Coconote
AI notes
AI voice & video notes
Export note
Try for free
Gap Analysis in IT Security
Jun 12, 2024
Gap Analysis in IT Security
Overview
Gap Analysis
: Study of where we are vs. where we want to be
Purpose
: To understand future security needs
Complexity
: Involves detailed analysis, numerous participants, and extensive planning
Duration
: Can take weeks, months, or years
Baseline
Importance
: Provides a target for goals
Types of Baselines
:
National Institute of Standards and Technologies (NIST): Special Publication 800-171 Revision 2
International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC): ISO/IEC 27001
Custom baselines based on organizational needs
Analysis of People
Evaluate
:
Formal experience in IT security
Training
Knowledge of security policies and procedures
Policy Evaluation
Importance
: Ensuring adherence to IT security policies
Process
:
Evaluate existing IT systems
Compare to formal security policies
Analysis Process
Steps
:
Compare existing systems to identify weaknesses
Compare weaknesses to effective processes
Example
:
NIST 800-171 Revision 2: Access Control
Breakdown of Access Control:
User registration and deregistration
User access provisioning management
Management of privileged access rights
Review of user access rights
Final Document
Contents
:
Summary of findings across all processes and devices
Comparison of current state vs. desired state
Detailed Baseline objectives
Path to Improvement
:
Time, money, equipment, and change control needed
Gap Analysis Report
Documents
:
Current state vs. desired state
Pathway to improvement
Recommendations
Example Table
:
System Requirements labeled by site
Color-coded status (Green, Yellow, Red)
Details on improvement steps, colored status justification, and security controls
Prioritization
Impact
:
Start with locations/requirements marked in red
Proceed to yellow, then green
Include detailed methodology and steps
📄
Full transcript