RiskTemplates · The Daily Brief Monday, May 18, 2026

Feature Operational Risk

Key Risk Indicators Examples: 40 KRIs for Operational and Financial Risk Teams

40 ready-to-use KRI examples for operational and financial risk programs — each with risk measured, data source, owner, threshold idea, and escalation path.

By Rebecca Leung · May 17, 2026 ·
Table of Contents

The examiner wants to see your KRI dashboard. Not the metrics you wish you tracked — the ones you actually have, with data, owners, thresholds, and a defined escalation path.

Most teams can produce a list. Fewer can produce a working program.

The difference between a KRI that lives in a spreadsheet and one that drives real risk decisions comes down to four things: a verifiable data source, a real owner, calibrated thresholds, and a documented escalation response. The 40 KRIs below — 20 operational, 20 financial — are structured around those four elements so you can put them to work.

TL;DR

  • Each of the 40 KRIs below includes risk measured, data source, owner, threshold idea, and escalation path — the fields that turn a metric into a working risk indicator
  • A color change on a dashboard is not a risk management response; every red KRI needs a pre-defined action
  • Operational risk KRIs should be owned by the function closest to the risk — the risk team governs, it doesn’t monitor everything
  • Financial risk KRIs belong to Treasury and Finance; Risk Management provides review and challenge, not primary ownership

Why 40 KRIs, Not 140

Operational risk libraries often balloon after incidents: every exam recommendation becomes a new KRI candidate. The result is a 140-metric dashboard nobody reviews seriously.

According to the Operational Riskdata eXchange Association (ORX), effective KRI programs are built around a small number of genuinely predictive metrics owned by people with authority to act on them. The practical test: if a KRI breached red tomorrow, would anyone know who to call and what to do? If the answer is uncertain, you have metrics, not a program.

This post covers operational and financial risk KRIs specifically. A broader guide covering cyber, credit, compliance, model risk, and third-party domains is at the KRI guide with 50+ examples by risk domain.

Column Guide

The tables below use five columns. Thresholds listed are illustrative starting points — calibrate them against your actual risk appetite and historical data.

ColumnWhat It Means
KRIMetric name and the specific risk it predicts
Data SourceThe system that produces the metric
OwnerFunction responsible for monitoring and reporting
Amber → RedStarting-point threshold levels
Escalation NoteWhat happens at amber or red (condensed)

Part 1: 20 Operational Risk KRI Examples

Process and Transaction Risk

KRIData SourceOwnerAmber → RedEscalation Note
Transaction error rate — process execution failure; operational loss from incorrect transactionsTransaction processing system, reconciliation reportsOperations / Payments OpsAmber >0.3%, Red >0.5% of daily transactionsOps manager root cause within 24 hrs; COO + CRO at red
Aged unreconciled items (>3 business days) — settlement risk; potential loss from unresolved breaksReconciliation system or treasury ops ledgerFinance Operations / TreasuryAmber >5 items, Red >15 or any item >10 business daysFinance manager weekly review; CRO briefed at red
Chargeback rate — dispute/fraud losses; Visa/MC network threshold violations (~1% triggers account termination)Card network dispute data / payment processorPayments Operations / RiskAmber >0.5%, Red >0.9%Payments Ops investigates spike; Risk Committee at red; legal notified if suspension risk
Operational loss events above threshold — magnitude of operational risk materializing into lossLoss event database / incident management systemOperational Risk ManagementAmber >2 events/qtr above $50K; Red: any event >$500KEvents logged within 5 days; CRO at >$100K; Board Risk Committee at red

IT and System Risk

KRIData SourceOwnerAmber → RedEscalation Note
Critical system availability rate — operational disruption; customer harm; regulatory reporting riskITSM platform (ServiceNow), infrastructure monitoringIT Operations / InfrastructureAmber <99.5% monthly uptime, Red <99.0%IT Ops escalates within 2 hrs; BCP review triggered at red
Mean time to restore (MTTR) after P1/P2 incidents — recovery effectiveness after system failuresITSM incident log (P1/P2 tickets)IT OperationsAmber >4 hrs, Red >8 hrsPost-incident review within 5 days; persistent red triggers BCP plan review
Change management failure rate (rollback rate) — IT change control discipline; defect introduction riskITSM change management moduleIT Change Management / EngineeringAmber >5% of changes rolled back, Red >10%CAB review for each rollback; red triggers change freeze audit
Critical patch lag (days past SLA) — cybersecurity exposure from unpatched vulnerabilitiesVulnerability management platform (Tenable, Qualys)IT SecurityAmber: any critical CVE >15 days; Red: any >30 daysCISO at amber; CRO + executives at red
Open P1/P2 IT incidents per quarter — IT reliability and accumulated system fragilityITSM platformIT OperationsAmber >3 P1 incidents/qtr, Red >5Trend review at Operations Risk Committee; CTO remediation plan at red

