Achieving ISO 27001 compliance is a well-recognized milestone for any organization seeking to demonstrate a strong commitment to information security. The first step on this journey is conducting a gap analysis. This helps you understand where your current practices stand relative to the standard’s requirements.
In this post, we’ll guide you through the key steps of performing an ISO 27001 gap analysis.

Step 1: Define the Scope of Your Certification
Before you even open a document or tool, you need to figure out the scope of your certification. The scope defines what parts of your organization will be covered under ISO 27001 and ensures that the ISO 27001 scope of certification gap analysis and reporting
is focused on the relevant areas.
ISO 27001 doesn’t require you to certify your entire organization. You can choose to include only specific departments, geographic locations, or systems. For example, if only your cloud operations team handles sensitive customer data, you might limit the scope to that team and the infrastructure it uses.
What You Need to Do:
- Gather Organizational Documents: Open your organizational chart, asset register, and any existing ISMS documents. These will give you an overview of your current security posture and where the ISO 27001 certification will apply.
- Identify Critical Assets: Take a look at your risk management plan or asset register and list the assets or information systems that need protection (e.g., databases, servers, or sensitive documents).
- Determine the Scope: Decide whether the certification will apply to your entire organization, specific business units, or particular information systems. This will guide the focus of your gap analysis.

Step 2: Review the ISO 27001 Standard
ISO 27001 provides a framework for information security, but to conduct a gap analysis, you need to understand its requirements. The standard is divided into several clauses that lay out the necessary controls and processes.
What You Need to Do:
1. Get the Official Standard:
If you don’t already have a copy, purchase or download the official ISO/IEC 27001:2022 document from the ISO website or your national standards body. This will be your source of truth.
2. Focus on the Core Clauses (Clauses 4 to 10):
These are the mandatory components that define how an ISMS should operate. They cover:
- Clause 4: Context of the organization — understanding internal/external issues, stakeholders, and ISMS scope
- Clause 5: Leadership — roles, responsibilities, and top management commitment
- Clause 6: Planning — including risk assessments, risk treatment, and setting objectives
- Clause 7: Support — resources, competence, awareness, and communication
- Clause 8: Operation — implementing plans and managing ISMS processes
- Clause 9: Performance evaluation — monitoring, auditing, and reviewing the ISMS
- Clause 10: Improvement — addressing nonconformities and continuous improvement
3. Don’t Skip Annex A:
While the clauses describe what the ISMS must achieve, Annex A lists the 93 reference controls that help you get there. These cover areas like access control, encryption, physical security, and supplier relationships. You’ll compare your existing controls to these during the gap analysis.

