Gap Analysis ISO 27001-2013
Gap Analysis ISO 27001-2013
Gap Analysis ISO 27001-2013
Ask yourselves the following questions to assess your progress towards achieving ISO
27001:2013
Do we have and maintain the following documentation and records?
These are the mandatory documents:
Do we comply? Y/N
3. Have you determined how internal and external issues could influence the ISMS’s ability to
achieve its intended outcomes?
5.0 LEADERSHIP
8. Are the general ISMS objectives compatible with the strategic direction?
9. Does management ensure the necessary ISMS resources are available as needed?
10. Does management ensure that ISMS achieves its intended outcomes?
5.2 POLICY
11. Does an Information Security Policy exist with included objectives or a framework for setting
objectives?
12. Is the Information Security Policy documented and communicated within the company and to Y
other interested parties?
13. Are roles, responsibilities, and authorities for information security assigned and Y
communicated?
6.0 PLANNING
14. Are internal and external issues, as well as interested parties' requirements, considered while
addressing risks and opportunities?
15. Is there a documented process to identify information security risks, including the risk Y
acceptance criteria and criteria for risk assessment?
16. Is the risk treatment process documented, including the risk treatment options and how to
create a Statement of Applicability?
18. Is there a plan, or group of plans, in place to achieve the information security objectives and
targets including designated responsibility, evaluation method, and the means & timeframe for the
plan(s)?
7.0 SUPPORT
7.1 Resources
19. Are adequate resources provided for all the elements of the ISMS?
7.2 Competence
20. Is appropriate competence assessed, and training provided where needed, for personnel
doing tasks that can affect the information security? Are records of competences maintained?
7.3 Awareness
21. Is the personnel aware of the Information Security Policy, of their role, and consequences of
not complying with the rules?
22. Is there a process for communication related to information security, including the
responsibilities and what to communicate, to whom and when?
23. Does the documentation of the ISMS include the Information Security Policy, objectives &
targets, the scope of the ISMS, the main elements and their interaction, documents and records of
ISO 27001 and those identified by the company?
24. Is it ensured that managing of documents and records exists, including who reviews and
approves documents, and where and how they are published, stored, and protected?
8.0 OPERATIONS
26. Does the organisation have the necessary documented information to be confident that its
processes are being carried out as planned?
27. Are planned changes controlled? Are consequences of unplanned changes reviewed to
identify mitigation actions if necessary?
29. Are the risks, their owners, likelihood, consequences, and the level of risk identified? Are these
results documented?
31. Is there a documented list with all controls deemed as necessary, with proper justification and
ISO 27001:2013 Gap Analysis
implementation status?
32. Is it defined what needs to be measured, by which method, who is responsible, who will
analyse and evaluate the results?
33. Are the results of measurement documented, analysed, and evaluated by responsible
persons?
34. Does an audit program exist that defines the timing, responsibilities, reporting, audit criteria,
and scope?
35. Are internal audits performed according to an audit program, results reported through an
internal audit report, and relevant corrective actions raised?
36. Is management review regularly performed, and are the results documented in minutes of the
meeting?
37. Did management decide on all the crucial issues important for the success of the ISMS?
10.0 IMPROVEMENT
39. Does the organisation consider eliminating the cause of the nonconformity and, where
appropriate, take corrective action?
41. Is the ISMS continuously adjusted to maintain its suitability, adequacy, and effectiveness?
ANNEX A.
(Note: only the controls marked as applicable in the Statement of Applicability need to be
implemented.)
42. Are there published policies, approved by management, to support information security ?
45. Are duties and responsibilities properly segregated considering situations of conflict of
interest?
50. Are there rules defining how the organisation's information is protected considering
teleworking sites?
51. Does the organisation perform background checks on candidates for employment or for
contractors?
52. Are there agreements with employees and contractors that specify information security
responsibilities?
53. Is management actively requiring all employees and contractors to comply with information
security rules?
54. Do employees and contractors attend trainings to better perform their security duties, and do
the awareness programs exist?
56. Are there agreements covering information security responsibilities that remain valid after the
termination of employment?
58. Does every asset in the inventory of assets have a designated owner?
60. Are company assets returned by employees and contractors when their employment is
terminated?
62. Are there procedures which define how to label and handle classified information?
64. Are there procedures which define how to handle removable media in line with the
classification rules?
66. Is the media that contains sensitive information protected during transportation?
68. Do the users have access only to the resources they are allowed to?
70. Is there a formal access control system when logging into information systems?
ISO 27001:2013 Gap Analysis
71. Are privileged access rights managed with special care?
72. Are passwords and other secret authentication information provided in a secure way?
73. Do asset owners periodically check all the privileged access rights?
74. Are access rights updated when there is a change in the user situation (e.g.: organisational
change or termination)?
75. Are there rules for users on how to protect passwords and other authentication information?
76. Is the access to information in systems restricted according to the access control policy?
77. Is secure log-on required on systems according to the Access Control Policy?
78. Do the password management systems used by the organisation help users to securely
manage their authentication information?
79. Is the use of utility tools controlled and limited to specific employees?
A.10 CRYPTOGRAPHY
93. Is information and equipment removal to outside of the organization premises controlled?
94. Are the organization assets properly protected when they are not at the organization
premises?
95. Is information properly removed from media or equipment that will be disposed of?
96. Are there rules to protect equipment when not in physical possession of its users?
97. Is there orientation for users about what to do when they are not present at their workstations?
ISO 27001:2013 Gap Analysis
A.12 OPERATIONAL SECURITY
100. Are resources monitored and plans made to ensure their capacity to fulfill users' demands?
102. Are anti-virus software, and other software for malware protection installed and properly
used?
113. Are security requirements for network services defined, and included in agreements?
116. Do agreements with third parties consider the protection during information transfer?
117. Are the messages that are exchanged over the networks properly protected?
118. Does the organization list all the confidentiality clauses that need to be included in
agreements with third parties?
119. Are security requirements defined for new information systems, or for any changes to them?
121. Is transaction information transferred through the public networks appropriately protected?
122. Are rules for the secure development of software and systems defined?
124. Are critical applications properly tested after changes made in operating systems?
132. Is there a policy on how to treat the risks related to suppliers and partners?
133. Are relevant security requirements included in the agreements with the suppliers and
partners?
134. Do the agreements with providers and suppliers include security requirements?
136. Are changes involving arrangements and contracts with suppliers and partners taking into
account risks and existing processes?
145. Do procedures exist that ensure the continuity of information security during a crisis or a
disaster?
147. Does IT infrastructure have redundancy (e.g.: secondary location) included in its planning and
operation?
A.18 COMPLIANCE
154. Do the managers regularly review if the security policies and procedures are performed
properly in their areas of responsibility?
155. Are information systems regularly reviewed to check their compliance with the information
security policies and standards?