RiskTemplates · The Daily Brief Sunday, May 24, 2026

Feature Compliance Strategy

KRI Governance: Who Owns the Metric, Threshold, Escalation, and Remediation?

Most KRI programs have metrics but no real owners. When a KRI breaches amber, nothing happens because accountability was never built into the design. Here's the governance model — roles, RACI, threshold approval paths, and escalation chains — that makes a KRI program function under regulatory scrutiny.

By Rebecca Leung · May 22, 2026 ·
Table of Contents

TL;DR

  • KRI programs fail when the accountability model isn’t built into the design. Metrics without named owners are watched by no one and actioned by no one.
  • Six distinct roles must be defined for each KRI: metric owner, data owner, threshold approver, escalation recipient, action owner, and board reporting owner. Collapsing all of these into “Risk Management” is the single most common governance failure.
  • Threshold changes need approval paths — loosening a threshold should require sign-off one level higher than the owner who benefits from the change.
  • Regulators don’t just want to see the dashboard. They want to see evidence that amber and red breaches triggered documented management action.

The KRI program at a mid-size financial institution had 58 indicators in its library. The board deck showed 58 green dots every quarter for 18 months. The CRO pointed to the dashboard as evidence of a mature risk management program.

The OCC examiner asked a single question: “Show me the last ten times a KRI hit amber or red and what management action followed.”

The answer revealed the design problem. Every KRI was owned by Risk Management. Risk Management reviewed the data, set the thresholds, ran the dashboard, and escalated to Risk Management. Business units had no accountability for the metrics they were supposed to be monitoring. When a threshold was close to amber, the institutional response was to adjust the threshold rather than escalate the breach. Eighteen months of green was not evidence of a well-managed risk environment — it was evidence of a governance structure that couldn’t produce an honest signal.

This is the failure mode that underpins most KRI program deficiencies. It’s not a data problem or a threshold calibration problem — it’s an ownership problem. KRIs cannot function as early warning systems if the people accountable for acting on them are the same people who benefit from keeping them green.

The Six Roles Every KRI Needs

Strong KRI governance requires six distinct accountability assignments for each indicator. These are not always different people — in a smaller organization, one person may hold multiple roles — but the responsibilities must be separately documented so there’s no ambiguity when a threshold is breached.

1. Metric Owner

The metric owner is accountable for the KRI reading, escalation, and remediation when a threshold is breached. Crucially, this should be the business function most directly responsible for the underlying process — not the risk function.

If the KRI is SAR backlog age, the metric owner is the BSA operations manager. If the KRI is vendor SLA breach count, the metric owner is the vendor relationship manager or TPRM lead. If the KRI is employee turnover in the compliance function, the metric owner is the head of compliance.

Risk Management’s role is governance and challenge: reviewing whether the threshold is appropriate, testing whether escalations are happening correctly, and escalating when the metric owner isn’t responding. Risk Management should not own the underlying metric — that creates the accountability collapse described above.

2. Data Owner

The data owner manages the source system that feeds the metric. This role is often in IT, Finance, or Operations — whoever controls the system of record. The data owner is responsible for data quality, pipeline reliability, and timely feeds into the KRI dashboard.

The distinction matters because data problems and metric breaches require different responses. When the data feed produces a stale number or a system error generates a false reading, that’s a data owner problem. When the metric itself crosses a threshold due to actual risk conditions, that’s a metric owner problem. Conflating the two leads to “the data is wrong” becoming the default explanation for any unwanted red indicator.

Document the data owner separately from the metric owner in your KRI library. When a KRI goes red, one of the first questions should be: “Is the data accurate?” That question has a different answer path than “Is the risk real?“

3. Threshold Approver

Every KRI threshold should have a documented approval owner — the person or committee that must sign off on changes to the green/amber/red cutoffs. This is where governance breaks down most visibly when it’s absent.

Without a threshold approver, thresholds drift. They get loosened when a business unit is uncomfortable with amber readings. They stop being recalibrated when the business changes. The result is a dashboard that becomes progressively less connected to actual risk as thresholds drift further from the risk appetite.

