This gap analysis document provides a simple framework for evaluation the current status of a CSMS controls according to ISO/IEC27002:2022 standard. The status column is marked by one of the following identifiers:
The evidence shall be provided by the target user, while optional comment maybe added by the target user or the assessor.
| Requirement | Status (V, P, M, N/A) | Evidence | Comments | 
|---|---|---|---|
| 5.1. Policies for information security | |||
| 5.2. Information security roles and responsabilities | |||
| 5.3. Segregation of duties | |||
| 5.4. Management responsabilities | |||
| 5.5. Contact with authorities | |||
| 5.6. Contact with special interest groups | |||
| 5.7. Threat intelligence | |||
| 5.8. Information security in project management | |||
| 5.9. Inventory of information and other associated assets | |||
| 5.10. Acceptable use of information and other associated assets | |||
| 5.11. Return of assets | |||
| 5.12. Classification of information | |||
| 5.13. Labelling of information | |||
| 5.14. Information transfer | |||
| 5.15. Access control | |||
| 5.16. Identity management | |||
| 5.17. Authentication information | |||
| 5.18. Access rights | |||
| 5.19. Information security in supplier relationships | |||
| 5.20. Addressing information security within supplier agreements | |||
| 5.21. Managing information security in the information and communication technology (ICT) supply chain | |||
| 5.22. Monitoring, review and change management of supplier services | |||
| 5.23. Information security for use of cloud services | |||
| 5.24. Information security incident management planning and preparation | |||
| 5.25. Access and decision on information security events | |||
| 5.26. Response to information security incidents | |||
| 5.27. Learning from information security incidents | |||
| 5.28. Collection of evidence | |||
| 5.29. Information security during disruption | |||
| 5.30. ICT readiness for business continuity | |||
| 5.31. Legal, statutory, regulatory and contractual requirements | |||
| 5.32. Intellectual property rights | |||
| 5.33. Protection of records | |||
| 5.34. Privacy and protection of personal identifiable information (PII) | |||
| 5.35. Independant review of information security | |||
| 5.36. Compliance with policies, rules, and standards for information security | |||
| 5.37. Documented operation procedures | 
| Requirement | Status (V, P, M, N/A) | Evidence | Comments | 
|---|---|---|---|
| 6.1. Screening | |||
| 6.2. Terms and condition of employments | |||
| 6.3. Information security awareness, education and training | |||
| 6.4. Disciplinary process | |||
| 6.5. Responsabilities after termination or change of employment | |||
| 6.6. Confidentiality or non discolsure agreements | |||
| 6.7. Remote working | |||
| 6.8. Information security event reporting | 
| Requirement | Status (V, P, M, N/A) | Evidence | Comments | 
|---|---|---|---|
| 7.1. Physical security perimeters | |||
| 7.2. Physical entry | |||
| 7.3. Securing offices, rooms, and facilities | |||
| 7.4. Physical security monitoring | |||
| 7.5. Protecting against physical and environmental threats | |||
| 7.6. Working in secure areas | |||
| 7.7. Clear desk and clear screen | |||
| 7.8. Equipment sitting and protection | |||
| 7.9. Security of assets off-premises | |||
| 7.10. Storage media | |||
| 7.11. Supporting utilities | |||
| 7.12. Cabling security | |||
| 7.13. Equipment maintenance | |||
| 7.14. Secure disposal or re-use of equipment | 
| Requirement | Status (V, P, M, N/A) | Evidence | Comments | 
|---|---|---|---|
| 8.1. Use end point devices | |||
| 8.2. Privileged access rights | |||
| 8.3. Information access restriction | |||
| 8.4. Access to source code | |||
| 8.5. Secure authentication | |||
| 8.6. Capacity management | |||
| 8.7. Protection against malware | |||
| 8.8. Management of technical vulnerabilities | |||
| 8.9. Configuration management | |||
| 8.10. Information deletion | |||
| 8.11. Data masking | |||
| 8.12. Data leakage prevention | |||
| 8.13. Information backup | |||
| 8.14. Redundancy of information processing facilities | |||
| 8.15. Logging | |||
| 8.16. Monitoring activities | |||
| 8.17. Clock synchronization | |||
| 8.18. Use of privileged utilities programs | |||
| 8.19. Installation of software on operational systems | |||
| 8.20. Network security | |||
| 8.21. Security of network services | |||
| 8.22. Segragation of networks | |||
| 8.23. Web filtering | |||
| 8.24. Use of cryptography | |||
| 8.25. Secure development life cycle | |||
| 8.26. Application security requirements | |||
| 8.27. Secure system architecture and engineering principles | |||
| 8.28. Secure coding | |||
| 8.29. Security testing in development and acceptance | |||
| 8.30. Outsourced development | |||
| 8.31. Separation of development, test, and production environments | |||
| 8.32. Change management | |||
| 8.33. Test information | |||
| 8.34. Protection of information systems during audit testing |