Step 3: Conduct a Self-Assessment of Your Current ISMS
Now that you understand what ISO 27001 requires, it’s time to assess where your organization currently stands. This is the internal review phase, where you’ll test your existing security practices and compare them against ISO 27001 standards.
What You Need to Do:
- Gather Your Current ISMS Documentation: Look at all the policies, procedures, and reports you currently have in place, such as:
- Information security policies
- Risk assessment reports
- Access control procedures
- Incident response plans
- Information security policies
- Use an ISO 27001 Gap Analysis Checklist: If you’re working with spreadsheets, create or download an ISO checklist based on Annex A of ISO 27001. This checklist should cover all the controls outlined in the standard and provide space to mark whether your practices meet the required controls.
For example, your checklist might include:
- Control A.5.1 Information Security Policy – Do we have a documented policy in place? [Yes/No]
- Control A.9.2 User Access Management – Are user access rights reviewed regularly? [Yes/No]
- Control A.5.1 Information Security Policy – Do we have a documented policy in place? [Yes/No]
- Identify Gaps: For each control in the checklist, identify where your organization’s practices are lacking. If you have a policy but it’s outdated or not followed correctly, mark that as a gap.
Step 4: Identify and Prioritize Gaps
Once you’ve completed the self-assessment and identified gaps, the next step is to prioritize them. Not all gaps carry the same weight, so it’s essential to evaluate their impact on your organization’s overall security.
What You Need to Do:
- Rate Each Gap: For each identified gap, assess its potential impact and urgency. You might categorize them like this:
- High Impact / High Urgency: Critical security controls missing, such as a lack of regular risk assessments.
- Medium Impact / Medium Urgency: Minor issues, like inconsistent user access reviews.
- Low Impact / Low Urgency: Non-critical issues, such as incomplete documentation for less sensitive systems.
- High Impact / High Urgency: Critical security controls missing, such as a lack of regular risk assessments.
- Document and Prioritize: Create a prioritized list of gaps. You can use a table or a project management tool to track them.
- Set Deadlines: For each gap, set realistic deadlines for completion. Ensure you assign the responsibility to the right team to ensure accountability.
Start Getting Value With
Centraleyes for Free
See for yourself how the Centraleyes platform exceeds anything an old GRC
system does and eliminates the need for manual processes and spreadsheets
to give you immediate value and run a full risk assessment in less than 30 days
Step 5: Create an Action Plan to Address the Gaps
Now comes the fun part: turning those gaps into actionable steps. Your action plan will provide clear, structured tasks to ensure every gap is addressed in a timely manner.
What You Need to Do:
- Break Down Actions: For each identified gap, break down the steps needed to close it. For instance, if you identified a gap in your access control process, your action steps might look like:
- Review the existing access control policy.
- Update the policy to include multi-factor authentication.
- Train staff on the new policy.
- Review the existing access control policy.
- Set SMART Goals: Ensure your action steps are Specific, Measurable, Achievable, Relevant, and Time-bound. For example:
- S: Update the user access control policy to include multi-factor authentication.
- M: Ensure that all team members are trained and that the policy is implemented.
- A: Assign this task to the IT department.
- R: Make sure the new policy aligns with ISO 27001.
- T: Complete by the end of the month.
- S: Update the user access control policy to include multi-factor authentication.
- Track Progress: You can use project management software like Trello, Asana, or even Excel to monitor progress and ensure that each step is completed on time.
Step 6: Implement Changes and Monitor Progress
With your action plan in place, it’s time to implement the changes and monitor their progress. This step ensures you’re not just talking about improvement—you’re taking tangible steps to address gaps.
What You Need to Do:
- Assign Tasks: Begin implementing your action plan, ensuring the right teams handle their assigned tasks.
- Track in Real Time: Use an ISO 27001 gap analysis tool (more on that later) or manual tracking sheets to stay updated on each gap’s status.
- Monitor Changes: Regularly review progress to ensure all actions are being implemented as planned. If necessary, adjust the plan based on real-time feedback.
Step 7: Document Changes and Prepare for Certification
As you close the gaps, it’s crucial to keep track of all the changes made and the evidence supporting them. This documentation will be essential when it’s time for the certification audit.
What You Need to Do:
- Document Everything: Keep records of all changes, including updated policies, risk assessments, and training materials.
- Prepare for the Audit: Once all gaps are closed, review your documentation to ensure it’s complete and ready for audit. Schedule an internal audit to verify that everything aligns with ISO 27001.
Automated Platforms vs. Spreadsheets
Now, let’s talk about how automated platforms and spreadsheets can aid you in the gap analysis process.
Spreadsheet-Based Approach:
Spreadsheets are widely used for gap analysis but come with some limitations:
- Manual Effort: You’ll need to create your own gap analysis checklist based on ISO 27001’s controls. Each control needs to be manually compared to your existing policies, and gaps need to be identified and documented.
- Limited Reporting: While you can create basic reports and charts, spreadsheets don’t offer real-time dashboards or automated progress tracking.
- Collaboration Issues: Multiple team members working on a spreadsheet can lead to version control issues, especially with complex data.
Automated Platform Approach:
Automated platforms like Centraleyes streamline the gap analysis process by offering pre-built ISO 27001 gap analysis templates, real-time updates, and automated gap detection.
- Pre-built Templates: The platform already maps your current practices to ISO 27001 controls, saving time.
- Automated Reporting: The platform generates ISO 27001 gap analysis and reports with the click of a button, highlighting gaps, progress, and risks. You can easily track updates, deadlines, and completion rates in real time.
- Real-Time Collaboration: Teams can collaborate seamlessly, making it easy to track who is responsible for each task and when it’s due.
Conclusion: Get Ready for ISO 27001 Certification
Now that you’ve gone through the process step-by-step, you’re well-equipped to perform a gap analysis and make the necessary changes to align with ISO 27001. Whether you use spreadsheets or an automated platform, each method has its pros and cons. However, as your organization grows, an automated platform offers more scalability, real-time updates, and robust reporting to keep your ISO 27001 journey on track.