Feature Compliance Strategy
KRI Governance: Who Owns the Metric, Threshold, Escalation, and Remediation?
Most KRI programs have metrics but no real owners. When a KRI breaches amber, nothing happens because accountability was never built into the design. Here's the governance model — roles, RACI, threshold approval paths, and escalation chains — that makes a KRI program function under regulatory scrutiny.
Table of Contents
TL;DR
- KRI programs fail when the accountability model isn’t built into the design. Metrics without named owners are watched by no one and actioned by no one.
- Six distinct roles must be defined for each KRI: metric owner, data owner, threshold approver, escalation recipient, action owner, and board reporting owner. Collapsing all of these into “Risk Management” is the single most common governance failure.
- Threshold changes need approval paths — loosening a threshold should require sign-off one level higher than the owner who benefits from the change.
- Regulators don’t just want to see the dashboard. They want to see evidence that amber and red breaches triggered documented management action.
The KRI program at a mid-size financial institution had 58 indicators in its library. The board deck showed 58 green dots every quarter for 18 months. The CRO pointed to the dashboard as evidence of a mature risk management program.
The OCC examiner asked a single question: “Show me the last ten times a KRI hit amber or red and what management action followed.”
The answer revealed the design problem. Every KRI was owned by Risk Management. Risk Management reviewed the data, set the thresholds, ran the dashboard, and escalated to Risk Management. Business units had no accountability for the metrics they were supposed to be monitoring. When a threshold was close to amber, the institutional response was to adjust the threshold rather than escalate the breach. Eighteen months of green was not evidence of a well-managed risk environment — it was evidence of a governance structure that couldn’t produce an honest signal.
This is the failure mode that underpins most KRI program deficiencies. It’s not a data problem or a threshold calibration problem — it’s an ownership problem. KRIs cannot function as early warning systems if the people accountable for acting on them are the same people who benefit from keeping them green.
The Six Roles Every KRI Needs
Strong KRI governance requires six distinct accountability assignments for each indicator. These are not always different people — in a smaller organization, one person may hold multiple roles — but the responsibilities must be separately documented so there’s no ambiguity when a threshold is breached.
1. Metric Owner
The metric owner is accountable for the KRI reading, escalation, and remediation when a threshold is breached. Crucially, this should be the business function most directly responsible for the underlying process — not the risk function.
If the KRI is SAR backlog age, the metric owner is the BSA operations manager. If the KRI is vendor SLA breach count, the metric owner is the vendor relationship manager or TPRM lead. If the KRI is employee turnover in the compliance function, the metric owner is the head of compliance.
Risk Management’s role is governance and challenge: reviewing whether the threshold is appropriate, testing whether escalations are happening correctly, and escalating when the metric owner isn’t responding. Risk Management should not own the underlying metric — that creates the accountability collapse described above.
2. Data Owner
The data owner manages the source system that feeds the metric. This role is often in IT, Finance, or Operations — whoever controls the system of record. The data owner is responsible for data quality, pipeline reliability, and timely feeds into the KRI dashboard.
The distinction matters because data problems and metric breaches require different responses. When the data feed produces a stale number or a system error generates a false reading, that’s a data owner problem. When the metric itself crosses a threshold due to actual risk conditions, that’s a metric owner problem. Conflating the two leads to “the data is wrong” becoming the default explanation for any unwanted red indicator.
Document the data owner separately from the metric owner in your KRI library. When a KRI goes red, one of the first questions should be: “Is the data accurate?” That question has a different answer path than “Is the risk real?“
3. Threshold Approver
Every KRI threshold should have a documented approval owner — the person or committee that must sign off on changes to the green/amber/red cutoffs. This is where governance breaks down most visibly when it’s absent.
Without a threshold approver, thresholds drift. They get loosened when a business unit is uncomfortable with amber readings. They stop being recalibrated when the business changes. The result is a dashboard that becomes progressively less connected to actual risk as thresholds drift further from the risk appetite.
The threshold approver should be at least one level higher than the metric owner, and any threshold loosening — moving the amber or red line in a direction that allows more risk before escalation triggers — should require a documented business case. The KRI thresholds post covers calibration methodology in detail, including the statistical basis for setting thresholds rather than defaulting to round numbers.
4. Escalation Recipient
When a KRI breaches a threshold, who gets notified, and at what level? This should be specified in the KRI library for amber and red separately.
Amber escalation typically goes to the metric owner’s functional lead and the second-line risk officer for that domain. Red escalation goes to the CRO or equivalent, and should be documented in Risk Committee materials even if a management response is already underway.
The common failure mode: escalation recipients are named but not actually notified when thresholds are breached. Notifications go to a shared inbox nobody monitors, or the metric owner self-adjudicates that the breach is “temporary” and doesn’t need escalation. Escalation recipients should be specific individuals, not role aliases or distribution groups, and there should be a documented acknowledgment step so there’s evidence the notification was received.
