Evergreen

ISO 27001 Gap Assessment Checklist

By QuickTrust Editorial

ISO 27001 Gap Assessment Checklist

150 Controls Across 14 Domains

Prepared by QuickTrust | trust.quickintell.com AI-Powered GRC Platform + Expert Engineering Implementation


How to Use This Checklist

This checklist maps to ISO/IEC 27001:2013 Annex A — the 114 controls across 14 domains that form the backbone of any ISO 27001 Information Security Management System (ISMS). Use it to assess your current state before beginning a formal certification engagement.

For each control, mark one of:

  • ✅ Implemented — Control is fully documented, implemented, and operating effectively with evidence
  • ⚠️ Partial — Control exists but is incomplete, inconsistently applied, or lacks documentation
  • ❌ Not Implemented — No control exists; significant gap requiring remediation
  • N/A — Control is not applicable to your organization (document justification in your Statement of Applicability)

After completing each domain, record:

  • Number of controls fully implemented
  • Number partially implemented
  • Number not implemented / not applicable

Use your results to:

  1. Build your Statement of Applicability (SoA)
  2. Prioritize your gap remediation roadmap
  3. Estimate your readiness for a Stage 1 (documentation) and Stage 2 (implementation) audit

Important: ISO 27001 certification requires that controls be implemented AND operating effectively with documented evidence over time. "Implemented" means you can prove it — not just that you believe it exists.


Domain A.5: Information Security Policies

Controls: A.5.1.1, A.5.1.2

A.5.1 Management Direction for Information Security

#ControlEvidence RequiredCommon GapStatus
A.5.1.1Policies for information security — A set of policies for information security shall be defined, approved by management, published, and communicated to employees and relevant external partiesSigned policy document; distribution records; acknowledgment sign-offs; version historyPolicies exist but have never been formally approved by leadership or distributed with documented acknowledgment
A.5.1.2Review of the policies for information security — The policies for information security shall be reviewed at scheduled intervals or if significant changes occur, to ensure their continuing suitability, adequacy, and effectivenessReview meeting minutes or email approval trail; version history showing annual reviews; updated effective datesPolicies were written once at the start and never reviewed or updated; no evidence of annual review

Domain A.5 Score: ___ / 2 implemented


Domain A.6: Organization of Information Security

Controls: A.6.1.1 – A.6.2.2

A.6.1 Internal Organization

#ControlEvidence RequiredCommon GapStatus
A.6.1.1Information security roles and responsibilities — All information security responsibilities shall be defined and allocatedRACI matrix or role description documents; org chart showing security roles; job descriptions with security responsibilitiesSecurity responsibilities are informally understood but never formally documented; no RACI exists
A.6.1.2Segregation of duties — Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization's assetsEvidence of access control configuration preventing one person from performing conflicting actions; documented role segregationSingle individuals have ability to initiate and approve changes, or develop and deploy code to production
A.6.1.3Contact with authorities — Appropriate contacts with relevant authorities shall be maintainedDocumented contacts for law enforcement, regulatory bodies, CISA/CERT; incident notification procedures referencing relevant authoritiesNo documented process for contacting law enforcement or regulatory bodies during a security incident
A.6.1.4Contact with special interest groups — Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintainedMembership or subscription records for threat intelligence feeds, ISACs, security mailing listsNo subscriptions to security bulletins, threat feeds, or industry groups relevant to the company's sector
A.6.1.5Information security in project management — Information security shall be addressed in project management, regardless of the type of projectProject templates including security checkpoints; evidence of security reviews in project documentationSecurity reviews are not included in project management methodology; no security sign-off at project milestones

A.6.2 Mobile Devices and Teleworking

#ControlEvidence RequiredCommon GapStatus
A.6.2.1Mobile device policy — A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devicesMobile device / BYOD policy; MDM enrollment records; device compliance reportsNo MDM platform; personal devices access company email and data without any security configuration requirements
A.6.2.2Teleworking — A policy and supporting security measures shall be implemented to protect information accessed, processed, or stored at teleworking sitesRemote work security policy; VPN usage logs; evidence of remote worker security trainingNo formal remote work policy; employees work from home without VPN or device security requirements