People and Control Risk

KRIData SourceOwnerAmber → RedEscalation Note
Turnover rate in critical or hard-to-replace roles — key person risk; knowledge loss; continuityHR system (HRIS)Human Resources / Business Line HeadsAmber >20% annualized, Red >35%Quarterly Business Unit Risk report; succession planning review at amber
Training non-completion rate for required programs — compliance and conduct risk from undertrained staffLearning Management System (LMS)L&D / ComplianceAmber >10% non-completion 30 days pre-deadline, Red >20%Manager notification at amber; Compliance escalation at red
Segregation of duties exceptions outstanding — control environment integrity; fraud risk from unchecked accessIAM system, access review logsIT Security / Internal AuditAmber >5 open exceptions without compensating controls, Red >10Monthly access review; CRO + CAE at red
Open internal audit findings >90 days past remediation target — control remediation effectivenessAudit management systemInternal Audit / Business Line HeadsAmber >3 past 90 days, Red >5 or any high-rated findingBusiness line escalation at amber; Board Audit Committee at red
Policy exceptions approved per quarter — policy adherence and control disciplinePolicy management system / exception logCompliance / Risk ManagementAmber >5/qtr, Red >10 or any exception >6 monthsMonthly Risk Committee review; multi-quarter exceptions to CRO
Complaint escalation rate (first to second level) — customer experience; UDAAP exposureCRM / complaint management systemCompliance / Customer OperationsAmber >8%, Red >15%Compliance monthly review; root cause analysis + regulatory risk assessment at red

Vendor, BCP, and Model Risk

KRIData SourceOwnerAmber → RedEscalation Note
Third-party SLA misses per quarter — third-party operational risk; service disruption from supplier failureVendor management platform / SLA reportingVendor Management / Business LineAmber >2 misses from any critical vendor/qtr, Red >5Vendor escalation call within 5 days; Vendor Risk Committee at red
BCP plans not tested within 12 months — business continuity readiness; examiner finding riskBCP test tracker / business continuity platformBusiness Continuity / Risk ManagementAmber >10% of critical plans untested, Red >25%BC Manager escalates to CRO; FFIEC exam prep review at red
Model validations overdue — model risk from unvalidated models in productionModel inventory / model risk management systemModel Risk ManagementAmber >1 high-risk model past due date; Red >2 or any >18 months unvalidatedCRO briefed; model placed under enhanced monitoring or suspended at red per OCC 2026-13
Near-miss incident report rate vs. prior quarter — risk culture; near misses predict future lossesIncident reporting systemOperational Risk ManagementFlag both: decline >30% QoQ (underreporting); spike >200% (deteriorating operations)Trends reviewed monthly; declines investigated as cultural indicators; spikes trigger root cause analysis
RCSA action item completion rate — whether control gaps from RCSA are being remediatedRCSA platform / issue tracking systemORM / Business LinesAmber <75% of actions completed by due date, Red <50%Risk Committee monthly review; CRO + business line heads at red

Part 2: 20 Financial Risk KRI Examples

Treasury and Finance own these metrics. Risk Management provides review and challenge, not primary monitoring. For structuring KRI ownership across the organization, see the KRI task force guide.

