ISO 27001 Gap Analysis Checklist
ISO 27001 Gap Analysis Checklist
ISO 27001 Gap Analysis Checklist
Introduction
Use this spreadsheet to record and track your progress as you implement the mandatory and discretionary claus
The main body of ISO 27001 specifies a number of mandatory requirements that you must fulfil for your inform
standard. The mandatory requirements for certification concern the management system rather than the infor
your organisation's information security risks, assess them, decide how you'll treat those risks, treat them and m
make it compulsory for you to apply specific security controls.
However, Annex A to ISO 27001 outlines a set of information security controls that your management system wo
security controls in Annex A are explained in much more detail in ISO 27002, and in various other standards, law
2. Identify and assess the information security risks that face those parts of your organisation you've included in
controls' tab to identify any Annex A controls that do not apply to your organisation. Note: Do not feel constrain
you decide you need other security controls to treat your information security risks and obligations (e.g. ISO 223
3. Systematically check and record your progress in implementing your security controls, and update the 'Status
4. Once your ISMS is operating normally, and you have amassed sufficient evidence ("records"), it can be formal
check that your ISMS fulfils the standard's mandatory requirements, and that your information security risks are
of your ISMS. From that point on, you should both maintain (i.e. update it when the information security risks or
Copyright
Adapted from a document provided by the ISO27k Forum at www.ISO27001security.com.
ISO 27001 gap analysis
Clause ISO 27001 requirement Status Notes
5 Leadership
5.1 Leadership and commitment
5.1 Top management must demonstrate leadership and commitment to the ISMS Defined
5.2 Policy
5.2 Document the information security policy Nonexistent
5.3 Organisational roles, responsibilities and authorities
5.3 Assign and communicate information security roles and responsibilities Managed
6 Planning
6.1 Actions to address risks and opportunities
6.1.1 Design/plan the ISMS to satisfy the requirements, addressing risks and opportunities Initial
6.1.2 Define and apply an information security risk assessment process Limited
6.1.3 Document and apply an information security risk treatment process Unknown
6.2 Information security objectives and plans
6.2 Establish and document the information security objectives and plans Unknown
7 Support
7.1 Resources
7.1 Determine and allocate necessary resources for the ISMS Managed
7.2 Competence
7.2 Determine, document and make available necessary competences Limited
7.3 Awareness
7.3 Establish a security awareness program Unknown
7.4 Communication
7.4 Determine the need for internal and external communications relevant to the ISMS Unknown
7.5 Documented information
7.5.1 Provide documentation required by the standard plus that required by the organisation Unknown
7.5.2 Provide document titles, authors etc., format them consistently, and review and approve them Unknown
7.5.3 Control the documentation properly Nonexistent
8 Operation
8.1 Operational planning and control
8.1 Plan, implement, control and document ISMS processes to manage risks (i.e. a risk treatment plan) Unknown
8.2 Information security risk assessment
8.2 Reassess and document information security risks regularly and on changes Initial
8.3 Information security risk treatment
8.3 Implement the risk treatment plan (treat the risks!) and document the results Defined
9 Performance evaluation
9.1 Monitoring, measurement, analysis and evaluation
9.1 Monitor, measure, analyse and evaluate the ISMS and the controls Nonexistent
9.2 Internal audit
9.2 Plan and conduct internal audits of the ISMS Defined
9.3 Management review
9.3 Undertake regular management reviews of the ISMS Unknown
10 Improvement
10.1 Nonconformity and corrective action
10.1 Identify, fix and take action to prevent nonconformities from recurring, documenting the actions Optimised
10.2 Continual improvement
10.2 Continually improve the ISMS Nonexistent
27 Number of requirements
03/24/2019 Page2 of 6
Statement of applicability – which Annex A security controls are you applying?
Section Information security control Status Notes
A8 Asset management
A8.1 Responsibility for assets
A8.1.1 Inventory of assets Unknown
A8.1.2 Ownership of assets Unknown
A8.1.3 Acceptable use of assets Unknown
A8.1.4 Return of assets Unknown
A8.2 Information classification
A8.2.1 Classification of information Unknown
A8.2.2 Labelling of information Unknown
A8.2.3 Handling of assets Unknown
A8.3 Media handling
A8.3.1 Management of removable media Unknown
A8.3.2 Disposal of media Unknown
A8.3.3 Physical media transfer Unknown
A9 Access control
A9.1 Business requirements of access control
A9.1.1 Access control policy Unknown
A9.1.2 Access to networks and network services Unknown
A9.2 User access management
A9.2.1 User registration and de-registration Unknown
A9.2.2 User access provisioning Unknown
A9.2.3 Management of privileged access rights Unknown
A9.2.4 Management of secret authentication information of users Unknown
A9.2.5 Review of user access rights Unknown
A9.2.6 Removal or adjustment of access rights Unknown
A9.3 User responsibilities
A9.3.1 Use of secret authentication information Unknown
A9.4 System and application access control
A9.4.1 Information access restriction Unknown
A9.4.2 Secure log-on procedures Defined
A9.4.3 Password management system Initial
A9.4.4 Use of privileged utility programs Managed
A9.4.5 Access control to program source code Unknown
A10 Cryptography
A10.1 Cryptographic controls
03/24/2019 Page 3 of 6
Statement of applicability – which Annex A security controls are you applying?
Section Information security control Status Notes
A10.1.1 Policy on the use of cryptographic controls Unknown
A10.1.2 Key management Limited
A18 Compliance
A18.1 Compliance with legal and contractual requirements
A18.1.1 Identification of applicable legislation and contractual requirements Unknown
A18.1.2 Intellectual property rights Unknown
A18.1.3 Protection of records Unknown
A18.1.4 Privacy and protection of personally identifiable information Unknown
A18.1.5 Regulation of cryptographic controls Unknown
A18.2 Information security reviews
A18.2.1 Independent review of information security Unknown
A18.2.2 Compliance with security policies and standards Unknown
A18.2.3 Technical compliance review Unknown
114 Number of controls
03/24/2019 Page 5 of 6
Proportion of Proportion of
Status Progress ISMS
requirements
information
security controls How's your ISMS implementation going?
Unknown
Nonexistent
Initial
Limited
Defined
Managed
Optimised
Not applicable