Domain A.6 Score: ___ / 7 implemented


Domain A.7: Human Resource Security

Controls: A.7.1.1 – A.7.3.1

A.7.1 Prior to Employment

#ControlEvidence RequiredCommon GapStatus
A.7.1.1Screening — Background verification checks on all candidates for employment shall be carried out in accordance with relevant laws, regulations, and ethicsBackground check policy; vendor invoices or results (redacted); evidence screening is role-adjusted for sensitive positionsBackground checks are done inconsistently or only for certain roles; no documentation of scope
A.7.1.2Terms and conditions of employment — The contractual agreements with employees and contractors shall state their and the organization's responsibilities for information securityEmployment contracts with information security obligations; contractor agreements with NDA and AUP acknowledgmentContracts don't include information security obligations; no AUP acknowledgment at hire

A.7.2 During Employment

#ControlEvidence RequiredCommon GapStatus
A.7.2.1Management responsibilities — Management shall require all employees and contractors to apply information security in accordance with the established policies and proceduresManager training records; evidence of manager accountability in performance frameworksManagers have no documented security accountability; security is considered only an IT function
A.7.2.2Information security awareness, education, and training — All employees and contractors shall receive appropriate security awareness education and training, with regular updatesTraining platform records showing completion rates; training content covering relevant topics; annual recertification recordsTraining is done at onboarding only; no annual refresher; completion not tracked
A.7.2.3Disciplinary process — There shall be a formal and communicated disciplinary process in place to take action against employees who have committed an information security breachHR policy referencing information security violations; documented disciplinary process communicated to all staffThe disciplinary process doesn't mention information security violations; no consequence framework exists

A.7.3 Termination and Change of Employment

#ControlEvidence RequiredCommon GapStatus
A.7.3.1Termination or change of employment responsibilities — Information security responsibilities and duties that remain valid after termination or change of employment shall be defined, communicated to the employee or contractor, and enforcedOffboarding checklist with access revocation steps; exit documentation including confidentiality reminders; access revocation records with timestampsNo formal offboarding process; access revocation is ad hoc and often delayed days or weeks

Domain A.7 Score: ___ / 6 implemented


Domain A.8: Asset Management

Controls: A.8.1.1 – A.8.3.3

A.8.1 Responsibility for Assets

#ControlEvidence RequiredCommon GapStatus
A.8.1.1Inventory of assets — Assets associated with information and information processing facilities shall be identified and an inventory of these assets shall be drawn up and maintainedAsset register with asset type, owner, classification, location, and status; evidence of regular updatesNo formal asset inventory; assets are tracked in various spreadsheets or not at all; cloud assets untracked
A.8.1.2Ownership of assets — Assets maintained in the inventory shall be ownedAsset register showing named owner for each asset; evidence owners accept responsibilityAssets exist in inventory but have no named owner; shared ownership means no one is accountable
A.8.1.3Acceptable use of assets — Rules for the acceptable use of information and of assets associated with information and information processing facilities shall be identified, documented, and implementedAcceptable Use Policy communicated to all staff; acknowledgment recordsAUP exists but employees haven't signed it or been trained on it
A.8.1.4Return of assets — All employees and contractors shall return all of the organizational assets in their possession upon termination of their employment, contract, or agreementOffboarding checklist confirming device and asset return; signed asset return confirmationDevices and access cards are not formally returned upon termination; no tracking

