ISO 27001 2022 Gap Analysis Tool
ISO 27001 2022 Gap Analysis Tool
ISO 27001 2022 Gap Analysis Tool
2) enter the appropriate status symbols (see footer) under the ‘Policy’ and ‘Other Document’ columns;
3) enter the identifying reference of the ‘Other Document’ in the ‘Document Reference column;
4) in the ‘Comment’ column, in addition to general comments, record both comments on the status and actions required;
5) text in blue shows the changes and additions introduced with the 2022 edition of the Standard.
5 Leadership
5.1 Leadership and commitment
Has top management demonstrated leadership and commitment with respect to the
information security management system by:
a) ensuring the information security policy and the information
security objectives are established and are compatible with the strategic
direction of the organization;
b) ensuring the integration of the information security
management system requirements into the organization’s
processes;
5.2 Policy
Has top management established an information security policy that:
a) is appropriate to the purpose of the organization;
Clause Policy Other Document
Document Reference
b) includes information security objectives (see 6.2) or provides
the framework for setting information security objectives;
c) includes a commitment to satisfy applicable requirements related to
information security; and
d) includes a commitment to continual improvement of the information
security management system?
Is the information security policy:
e) available as documented information;
f) communicated within the organization; and
g) available to interested parties, as appropriate?
5.3 Organizational roles, responsibilities and authorities
Has top management ensured that the responsibilities and authorities
for roles relevant to information security are assigned and communicated within the
organiation?
Has top management assigned the responsibility and authority for:
a) ensuring that the information security management system
conforms to the requirements of the ISO 27001 Standard; and
b) reporting on the performance of the information security management
system to top management?
NOTE Top management may also assign responsibilities and authorities for reporting
performance of the information security management system within the organization.
6 Planning
6.1 Actions to address risks and opportunities
6.1.1 General
When planning for the information security management system, has the organization
considered the issues referred to in 4.1 and the requirements referred to in 4.2 and
determined the risks and the
opportunities that need to be addressed to:
a) ensure the information security management system can achieve its
intended outcome(s);
b) prevent, or reduce, undesired effects; and
c) achieve continual improvement?
Has the organization planned:
d) actions to address these risks and opportunities; and
e) how to
1) integrate and implement the actions into its information
security management system processes; and
Clause Policy Other Document
Document Reference
2) evaluate the effectiveness of these actions?
6.1.2 Information security risk assessment
Has the organization defined and applied an information security risk assessment
process that:
a) establishes and maintains information security risk criteria that include:
7 Support
7.1 Resources
Does the organization determine and provide the resources needed for the
establishment, implementation, maintenance and continual
improvement of the information security management system?
7.2 Competence
Does the organization:
a) determine the necessary competence of person(s) doing
work under its control that affects its information security performance;
NOTE Applicable actions may include, for example: the provision of training
to, the mentoring of, or the reassignment of current employees; or the
hiring or contracting of
competent persons.
7.3 Awareness
Are persons doing work under the organization’s control aware of:
a) the information security policy;
b) their contribution to the effectiveness of the information security
management system, including the benefits of
improved information security performance; and
c) the implications of not conforming with the information security
management system requirements?
7.4 Communication
Has the organization determined the need for internal and external
communications relevant to the information security management system including:
a) on what to communicate;
b) when to communicate;
c) with whom to communicate;
d) who shall communicate; and
e) the processes by which communication shall be effected?
Clause Policy Other Document
Document Reference
7.5 Documented information
7.5.1 General
Does the organization’s information security management system
include:
a) documented information required by the ISO 27001 Standard; and
a) it is available and suitable for use, where and when it is needed; and
8 Operation
8.1 Operational planning and control
Does the organization plan, implement and control the processes needed to meet
information security requirements, and to implement the actions determined in 6, by:
- establishing criteria for the process;
- implementing control of the processes in accordance with the criteria?
Does the organization shall keep documented information to the extent necessary to
have confidence that the processes have been
carried out as planned?
Does the organization control planned changes and review the consequences of
unintended changes, taking action to mitigate any adverse effects, as necessary?
10 Improvement
10.1 Nonconformity and corrective action
When a nonconformity occurs, does the organization:
a) react to the nonconformity, and as applicable:
1) take action to control and correct it; and
2) deal with the consequences;
Clause Policy Other Document
Document Reference
b) evaluate the need for action to eliminate the causes of
nonconformity, in order that it does not recur or occur elsewhere, by:
Prepared by:
Date prepared:
ed;
Comment
Comment
Comment
Comment
Comment
Comment
Comment
Comment
Comment
Comment
Comment