5. Action Owner
When a KRI hits amber or red, who is responsible for the management response? The action owner is the person accountable for investigating the cause, implementing interim controls, and driving remediation to a documented close.
The action owner is often the same as the metric owner — but not always. For a cross-functional risk domain like payment settlement errors, the metric owner might be Treasury while the action owner (for the underlying process fix) sits in Operations or IT. Documenting them separately avoids the assumption that the person who monitors the metric is also the person who can fix the underlying problem.
Action owners should produce a written response within 48 hours of a red breach: current metric value, threshold, likely cause, interim action, target remediation date, and evidence of escalation. This is the document that examiners ask to see when they review a KRI program — not the dashboard itself.
6. Board Reporting Owner
Who prepares the KRI summary for Risk Committee and board reporting? This is distinct from all of the above. The board reporting owner is responsible for synthesizing KRI results into a format appropriate for governance-level consumption: trend commentary, escalations from the period, threshold changes approved, and management actions open from prior periods.
For most organizations this sits in Risk Management or ERM. The critical requirement: board and Risk Committee reporting should include a brief narrative on any metrics that were amber or red during the period, not just the current status. A KRI that went red in week two and was resolved by week eight should still appear in the quarterly board report with the management action documented. A metric that has been green for 12 consecutive quarters with no threshold review should also be noted — stale green is an audit observation waiting to happen.
The RACI for KRI Governance
The six roles above map to a straightforward RACI for each KRI:
| Role | Metric Owner | Data Owner | Risk / ERM | Risk Committee | Board |
|---|---|---|---|---|---|
| Monitor metric value | R | A | C | I | I |
| Escalate threshold breaches | R | I | A | I | I |
| Maintain data feed quality | I | R | I | — | — |
| Approve threshold changes (management-level) | C | I | A | I | — |
| Approve threshold changes (board-level) | C | I | C | A | I |
| Investigate and remediate breach | R | C | A | I | — |
| Produce board/committee reporting | I | I | R | A | I |
R = Responsible, A = Accountable, C = Consulted, I = Informed
This RACI should be embedded in your KRI policy, not just the library spreadsheet. When an examiner asks to see your KRI governance framework, the RACI is the artifact that demonstrates the accountability model is deliberate — not improvised.
Threshold Governance: The Most Overlooked Component
Threshold governance is the part of KRI programs that most internal audit teams flag as deficient, and for good reason. Thresholds set at program launch and never reviewed again are one of the most reliable ways to produce a perpetually green dashboard that doesn’t reflect actual risk.
The governance requirements:
Annual review minimum. Every threshold should be reviewed at least annually against the current business environment. A threshold calibrated for a portfolio of 50,000 transactions per month is wrong for a portfolio of 500,000. Volume changes, product changes, and regulatory changes all affect what constitutes a meaningful threshold level.
Documented rationale for current thresholds. The KRI library should include, for each metric, the basis for the current threshold — not just the number. “Red at >5% exception rate because analysis of 2023-2025 loss data showed that rates above 4.8% preceded loss events in 85% of cases” is a defensible threshold. “Red at >5% because that’s a round number” is not.
Approved change log. Any threshold change should be documented with the prior threshold, new threshold, rationale, approver, and date. When an examiner asks why a threshold was loosened 18 months ago, you need that documentation. Without it, the threshold change looks like it was made to avoid escalation — which is sometimes exactly what happened.
Mandatory justification for loosening. Any change that makes a threshold less sensitive — moving the amber trigger from 3% to 5%, for example — should require a documented business case and approval one level higher than the metric owner. Tightening a threshold is typically encouraged without heightened oversight. Loosening one is the change that requires scrutiny.
Escalation Procedures That Actually Work
Well-designed escalation procedures specify four things: who gets notified, within what timeframe, with what information, and what response is required.
Amber escalation: Notification to metric owner’s functional lead and second-line risk officer for the domain, within 2 business days of breach. Written summary: metric value, threshold, cause assessment, interim action if any, expected resolution path. No mandatory committee reporting unless amber persists beyond 30 days.
Red escalation: Notification to CRO and relevant functional head within 24 hours. Written escalation memo within 48 hours. Automatic inclusion in next Risk Committee agenda, or interim briefing if the next scheduled meeting is more than 2 weeks away. Board notification if red persists beyond the management response window (typically 30–45 days).
Persistent breach protocol: If a KRI remains amber or red for more than two consecutive reporting periods without a documented remediation plan, that should trigger an independent review by the second or third line. Persistent breaches without management response are a governance failure, not just a performance issue.
Document the escalation procedure in your KRI policy, not just in the library spreadsheet. Escalation procedures embedded only in a spreadsheet are procedurally invisible — examiners reviewing your governance framework need to find the policy, not reverse-engineer it from a spreadsheet note.