Liquidity and Capital

KRIData SourceOwnerAmber → RedEscalation Note
Liquidity coverage ratio (LCR) vs. regulatory minimum — short-term liquidity risk; 30-day stress survivalTreasury LCR calculation engineTreasuryAmber <120%, Red <110% (regulatory min 100%)CRO at amber; CFO + Board ALCO at red; CFP review triggered
Net stable funding ratio (NSFR) — medium-term structural funding riskTreasury / ALM systemTreasuryAmber <110%, Red <100%Monthly ALCO; regulator notification assessed at red
Funding concentration — top 5 depositors as % of total deposits — single-depositor withdrawal vulnerabilityCore banking system / deposits ledgerTreasury / ALCOAmber >25%, Red >35%ALCO quarterly; funding diversification plan at amber
Contingent funding line utilization rate — proximity to contingency capacity ceilingCredit facility agreements / treasury monitoringTreasuryAmber >50%, Red >75%ALCO briefing at amber; CFP activation review at red
Deposit runoff rate (MoM decline) — liquidity outflow velocity; leading indicator of funding stressCore banking / deposit monitoring systemTreasury / Retail BankingAmber >5% MoM, Red >10%Daily monitoring in stress; CFP activation assessed at amber; CEO briefed at red
Cash runway at current burn rate (fintech) — going concern risk for pre-profitability entitiesFinance / FP&A systemCFO / FinanceAmber <12 months, Red <6 monthsMonthly board report; investor/lender communication at red
Total capital ratio vs. regulatory minimum (banks) — capital adequacy; loss absorption capacityRegulatory capital calculation systemFinance / TreasuryAmber within 200bps of well-capitalized minimum, Red within 100bpsMonthly Board ALCO; dividend suspension reviewed at amber
Operational loss as % of revenue (rolling 12 months) — materialization of operational risk relative to business sizeOperational loss database / financial reportingORM / FinanceAmber >2%, Red >4% of revenueQuarterly Risk Committee; CRO action plan at red

Credit and Payments

KRIData SourceOwnerAmber → RedEscalation Note
30-day delinquency rate — early-stage credit deterioration in the portfolioLoan servicing systemCredit Risk / ServicingAmber >1.5%, Red >2.5% (varies by portfolio type)Monthly credit risk reporting; underwriting review at red
Charge-off rate vs. reserve assumption — actual losses relative to what the reserve model predictedLoan servicing + accounting systemCredit Risk / FinanceAmber: exceeds reserve assumption >25%; Red: >50%ALCO monthly; reserve adequacy review at amber
Single-counterparty credit exposure vs. regulatory limit — concentration risk; potential Reg W violationCredit exposure management systemCredit Risk / TreasuryAmber >80%, Red >95% of regulatory limitCredit Officer review; ALCO briefing; regulatory notification if limit breached
ACH return rate vs. NACHA thresholds — NACHA Rule violation risk; account validity and authorization issuesACH processing platform / NACHA reportsPayments Ops / ComplianceAmber: admin returns approaching 15%; Red: unauthorized returns >0.5%NACHA suspension risk briefed to Compliance at amber; ODFI notification at red
Settlement fail rate — settlement and counterparty risk; operational loss from failed settlementClearinghouse / settlement platform reportsTreasury / Payments OpsAmber >0.1% of settlement value, Red >0.3%Daily reconciliation; counterparty relationship review at red
Fraud loss rate as % of transaction volume — fraud control effectiveness and operational lossFraud management platformFraud Risk / Payments OpsAmber >5bps, Red >10bpsDaily monitoring; model and rule refresh at red

Compliance and Model Financial Risk

KRIData SourceOwnerAmber → RedEscalation Note
Regulatory filing on-time rate — compliance risk; penalties and exam findings from late filingsCompliance calendar / regulatory reporting systemCompliance / FinanceAmber: any filing late >3 days; Red: any >10 days or missed deadlineImmediate GC + CRO escalation; regulator notification if required
OFAC screening — unresolved potential matches — sanctions violation risk; regulatory penalty exposureSanctions screening platformBSA/AML / ComplianceAmber >5 unresolved hits >48 hrs; Red: any confirmed hit not escalated within 24 hrsBSA Officer reviews all hits within 24 hrs; OFAC reporting for confirmed matches
SAR filing timeliness — BSA compliance; exam findings from late SAR filingsSAR tracking systemBSA/AML / ComplianceAmber <95% on-time, Red <90%BSA Officer immediate review; exam finding risk briefed to CRO at red
Model output exception rate — model drift, degradation, and model risk for production modelsModel monitoring platform / model outputsModel Risk ManagementAmber >5% outputs outside 2 SD; Red >10%Model under enhanced oversight at amber; suspended pending revalidation at red per OCC 2026-13
Net interest margin (NIM) trend (banks, lending fintechs) — interest rate risk; margin compressionALM system / financial reportingTreasury / FinanceAmber: NIM decline >25bps QoQ; Red: >50bps or NIM below cost of capitalMonthly ALCO; repricing strategy review at amber; Board at red
Insurance coverage gap vs. loss scenarios — underinsurance risk; unrecovered losses from operational eventsInsurance schedule vs. operational loss data / scenario analysisRisk Management / FinanceAmber: gap >25% of 1-in-10-year scenario; Red: >50%Annual insurance review; broker consultation at amber