A.8.2 Information Classification

#ControlEvidence RequiredCommon GapStatus
A.8.2.1Classification of information — Information shall be classified in terms of legal requirements, value, criticality, and sensitivity to unauthorized disclosure or modificationData Classification Policy with defined tiers; evidence that assets are labeled per classificationClassification policy exists on paper but isn't applied; data assets have no labels or tags
A.8.2.2Labeling of information — An appropriate set of procedures for information labeling shall be developed and implemented in accordance with the information classification schemeLabeling standards; evidence of labels applied to documents, email headers, storage bucketsNo labeling system in use; classified documents are indistinguishable from public ones
A.8.2.3Handling of assets — Procedures for handling assets shall be developed and implemented in accordance with the information classification schemeHandling procedures per classification tier; evidence of enforcementClassification framework defines tiers but provides no specific handling instructions

A.8.3 Media Handling

#ControlEvidence RequiredCommon GapStatus
A.8.3.1Management of removable media — Procedures shall be implemented for the management of removable media in accordance with the classification schemeRemovable media policy; technical controls blocking unauthorized USB devices; exception logsNo controls on USB usage; employees freely use personal USB drives on company devices
A.8.3.2Disposal of media — Media shall be disposed of securely when no longer required, using formal proceduresMedia disposal records; vendor certificates of destruction; secure shredding invoicesOld hard drives and laptops are disposed of without secure wiping; no disposal records
A.8.3.3Physical media transfer — Media containing information shall be protected against unauthorized access, misuse, or corruption during transportationProcedures for secure physical transfer; courier service records with chain of custodyNo documented procedures for transferring physical media; no chain-of-custody process

Domain A.8 Score: ___ / 10 implemented


Domain A.9: Access Control

Controls: A.9.1.1 – A.9.4.5

A.9.1 Business Requirements of Access Control

#ControlEvidence RequiredCommon GapStatus
A.9.1.1Access control policy — An access control policy shall be established, documented, and reviewed based on business and information security requirementsDocumented Access Control Policy; evidence of annual review; management approvalNo formal access control policy; access decisions are made ad hoc
A.9.1.2Access to networks and network services — Users shall only be provided with access to the network and network services that they have been specifically authorized to useNetwork access authorization records; firewall rules showing segmentation; VPN access controlsAll employees have unrestricted network access; no segmentation between production and office networks

A.9.2 User Access Management

#ControlEvidence RequiredCommon GapStatus
A.9.2.1User registration and de-registration — A formal user registration and de-registration process shall be implemented to enable assignment of access rightsOnboarding/offboarding checklists with access steps; IAM provisioning/deprovisioning logs with timestampsAccess provisioning happens informally via Slack; no formal request, approval, or documentation process
A.9.2.2User access provisioning — A formal user access provisioning process shall be implemented to assign or revoke access rights for all user types to all systems and servicesAccess request tickets with documented approval; access provisioning logsAccess is granted without formal approval; manager approval is verbal and not recorded
A.9.2.3Management of privileged access rights — The allocation and use of privileged access rights shall be restricted and controlledPrivileged account inventory; PAM solution logs; quarterly review recordsPrivileged accounts are not inventoried; multiple people share admin credentials
A.9.2.4Management of secret authentication information of users — The allocation of secret authentication information shall be controlled through a formal management processPassword manager deployment evidence; policy prohibiting password sharing; service account credential management recordsPasswords are shared via email or Slack; no enterprise password manager; no service account rotation
A.9.2.5Review of user access rights — Asset owners shall review users' access rights at regular intervalsQuarterly/semi-annual access review records; evidence of removals based on reviewAccess reviews have never been formally conducted; accounts accumulate access over time
A.9.2.6Removal or adjustment of access rights — The access rights of all employees and contractors to information and information processing facilities shall be removed upon termination of their employment, contract, or agreementOffboarding checklist with access revocation steps completed; IAM logs showing deprovisioning timestampsFormer employees' accounts remain active for days or weeks after termination

A.9.3 User Responsibilities

#ControlEvidence RequiredCommon GapStatus
A.9.3.1Use of secret authentication information — Users shall be required to follow the organization's practices in the use of secret authentication informationPassword policy communicated to all staff; training records covering password requirements; acknowledgmentPassword policy exists but was never communicated to employees; no training on password hygiene