Keeping Ownership Current
KRI ownership goes stale when organizations change. Reorganizations, leadership transitions, new business lines, and process changes all affect who should own a given metric. An annual ownership review is the minimum — but ownership should also be validated as a standing step in any significant organizational change process.
Common stale-ownership scenarios:
- The named metric owner left the organization 8 months ago; a successor was named for the role but never updated in the KRI library
- The function responsible for a process was reorganized into a different reporting line; the KRI ownership wasn’t updated to reflect the new reporting structure
- A KRI that was appropriate for a legacy process no longer measures the right thing after a system migration; the owner hasn’t been engaged to review relevance
Each of these produces the same downstream failure: when the metric moves, nobody knows whose job it is to respond. The metric owner field in the library becomes a historical artifact rather than an actionable accountability assignment.
For the larger governance structure — including how to build and sustain a KRI program with functional leads across the organization — see how to build a KRI task force. For how to separate board-level risk indicators from operational management metrics, see operational risk KRI dashboard: what to show the board vs management.
What Examiners Test
Regulators reviewing KRI governance programs are not primarily reviewing the dashboard. They’re reviewing the governance infrastructure behind it.
The OCC’s Comptroller’s Handbook on Internal Controls and FDIC examination guidance both emphasize that effective risk monitoring requires clear accountability assignments, not just metric selection. In practice, examiners test governance by:
- Requesting the KRI library and asking for the named owner of each metric
- Asking to see the escalation log for the past 12 months: which metrics breached amber or red, what response was documented, and who was notified
- Reviewing Risk Committee minutes for evidence that KRI results were discussed substantively, not just presented and noted
- Asking for the threshold change log and reviewing any threshold loosening for documentation of rationale and approval
- Checking whether the current threshold for any KRI is tighter than or equal to the corresponding risk appetite limit
A program that fails these tests — no named owners, no escalation log, Risk Committee minutes that note KRI presentation without discussion, threshold changes without approval documentation — will generate governance findings regardless of whether the dashboard shows green.
So What Does This Mean for Your KRI Program?
Pull your KRI library and check each metric for six things: named metric owner (not “Risk Management”), named data owner, documented threshold approver, escalation recipient for amber and red, action owner for breach response, and board reporting owner.
Any metric missing any of these is a governance gap — not because a regulator said so, but because a KRI without an owner is a dashboard stat. It measures something, but nobody is accountable for acting when it moves.
Documenting ownership takes less time than rebuilding a program after an exam finding. Build the RACI into your KRI library now, before the examiner asks who owns the metric that’s been amber for three months without a management response.
The KRI Library (132 Key Risk Indicators) includes pre-built owner fields, data source documentation, and escalation trigger definitions for each of the 132 indicators — structured so you can assign accountability before you go live, not retrofit it after an audit. Get it at https://buy.stripe.com/eVq5kw2cPcNZazP6uW6J209.
◆ Need the working template?
Start with the source guide.
These answer-first guides summarize the required fields, evidence, and implementation steps behind the templates practitioners search for.
◆ Related template
KRI Library (132 Key Risk Indicators)
132 KRIs with thresholds, data sources, and escalation triggers pre-built for financial services.
◆ Immaterial Findings · Weekly
Sharp risk & compliance insights. No fluff.
◆ FAQ
Frequently asked questions.
Who should own a KRI?
What's the difference between the metric owner and the data owner?
Who approves KRI threshold changes?
What's the escalation path when a KRI hits red?
How often should KRI ownership be reviewed?
What do examiners look for in KRI governance?
Author
Rebecca Leung
Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.
◆ Related framework
KRI Library (132 Key Risk Indicators)
132 KRIs with thresholds, data sources, and escalation triggers pre-built for financial services.
◆ Keep reading
Related posts.
Compliance Strategy
High-Risk Merchant Policy: How to Review the Transaction, Not Just the Industry
Merchant risk reviews that start and end with an industry code miss the actual risk. Here's the transaction-level framework that tells you whether a high-risk merchant is manageable — and what you need to document before approving or denying.
May 19, 2026
Compliance Strategy
Sales vs. Compliance in High-Risk Customer Reviews: How to Avoid Losing Good Deals for Bad Reasons
The tension between sales urgency and compliance diligence doesn't have to kill deals. Here's the escalation framework, SLA structure, and approval process that resolves high-risk customer decisions in days instead of weeks — and the enforcement record that shows what happens when sales wins for a decade.
May 19, 2026
Compliance Strategy
AUP Exception Memos: How to Document a High-Risk Customer Approval Without Creating a Mess
When you approve a restricted or borderline customer, the memo is not bureaucratic overhead — it's your defense against the next examiner, bank partner audit, or internal escalation. Here's the format that holds up under scrutiny.
May 18, 2026