Making This List Work

Map to your RCSA. KRIs should correspond directly to the risk ratings from your RCSA process. If the RCSA rates process failure as high, you need 2–3 KRIs actively monitoring that category. Mismatches between RCSA ratings and KRI coverage are a common examiner finding.

Assign real owners. Don’t let the risk team claim ownership of KRIs it can’t monitor. Process error rates belong to Operations. Charge-off rates belong to Credit Risk. IT incident rates belong to IT Operations. The risk function governs — it challenges thresholds, escalates breaches, and aggregates reporting.

Review thresholds annually. Thresholds set in Year 1 are usually wrong by Year 2. Transaction volumes change. Portfolio mix shifts. Stale thresholds create false greens and false reds — both dangerous in different ways.

So What?

Select the subset that maps to your material risks, assign real owners, and get thresholds calibrated before your next risk committee review. Don’t paste all 40 into your register on day one — start with the 10 most critical and build from there.

The KRI Library (132 Key Risk Indicators) extends this across nine additional domains — cyber, compliance, model risk, AML/BSA, third-party, credit, and more — with ownership guidance, threshold calibration notes, and escalation path templates built in.

◆ Need the working template?

Start with the source guide.

These answer-first guides summarize the required fields, evidence, and implementation steps behind the templates practitioners search for.

◆ FAQ

Frequently asked questions.

What is the difference between an operational risk KRI and a financial risk KRI?
An operational risk KRI signals process, people, system, or control failures — transaction error rates, IT outages, audit findings aging past deadline. A financial risk KRI signals exposure to balance sheet losses or cash position changes — liquidity coverage ratios, deposit runoff, capital adequacy trends. Both are forward-looking but are owned and monitored by different functions.
How many KRIs should an operational risk team track?
Most mature programs track 3–5 KRIs per material risk category. At an organization with 8 material risk categories, that's 24–40 KRIs total. More than 50 creates reporting noise. The filter: if a KRI has been green for 18 consecutive months and nobody has discussed it at a risk committee, cut it — it's not actually key.
Who should own KRIs — risk management or the business line?
The business function closest to the underlying risk should own each KRI. IT Security owns unpatched vulnerability rates. Treasury owns liquidity metrics. Compliance owns regulatory filing deadlines. Risk Management governs the program — it sets the framework, reviews thresholds, escalates breaches, and aggregates reporting. Risk functions that claim to own every KRI end up with stale, unmonitored dashboards.
What data source should KRIs use?
KRIs should pull from the most authoritative, lowest-latency source available: transaction monitoring systems for fraud and error rates, ITSM tools like ServiceNow for incident data, HR systems for turnover and training completion, loan platforms for credit metrics. Avoid KRIs that depend on manual reporting — they only get updated when someone remembers to, which defeats the early-warning purpose.
How do you set KRI thresholds without historical data?
Start with judgment-based estimates calibrated to your risk appetite statement. If your appetite says zero tolerance for regulatory violations, red is 1. Use industry benchmarks or peer data for initial amber and red levels. Document the basis, then revisit after 12 months — most organizations significantly refine thresholds after their first year of data.
What happens when a KRI hits red?
A red KRI should trigger a pre-defined escalation response, not just a color change on a dashboard. The escalation path specifies who gets notified, what investigation must happen and by when, what the response plan is, and what evidence gets captured. If hitting red produces no action, the KRI is decorative.
Rebecca Leung

Author

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

◆ Related framework

KRI Library (132 Key Risk Indicators)

132 KRIs with thresholds, data sources, and escalation triggers pre-built for financial services.

◆ Immaterial Findings · Weekly

Sharp risk & compliance insights practitioners actually read.

Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

◆ Practitioners from banks, fintechs, and asset managers · Delivered weekly

Immaterial Findings · Newsletter

The brief, in your inbox.

Enforcement of the week, a framework breakdown, and the prompts that are actually worth running. Delivered to your inbox. Free.