A.9.4 System and Application Access Control

#ControlEvidence RequiredCommon GapStatus
A.9.4.1Information access restriction — Access to information and application system functions shall be restricted in accordance with the access control policyRole-based access control (RBAC) configuration; evidence of least-privilege principle applied in IAMAll users have the same access level; no role-based permissions; "admin by default" configurations
A.9.4.2Secure log-on procedures — Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on procedureMFA enrollment evidence; login attempt limits configured; MFA policy screenshotsMFA is optional; many accounts have single-factor authentication; no account lockout after failed attempts
A.9.4.3Password management system — Password management systems shall be interactive and shall ensure quality passwordsPassword manager deployment; system-enforced complexity and length requirements; configuration screenshotsPasswords are managed in spreadsheets or stored in browser; no enterprise password manager
A.9.4.4Use of privileged utility programs — The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly controlledPrivileged utility access logs; documented approval process for use; restricted access listSystem utilities are available to all users; no logging of utility usage; no approval process
A.9.4.5Access control to program source code — Access to program source code shall be restrictedRepository access control settings; branch protection rules; access review records for code repositoriesSource code repositories are open to all employees; no branch protection; no access reviews

Domain A.9 Score: ___ / 14 implemented


Domain A.10: Cryptography

Controls: A.10.1.1 – A.10.1.2

A.10.1 Cryptographic Controls

#ControlEvidence RequiredCommon GapStatus
A.10.1.1Policy on the use of cryptographic controls — A policy on the use of cryptographic controls for protection of information shall be developed and implementedEncryption policy document; evidence of application to data-at-rest and in-transit; management approvalNo formal encryption policy; encryption decisions are made on a per-project basis with no standards
A.10.1.2Key management — A policy on the use, protection, and lifetime of cryptographic keys shall be developed and implemented through their whole lifecycleKey management policy; KMS or vault deployment evidence; key rotation logs; access controls for keysEncryption keys are hardcoded in application config files or environment variables; no rotation history

Domain A.10 Score: ___ / 2 implemented


Domain A.11: Physical and Environmental Security

Controls: A.11.1.1 – A.11.2.9

A.11.1 Secure Areas

#ControlEvidence RequiredCommon GapStatus
A.11.1.1Physical security perimeter — Security perimeters shall be defined and used to protect areas that contain either sensitive or critical information and information processing facilitiesPhysical access control system documentation; badge reader logs; facility security diagramOffice has no physical access control; anyone can enter the building or server room
A.11.1.2Physical entry controls — Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed accessAccess control logs; visitor management records; access rights inventoryNo visitor log; visitors freely walk to any area of the office without escort
A.11.1.3Securing offices, rooms, and facilities — Physical security for offices, rooms, and facilities shall be designed and appliedEvidence that sensitive areas (server rooms, archives) have additional locks; key management recordsServer equipment is in an unlocked room accessible to all employees
A.11.1.4Protecting against external and environmental threats — Physical protection against natural disasters, malicious attack, or accidents shall be designed and appliedRisk assessment addressing environmental threats; fire suppression, flood protection, power protection evidenceNo environmental controls assessed or documented; equipment unprotected from water, fire, or power fluctuations
A.11.1.5Working in secure areas — Procedures for working in secure areas shall be designed and appliedSecure area procedures; evidence of clean desk enforcement; prohibition of unauthorized devices in secure areasNo procedures govern behavior in server room; no rules about devices or photography
A.11.1.6Delivery and loading areas — Access points such as delivery and loading areas and other points where unauthorized persons could enter the premises shall be controlledDelivery procedures; evidence that deliveries are managed by authorized personnel onlyNo controls on deliveries; packages arrive without security screening or authorization

