GAP Analysis V1
GAP Analysis V1
GAP Analysis V1
5
4
3
2
1
0
Ratings Legend
Value
Score 3.01 to 5.01
Score 1.01 to 3.00
Score 0 to 1.00
Description
Control is not in place and there are no approved plans to implement.
Control is not in place but there are approved plans to implement.
Control is partially in place but no approved plans to implement.
Control is partially in place with approved plans to implement.
Control is in place with exceptions.
Control is in place without exceptions.
Ratings Legend
Description Color Threshold
Significant gap from ISO 27001 compliance. Reference
Partial achievement of ISO 27001 compliance. Upper Lower
ISO 27001 compliant. 3.01 1.01
GAP ASSESSMENT SHEET - ISO 27001:2013
Domain/Subdomain/Control
A.5 Information Security Policies
A.5.1 Management Direction for Information Security
A.6.2.2 Teleworking
A.7.1.1 Screening
A.11.2 Equipment
A.12.3 Backup
A.12.3.1 Information backup
A.17.2 Redundancies
A.17.2.1 Availability of information
processing facilities
A.18 Compliance
A.18.1 Compliance with legal and contractual
requirements
Objective
100%
50%
100%
50%
10%
50%
A policy and supporting security measures shall be adopted to
manage the risks introduced by using mobile devices
25%
25%
100%
33.33%
33.33%
Management shall require all employees and contractors to apply
information security in accordance with the established policies and
procedures of the organization
11.11%
33.33%
100%
33.33%
8.33%
Rules for the acceptable use of information and of assets associated
with information and information processing facilities shall be
identified, documented and implemented
8.33%
All employees and external party users shall return all of the
organizational assets in their possession upon termination of their 8.33%
employment, contract or agreement
33.33%
33.33%
100%
25%
Users shall only be provided with access to the network and network
services that they have been specifically authorized to use 12.50%
25%
A formal user registration and de-registration process shall be
implemented to enable assignment of access rights
4.16%
4.16%
4.16%
4.16%
4.16%
The access rights of all employees and external party users to
information and information processing facilities shall be removed
upon termination of their employment , contract or agreement, or
adjusted upon change
4.16%
25%
25%
Access to information and application system functions shall be
restricted in accordance with the access control policy 5%
5%
100%
100%
50%
50%
8.33%
Physical security for offices, rooms and facilities shall be designed and
applied
8.33%
8.33%
Access points such as delivery and loading areas and other points
where unauthorized persons could enter the premises shall be
controlled and, if possible, isolated from information processing 8.33%
facilities to avoid unauthorized access
50%
5.55%
5.55%
5.55%
All items of equipment containing storage media shall be verified to
ensure that any sensitive data and licensed software has been
removed or securely overwritten prior to disposal or re-use
5.55%
A clear desk policy for papers and removable storage media and a
clear screen policy for information processing facilities shall be 5.55%
adopted
100.00%
14.29%
3.57%
14.29%
14.29%
Backup copies of information, software and system images shall be
taken and tested regularly in accordance with and agreed backup
policy
14.29%
14.29%
Event logs recording user activities, exceptions, faults and information
security events shall be produced, kept and regularly reviewed
3.57%
3.57%
3.57%
14.29%
Procedures shall be implemented to control the installation of
software on operational systems 14.29%
14.29%
Information about technical vulnerabilities of information systems
being used shall be obtained in a timely fashion, the organization's
exposure to such vulnerabilities evaluated and appropriate measures 7.15%
taken to address the associated risk.
Rules governing the installation of software by users shall be
established and implemented 7.15%
14.29%
100%
50%
16.66%
50%
12.50%
12.50%
100%
33.33%
33.33%
33.33%
Test data shall be selected carefully, protected and controlled 33.33%
100%
50%
50%
100%
100%
100%
50%
50%
Information processing facilities shall be implemented with
redundancy sufficient to meet availability requirements 50%
100%
50%
10%
50%
5.0
5.0
5.0
5.0
5
4.3
5.0
3.0
3
5.0
4.0
3.0
3
3
5.0
4.0
4.5
4.0
4.7
5
5
5
5.0
4.5
4.0
4.0
5
3.6
4.3
5
5
2.9
3
5
3.9
5.0
0.0
3.0
4.5
3
5.0
5.0
5
5
5.0
3.5
3.3
3.8
0
5
#DIV/0!
5.0
#DIV/0!
#DIV/0!
4.3
3.7
5.0
5.0
5.0
5
5
5.0
5.0
5.0
4.7
4.4
3
4
5.0
5
Observations/ As-Is Practice (s) Gap(s)