The threshold approver should be at least one level higher than the metric owner, and any threshold loosening — moving the amber or red line in a direction that allows more risk before escalation triggers — should require a documented business case. The KRI thresholds post covers calibration methodology in detail, including the statistical basis for setting thresholds rather than defaulting to round numbers.

4. Escalation Recipient

When a KRI breaches a threshold, who gets notified, and at what level? This should be specified in the KRI library for amber and red separately.

Amber escalation typically goes to the metric owner’s functional lead and the second-line risk officer for that domain. Red escalation goes to the CRO or equivalent, and should be documented in Risk Committee materials even if a management response is already underway.

The common failure mode: escalation recipients are named but not actually notified when thresholds are breached. Notifications go to a shared inbox nobody monitors, or the metric owner self-adjudicates that the breach is “temporary” and doesn’t need escalation. Escalation recipients should be specific individuals, not role aliases or distribution groups, and there should be a documented acknowledgment step so there’s evidence the notification was received.

5. Action Owner

When a KRI hits amber or red, who is responsible for the management response? The action owner is the person accountable for investigating the cause, implementing interim controls, and driving remediation to a documented close.

The action owner is often the same as the metric owner — but not always. For a cross-functional risk domain like payment settlement errors, the metric owner might be Treasury while the action owner (for the underlying process fix) sits in Operations or IT. Documenting them separately avoids the assumption that the person who monitors the metric is also the person who can fix the underlying problem.

Action owners should produce a written response within 48 hours of a red breach: current metric value, threshold, likely cause, interim action, target remediation date, and evidence of escalation. This is the document that examiners ask to see when they review a KRI program — not the dashboard itself.

6. Board Reporting Owner

Who prepares the KRI summary for Risk Committee and board reporting? This is distinct from all of the above. The board reporting owner is responsible for synthesizing KRI results into a format appropriate for governance-level consumption: trend commentary, escalations from the period, threshold changes approved, and management actions open from prior periods.

For most organizations this sits in Risk Management or ERM. The critical requirement: board and Risk Committee reporting should include a brief narrative on any metrics that were amber or red during the period, not just the current status. A KRI that went red in week two and was resolved by week eight should still appear in the quarterly board report with the management action documented. A metric that has been green for 12 consecutive quarters with no threshold review should also be noted — stale green is an audit observation waiting to happen.

The RACI for KRI Governance

The six roles above map to a straightforward RACI for each KRI:

RoleMetric OwnerData OwnerRisk / ERMRisk CommitteeBoard
Monitor metric valueRACII
Escalate threshold breachesRIAII
Maintain data feed qualityIRI
Approve threshold changes (management-level)CIAI
Approve threshold changes (board-level)CICAI
Investigate and remediate breachRCAI
Produce board/committee reportingIIRAI

R = Responsible, A = Accountable, C = Consulted, I = Informed

This RACI should be embedded in your KRI policy, not just the library spreadsheet. When an examiner asks to see your KRI governance framework, the RACI is the artifact that demonstrates the accountability model is deliberate — not improvised.

Threshold Governance: The Most Overlooked Component

Threshold governance is the part of KRI programs that most internal audit teams flag as deficient, and for good reason. Thresholds set at program launch and never reviewed again are one of the most reliable ways to produce a perpetually green dashboard that doesn’t reflect actual risk.

The governance requirements:

Annual review minimum. Every threshold should be reviewed at least annually against the current business environment. A threshold calibrated for a portfolio of 50,000 transactions per month is wrong for a portfolio of 500,000. Volume changes, product changes, and regulatory changes all affect what constitutes a meaningful threshold level.

Documented rationale for current thresholds. The KRI library should include, for each metric, the basis for the current threshold — not just the number. “Red at >5% exception rate because analysis of 2023-2025 loss data showed that rates above 4.8% preceded loss events in 85% of cases” is a defensible threshold. “Red at >5% because that’s a round number” is not.