A.11.2 Equipment Security

#ControlEvidence RequiredCommon GapStatus
A.11.2.1Equipment siting and protection — Equipment shall be sited and protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized accessEquipment placement documentation; evidence of physical security measures for servers and workstationsEquipment is placed without consideration of environmental risks or visibility from unsecured areas
A.11.2.2Supporting utilities — Equipment shall be protected from power failures and other disruptions caused by failures in supporting utilitiesUPS installation evidence; generator maintenance records; utility failure proceduresNo UPS or power conditioning; a power surge could destroy equipment and data
A.11.2.3Cabling security — Power and telecommunications cabling carrying data or supporting information services shall be protected from interception, interference, or damageCable management documentation; evidence of protected cabling runs; network diagramNetwork cables are accessible and unsecured; no documentation of cable routes
A.11.2.4Equipment maintenance — Equipment shall be correctly maintained to ensure its continued availability and integrityHardware maintenance schedule; vendor maintenance contracts; service recordsNo maintenance schedule; hardware is only serviced when it breaks
A.11.2.5Removal of assets — Equipment, information, or software shall not be taken off-site without prior authorizationAsset removal authorization process; asset register showing location; return confirmation recordsEmployees take laptops and equipment home without any logging or authorization
A.11.2.6Security of equipment and assets off-premises — Security shall be applied to off-site assets taking into account the different risks of working outside the organization's premisesRemote work and mobile device policy; MDM enrollment for off-site devicesNo security requirements for equipment used outside the office
A.11.2.7Secure disposal or reuse of equipment — All items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or reuseEquipment disposal records; secure wipe certificates; certificates of destruction for decommissioned hardwareOld devices are donated or discarded without wiping; former employee data at risk
A.11.2.8Unattended user equipment — Users shall ensure that unattended equipment has appropriate protectionScreen lock policy; evidence of automatic screen lock configured; clean desk remindersComputers are left unlocked and unattended; no screen lock timeout configured
A.11.2.9Clear desk and clear screen policy — A clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities shall be adoptedClear desk/screen policy; evidence of employee acknowledgment; spot check recordsNo clear desk policy; sensitive documents visible on desks; screens unlocked in public view

Domain A.11 Score: ___ / 15 implemented


Domain A.12: Operations Security

Controls: A.12.1.1 – A.12.7.1

A.12.1 Operational Procedures and Responsibilities

#ControlEvidence RequiredCommon GapStatus
A.12.1.1Documented operating procedures — Operating procedures shall be documented and made available to all users who need themDocumented runbooks and SOPs; evidence of availability to relevant staffProcedures exist only in engineers' heads; no written runbooks or SOPs
A.12.1.2Change management — Changes to the organization, business processes, information processing facilities, and systems that affect information security shall be controlledChange management policy; ticketing system records of approved and completed changes; CAB meeting minutesChanges are deployed to production without documentation, review, or approval
A.12.1.3Capacity management — The use of resources shall be monitored, tuned, and projections made of future capacity requirements to ensure the required system performanceCapacity monitoring dashboards; alerts for resource thresholds; capacity planning documentationNo capacity monitoring; system performance issues are discovered only when users complain
A.12.1.4Separation of development, testing, and operational environments — Development, testing, and operational environments shall be separated to reduce the risks of unauthorized access or changes to the operational environmentEnvironment separation architecture diagram; evidence of access controls per environment; no production data in devDevelopers have direct production access; production data used in testing environments

A.12.2 Protection from Malware

#ControlEvidence RequiredCommon GapStatus
A.12.2.1Controls against malware — Detection, prevention, and recovery controls to protect against malware shall be implemented, combined with appropriate user awarenessEDR/antivirus deployment evidence; coverage report showing all endpoints protected; alert and response logsNo endpoint protection on developer machines; basic antivirus but no EDR; no monitoring of alerts

A.12.3 Backup

#ControlEvidence RequiredCommon GapStatus
A.12.3.1Information backup — Backup copies of information, software, and system images shall be taken and tested regularly in accordance with an agreed backup policyBackup policy; automated backup configuration evidence; restoration test results with timestampsBackups are configured but never tested; no evidence restoration actually works

