Coconote
AI notes
AI voice & video notes
Try for free
🔍
Conducting IT Security Gap Analysis
May 25, 2025
Gap Analysis in IT Security
Definition
Gap Analysis:
A study comparing the current state to the desired state.
Purpose in IT Security:
To understand necessary future security needs.
Complexity
Involves analyzing current environment and planning future security improvements.
Takes weeks, months, or even years.
Requires collaboration across various organizational divisions.
Preparation
Baseline Creation:
Establish a baseline to know where the organization currently stands and the desired goals.
Sources of Baselines:
National Institute of Standards and Technologies (NIST) SP 800-171 revision 2
ISO/IEC 27001 by the International Organization for Standardization and the International Electrotechnical Commission
Custom baselines based on specific organizational needs.
Components of Baseline Analysis
People:
Assess experience and training in IT security.
Understand knowledge of specific security policies and procedures.
Policies:
Evaluate existing IT systems against formal security policies.
Gap Analysis Process
System Comparison:
Identify weaknesses in existing systems.
Compare weaknesses to effective processes for compensation.
Detailed Analysis:
Break down broad security categories into smaller segments.
Example: Access control broken down into user registration, provisioning, and privileged access rights.
Final Documentation
Summary Document:
Compare detailed baseline objectives with current status.
Identify necessary steps (time, money, equipment) to reach the desired state.
Gap Analysis Report:
Include current status and pathway for future improvements.
Document recommendations to meet baselines.
Reporting
Example Table:
System requirements broken into smaller parts for detailed analysis.
Evaluate remote sites against baseline objectives.
Use color coding (green, yellow, red) to indicate proximity to baselines.
Focus improvement efforts starting with red, then yellow, and finally green.
Report Details:
Explanation of color coding.
Summary of steps to implement security controls.
📄
Full transcript