Approved change log. Any threshold change should be documented with the prior threshold, new threshold, rationale, approver, and date. When an examiner asks why a threshold was loosened 18 months ago, you need that documentation. Without it, the threshold change looks like it was made to avoid escalation — which is sometimes exactly what happened.

Mandatory justification for loosening. Any change that makes a threshold less sensitive — moving the amber trigger from 3% to 5%, for example — should require a documented business case and approval one level higher than the metric owner. Tightening a threshold is typically encouraged without heightened oversight. Loosening one is the change that requires scrutiny.

Escalation Procedures That Actually Work

Well-designed escalation procedures specify four things: who gets notified, within what timeframe, with what information, and what response is required.

Amber escalation: Notification to metric owner’s functional lead and second-line risk officer for the domain, within 2 business days of breach. Written summary: metric value, threshold, cause assessment, interim action if any, expected resolution path. No mandatory committee reporting unless amber persists beyond 30 days.

Red escalation: Notification to CRO and relevant functional head within 24 hours. Written escalation memo within 48 hours. Automatic inclusion in next Risk Committee agenda, or interim briefing if the next scheduled meeting is more than 2 weeks away. Board notification if red persists beyond the management response window (typically 30–45 days).

Persistent breach protocol: If a KRI remains amber or red for more than two consecutive reporting periods without a documented remediation plan, that should trigger an independent review by the second or third line. Persistent breaches without management response are a governance failure, not just a performance issue.

Document the escalation procedure in your KRI policy, not just in the library spreadsheet. Escalation procedures embedded only in a spreadsheet are procedurally invisible — examiners reviewing your governance framework need to find the policy, not reverse-engineer it from a spreadsheet note.

Keeping Ownership Current

KRI ownership goes stale when organizations change. Reorganizations, leadership transitions, new business lines, and process changes all affect who should own a given metric. An annual ownership review is the minimum — but ownership should also be validated as a standing step in any significant organizational change process.

Common stale-ownership scenarios:

  • The named metric owner left the organization 8 months ago; a successor was named for the role but never updated in the KRI library
  • The function responsible for a process was reorganized into a different reporting line; the KRI ownership wasn’t updated to reflect the new reporting structure
  • A KRI that was appropriate for a legacy process no longer measures the right thing after a system migration; the owner hasn’t been engaged to review relevance

Each of these produces the same downstream failure: when the metric moves, nobody knows whose job it is to respond. The metric owner field in the library becomes a historical artifact rather than an actionable accountability assignment.

For the larger governance structure — including how to build and sustain a KRI program with functional leads across the organization — see how to build a KRI task force. For how to separate board-level risk indicators from operational management metrics, see operational risk KRI dashboard: what to show the board vs management.

What Examiners Test

Regulators reviewing KRI governance programs are not primarily reviewing the dashboard. They’re reviewing the governance infrastructure behind it.

The OCC’s Comptroller’s Handbook on Internal Controls and FDIC examination guidance both emphasize that effective risk monitoring requires clear accountability assignments, not just metric selection. In practice, examiners test governance by:

  • Requesting the KRI library and asking for the named owner of each metric
  • Asking to see the escalation log for the past 12 months: which metrics breached amber or red, what response was documented, and who was notified
  • Reviewing Risk Committee minutes for evidence that KRI results were discussed substantively, not just presented and noted
  • Asking for the threshold change log and reviewing any threshold loosening for documentation of rationale and approval
  • Checking whether the current threshold for any KRI is tighter than or equal to the corresponding risk appetite limit

A program that fails these tests — no named owners, no escalation log, Risk Committee minutes that note KRI presentation without discussion, threshold changes without approval documentation — will generate governance findings regardless of whether the dashboard shows green.

So What Does This Mean for Your KRI Program?

Pull your KRI library and check each metric for six things: named metric owner (not “Risk Management”), named data owner, documented threshold approver, escalation recipient for amber and red, action owner for breach response, and board reporting owner.