A.12.4 Logging and Monitoring

#ControlEvidence RequiredCommon GapStatus
A.12.4.1Event logging — Event logs recording user activities, exceptions, faults, and information security events shall be produced, kept, and regularly reviewedSIEM or log aggregation configuration; sample log output; retention configurationLogs are generated but not centralized; application logs are on individual servers with no central access
A.12.4.2Protection of log information — Logging facilities and log information shall be protected against tampering and unauthorized accessLog integrity controls; restricted access to log management systems; immutable log storage configurationLogs can be deleted by the same administrators who generate them; no tamper protection
A.12.4.3Administrator and operator logs — System administrator and system operator activities shall be logged and the logs protected and regularly reviewedAdmin activity logs; evidence of separate logging for privileged users; quarterly review recordsNo separate logging for admin actions; privileged user activity is indistinguishable from regular users in logs
A.12.4.4Clock synchronisation — The clocks of all relevant information processing systems within an organization or security domain shall be synchronised to a single reference time sourceNTP configuration evidence; synchronized clock verification across systemsSystems use different time sources; log timestamps don't match, making incident investigation difficult

A.12.5 Control of Operational Software

#ControlEvidence RequiredCommon GapStatus
A.12.5.1Installation of software on operational systems — Procedures shall be implemented to control the installation of software on operational systemsSoftware installation policy; evidence of approved software list; technical controls preventing unauthorized installationAnyone can install any software on company devices; no approved software list exists

A.12.6 Technical Vulnerability Management

#ControlEvidence RequiredCommon GapStatus
A.12.6.1Management of technical vulnerabilities — Information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization's exposure to such vulnerabilities evaluated, and appropriate measures taken to address the associated riskVulnerability scanning reports; patch management records; vulnerability register with remediation status and due datesNo vulnerability scanning; patches applied only when convenient, not based on severity
A.12.6.2Restrictions on software installation — Rules governing the installation of software by users shall be established and implementedMDM or endpoint management configuration preventing unauthorized installation; software whitelistUsers have local admin rights and can install any software without restriction

A.12.7 Information Systems Audit Considerations

#ControlEvidence RequiredCommon GapStatus
A.12.7.1Information systems audit controls — Audit requirements and activities involving verification of operational systems shall be carefully planned and agreed to minimize disruptions to business processesAudit planning documents; coordination with system owners before audits; audit activity logsAudits are conducted without coordination with business teams; no documented audit activity logs

Domain A.12 Score: ___ / 14 implemented


Domain A.13: Communications Security

Controls: A.13.1.1 – A.13.2.4

A.13.1 Network Security Management

#ControlEvidence RequiredCommon GapStatus
A.13.1.1Network controls — Networks shall be managed and controlled to protect information in systems and applicationsNetwork security architecture; firewall rules review; network segmentation documentationFlat network with no segmentation; all systems can communicate with all other systems
A.13.1.2Security of network services — Security mechanisms, service levels, and management requirements of all network services shall be identified and included in network services agreementsNetwork service agreements with security terms; SLA documentation; review of provider security controlsCloud provider contracts don't include security terms; no SLA for security events
A.13.1.3Segregation in networks — Groups of information services, users, and information systems shall be segregated on networksNetwork segmentation architecture; VLAN configuration; firewall rules between segmentsProduction and development share the same network; no separation between sensitive and non-sensitive systems

