 90% ((180 / 200) * 100 = 90%).

  • Measuring CTCR helps organizations assess the level of employee engagement and adherence to compliance training requirements. It provides insights into the effectiveness of the organization's compliance training initiatives and the extent to which employees are equipped with the necessary knowledge and understanding of application security compliance. A higher CTCR indicates a higher completion rate, demonstrating a stronger commitment to compliance and a more educated workforce in terms of application security requirements.

  1. Compliance Reporting Accuracy: This metric assesses the accuracy and completeness of compliance reports generated for internal or external stakeholders. It measures the quality of information provided in compliance reports and ensures that they reflect the true compliance status of the application.

CRA = (Number of Accurate Compliance Reports / Total Number of Compliance Reports) * 100.

  • The Compliance Reporting Accuracy metric represents the percentage of accurate compliance reports out of the total number of compliance reports generated for application security. It can be calculated by dividing the number of accurate compliance reports by the total number of compliance reports and multiplying the result by 100.

  • For example, if there are 100 compliance reports generated for application security and 90 of them are accurate, the CRA would be 90% ((90 / 100) * 100 = 90%).

  • Measuring CRA helps organizations assess the precision and reliability of their compliance reporting process. It provides insights into the accuracy of the information presented in compliance reports, including the documentation of compliance controls, findings, and remediation efforts. A higher CRA indicates a higher level of accuracy in compliance reporting, demonstrating a commitment to providing reliable and trustworthy information about the organization's application security compliance status.

  1. Compliance Maturity Level: This metric evaluates the maturity level of the organization's compliance program for application security. It may be assessed based on a defined maturity model, considering factors such as policies, processes, controls, monitoring, and continuous improvement efforts.

CML = (Number of Implemented Controls / Total Number of Required Controls) * 100.

  • The Compliance Maturity Level metric represents the percentage of implemented controls out of the total number of required controls for application security compliance. It can be calculated by dividing the number of implemented controls by the total number of required controls and multiplying the result by 100.

  • For example, if there are 50 required controls for application security compliance and 40 of them have been implemented, the CML would be 80% ((40 / 50) * 100 = 80%).

  • Measuring CML helps organizations assess their overall compliance maturity in terms of implementing the necessary controls for application security. It provides insights into the level of alignment between the organization's control implementation efforts and the requirements set forth by applicable regulations and standards. A higher CML indicates a higher level of compliance maturity, demonstrating a stronger commitment to meeting compliance obligations and mitigating risks related to application security.


These metrics provide organizations with insights into their compliance status, the effectiveness of implemented controls, and the overall maturity of their application security compliance programs. By tracking and monitoring these metrics, organizations can identify areas for improvement, allocate resources effectively, and ensure ongoing compliance with relevant security standards and regulations.