Any metric missing any of these is a governance gap — not because a regulator said so, but because a KRI without an owner is a dashboard stat. It measures something, but nobody is accountable for acting when it moves.

Documenting ownership takes less time than rebuilding a program after an exam finding. Build the RACI into your KRI library now, before the examiner asks who owns the metric that’s been amber for three months without a management response.

The KRI Library (132 Key Risk Indicators) includes pre-built owner fields, data source documentation, and escalation trigger definitions for each of the 132 indicators — structured so you can assign accountability before you go live, not retrofit it after an audit. Get it at https://buy.stripe.com/eVq5kw2cPcNZazP6uW6J209.

◆ Need the working template?

Start with the source guide.

These answer-first guides summarize the required fields, evidence, and implementation steps behind the templates practitioners search for.

◆ Immaterial Findings · Weekly

Sharp risk & compliance insights. No fluff.

◆ FAQ

Frequently asked questions.

Who should own a KRI?
The metric owner should be the person or function responsible for the underlying business process that generates the risk — not the risk team. Risk's job is oversight and governance: challenging thresholds, reviewing escalation patterns, and ensuring the library stays connected to risk appetite. For example, the BSA operations lead owns SAR backlog age as a KRI; the risk team reviews whether the threshold is appropriate and whether escalations are being handled. 'Risk Management' as the owner of every KRI is a governance design failure.
What's the difference between the metric owner and the data owner?
The metric owner is accountable for the KRI reading, escalation, and remediation when a threshold is breached. The data owner manages the source system that feeds the metric — the system of record, the data pipeline, and the data quality controls. These roles often sit in different functions. A payment operations lead might own an exception rate KRI, while IT or finance owns the transaction system that produces the data. When the data feed fails, the data owner resolves it. When the metric breaches a threshold, the metric owner escalates and manages the response.
Who approves KRI threshold changes?
Threshold changes for board-level KRIs require Risk Committee or board approval, because KRI thresholds connect directly to risk appetite limits. Management-level KRI threshold changes typically require CRO or head of risk approval. Business-unit-level KRI thresholds can often be managed by the second line with documentation. The key governance requirement: any loosening of a threshold — allowing more risk before escalation triggers — must go through an approval path at least one level higher than the owner who benefits from the looser threshold.
What's the escalation path when a KRI hits red?
A red KRI should trigger: (1) immediate notification to the metric owner and their functional lead, (2) a written escalation memo within 24–48 hours documenting the metric value, threshold, likely cause, and proposed interim actions, (3) notification to the CRO or equivalent if the risk falls within an appetite-sensitive domain, and (4) Risk Committee reporting if the breach persists beyond the management response window. What should not happen: a KRI sits at red for two weeks while the owner decides how to handle it. Red means the risk appetite limit has been approached or breached — that's a governance event, not a management discretion call.
How often should KRI ownership be reviewed?
At minimum annually as part of the KRI library review cycle. In practice, ownership should be validated any time there is a significant organizational change: a reorganization, a new business line, a regulatory change affecting the risk domain, or a change in the underlying process the KRI monitors. Stale ownership — where the named owner no longer works in that function or no longer has access to the source data — is one of the most common KRI governance findings in internal audits and regulatory exams.
What do examiners look for in KRI governance?
OCC, FDIC, and Federal Reserve examiners reviewing KRI governance look for: named metric owners with documented accountability, evidence that amber and red breaches have triggered actual management action rather than just a dashboard color change, threshold changes that went through an appropriate approval process, and Risk Committee minutes showing KRI results being discussed rather than just presented. A KRI library where every metric is owned by 'Risk Management' — with no functional business owner — is a program design deficiency, not a minor documentation gap.
Rebecca Leung

Author

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

◆ Related framework

KRI Library (132 Key Risk Indicators)

132 KRIs with thresholds, data sources, and escalation triggers pre-built for financial services.

Immaterial Findings · Newsletter

The brief, in your inbox.

Enforcement of the week, a framework breakdown, and the prompts that are actually worth running. Delivered to your inbox. Free.