A.13.2 Information Transfer

#ControlEvidence RequiredCommon GapStatus
A.13.2.1Information transfer policies and procedures — Formal transfer policies, procedures, and controls shall be in place to protect the transfer of information through the use of all types of communication facilitiesData transfer policy; approved file sharing platforms; email security configurationNo policy governing how data is shared; employees use personal Dropbox or email attachments for sensitive data
A.13.2.2Agreements on information transfer — Agreements shall address the secure transfer of business information between the organization and external partiesNDA and data transfer agreements with partners and customers; data processing agreementsSensitive data is shared with partners without NDAs or data transfer agreements
A.13.2.3Electronic messaging — Information involved in electronic messaging shall be appropriately protectedEmail security controls (SPF, DKIM, DMARC); email encryption for sensitive communications; email DLPNo email authentication configured; DMARC not implemented; sensitive data sent in plaintext email
A.13.2.4Confidentiality or non-disclosure agreements — Requirements for confidentiality or non-disclosure agreements reflecting the organization's needs for the protection of information shall be identified, regularly reviewed, and documentedNDA template; list of parties with executed NDAs; NDA review scheduleNDAs are not consistently used with contractors and vendors; no central NDA repository

Domain A.13 Score: ___ / 7 implemented


Domain A.14: System Acquisition, Development and Maintenance

Controls: A.14.1.1 – A.14.3.1

A.14.1 Security Requirements of Information Systems

#ControlEvidence RequiredCommon GapStatus
A.14.1.1Information security requirements analysis and specification — The information security related requirements shall be included in the requirements for new information systems or enhancements to existing information systemsSecurity requirements in product specifications; evidence of security sign-off on project kick-offsSecurity requirements are considered after development, not before
A.14.1.2Securing application services on public networks — Information involved in application services passing over public networks shall be protected from fraudulent activity, contract dispute, and unauthorized disclosure and modificationTLS configuration; API authentication (OAuth, JWT); input validation controlsAPIs exposed to the internet lack authentication; no TLS certificate rotation process
A.14.1.3Protecting application services transactions — Information involved in application service transactions shall be protected to prevent incomplete transmission, misrouting, unauthorized message alteration, unauthorized disclosure, unauthorized message duplication, or replayTransaction integrity controls; API payload validation; secure session managementNo transaction integrity verification; sessions don't expire; no replay attack prevention

A.14.2 Security in Development and Support Processes

#ControlEvidence RequiredCommon GapStatus
A.14.2.1Secure development policy — Rules for the development of software and systems shall be established and applied to developments within the organizationSecure SDLC policy; developer security training records; code review requirements documentationNo secure coding standards; security is not part of the development workflow
A.14.2.2System change control procedures — Changes to systems within the development lifecycle shall be controlled by the use of formal change control proceduresChange management records in version control or ticketing system; PR review historyCode goes directly to production without review or change management documentation
A.14.2.3Technical review of applications after operating platform changes — When operating platforms are changed, business critical applications shall be reviewed and tested to ensure there is no adverse impact on organizational operations or securityPlatform change review records; post-change testing results; documented sign-offsPlatform upgrades happen without security review of application compatibility
A.14.2.4Restrictions on changes to software packages — Modifications to software packages shall be discouraged, limited to necessary changes, and all changes shall be strictly controlledPolicy on third-party software modification; change records for any package modificationsThird-party code is modified without documentation; no process for tracking modified packages
A.14.2.5Secure system engineering principles — Principles for engineering secure systems shall be established, documented, maintained, and applied to any information system implementation effortsDocumented secure engineering principles; evidence applied in system design; threat modeling recordsNo security architecture principles; design decisions made without security consideration
A.14.2.6Secure development environment — Organizations shall establish and appropriately protect secure development environments for system development and maintenance efforts that cover the entire system development lifecycleDevelopment environment security controls; evidence of environment access restrictionsDevelopers have production access; development environments lack security controls
A.14.2.7Outsourced development — The organization shall supervise and monitor the activity of outsourced system developmentVendor contracts with security requirements; outsourced code review process; acceptance testing recordsExternal developers have no security requirements in their contracts; code is not reviewed before acceptance
A.14.2.8System security testing — Testing of security functionality shall be carried out during developmentSAST scan results; security test cases in QA process; evidence of security testing as part of releaseNo security testing in CI/CD pipeline; security is tested manually only before major releases
A.14.2.9System acceptance testing — Acceptance testing programs and related criteria shall be established for new information systems, upgrades, and new versionsAcceptance test plans including security criteria; sign-off records before production deploymentAcceptance testing has no security criteria; systems go live based on functional testing only

