cyris360-framework

Instructions

This gap analysis document provides a simple framework for evaluation the current status of a ISMS according to ISO/IEC27001:2022 standard. The status column is marked by one of the following identifiers:

The evidence shall be provided by the target user, while optional comment maybe added by the target user or the assessor.

Part 1: Requirements

Chapter 4: Context of the organization

Requirement Status (V, P, M, N/A) Evidence Comments
4.1 Understanding the organization and its context      
4.2 Understanding the needs and expectations of interested parties      
4.3 Determining the scope of the information security management system      
4.4 Information security management system      

Chapter 5: Leadership

Requirement Status (V, P, M, N/A) Evidence Comments
5.1 Leadership and Commitment      
5.2 Policy      
5.3 Organizational roles, responsabilities and authorities      

Chapter 6: Planning

Requirement Status (V, P, M, N/A) Evidence Comments
6.1 Actions to address risks and opportunities      
6.2 Information security objectives and planning to achieve them      

Chapter 7: Support

Requirement Status (V, P, M, N/A) Evidence Comments
7.1 Resources      
7.2 Competence      
7.3 Awareness      
7.4 Communication      
7.5 Documented information      

Chapter 8: Operation

Requirement Status (V, P, M, N/A) Evidence Comments
8.1 Operational planning and control      
8.2 Information security risk assessment      
8.3 Information security risk treatment      

Chapter 9: Performance evaluation

Requirement Status (V, P, M, N/A) Evidence Comments
9.1 Monitoring, measurement, analysis and evaluation      
9.2 Internal audit      

Chapter 10: Improvement

Requirement Status (V, P, M, N/A) Evidence Comments
10.1 Continual improvement      
10.1 Nonconformity and corrective action      

Part 2: Controls

See gap assessment for ISO/IEC 27002:2022 - Information security controls