A.14.3 Test Data

#ControlEvidence RequiredCommon GapStatus
A.14.3.1Protection of test data — Test data shall be selected carefully, protected, and controlledPolicy prohibiting production data in test environments; evidence of data masking/anonymization; test data management recordsProduction databases are copied to development environments; real customer data used for testing

Domain A.14 Score: ___ / 13 implemented


Domain A.15: Supplier Relationships

Controls: A.15.1.1 – A.15.2.2

A.15.1 Information Security in Supplier Relationships

#ControlEvidence RequiredCommon GapStatus
A.15.1.1Information security policy for supplier relationships — Information security requirements for mitigating the risks associated with supplier's access to the organization's assets shall be agreed with the supplier and documentedVendor management policy; security addendum template used in contractsNo security requirements in supplier contracts; vendors onboarded without security review
A.15.1.2Addressing security within supplier agreements — All relevant information security requirements shall be established and agreed with each supplier that may access, process, store, communicate, or provide IT infrastructure components for, the organization's informationSupplier contracts with security clauses; DPA/BAA agreements; evidence of negotiated security termsStandard vendor contracts don't include security terms; no DPAs executed with data processors
A.15.1.3Information and communication technology supply chain — Agreements with suppliers shall include requirements to address the information security risks associated with information and communications technology services and product supply chainSupply chain risk assessment; software bill of materials (SBOM); vendor security review recordsNo visibility into supply chain security; third-party components used without vetting

A.15.2 Supplier Service Delivery Management

#ControlEvidence RequiredCommon GapStatus
A.15.2.1Monitoring and review of supplier services — Organizations shall regularly monitor, review, and audit supplier service deliveryAnnual vendor review records; SOC 2 report review evidence; vendor performance assessmentsVendors are never reviewed after onboarding; no process for annual reassessment
A.15.2.2Managing changes to supplier services — Changes to the provision of services by suppliers, including maintaining and improving existing information security policies, procedures, and controls, shall be managed, taking account of the criticality of business information, systems, and processes involvedSupplier change notification records; change impact assessment for supplier changesNo process for evaluating security impact of vendor-side changes to services or personnel

Domain A.15 Score: ___ / 5 implemented


Domain A.16: Information Security Incident Management

Controls: A.16.1.1 – A.16.1.7

A.16.1 Management of Information Security Incidents and Improvements

#ControlEvidence RequiredCommon GapStatus
A.16.1.1Responsibilities and procedures — Management responsibilities and procedures shall be established to ensure a quick, effective, and orderly response to information security incidentsIncident Response Plan; defined roles and responsibilities; escalation path documentationNo formal IRP; incident response is improvised; no defined roles or escalation paths
A.16.1.2Reporting information security events — Information security events shall be reported through appropriate management channels as quickly as possibleIncident reporting channel (e.g., security@company.com); employee training on reporting; evidence of reports receivedEmployees don't know how to report a security event; no reporting channel published
A.16.1.3Reporting information security weaknesses — Employees and contractors using the organization's information systems and services shall be required to note and report any observed or suspected information security weaknesses in systems or servicesPolicy requiring weakness reporting; reporting channel for vulnerabilities; evidence of reports investigatedNo responsible disclosure policy; employees have no channel to report suspected security weaknesses
A.16.1.4Assessment of and decision on information security events — Information security events shall be assessed and it shall be decided if they are to be classified as information security incidentsIncident classification criteria; evidence of triage process; incident log with classification decisionsSecurity events aren't formally assessed; there's no consistent threshold for escalating to an incident
A.16.1.5Response to information security incidents — Information security incidents shall be responded to in accordance with the documented proceduresIncident response records showing containment, eradication, recovery steps; timestamps; communications recordsWhen incidents occur, response is undocumented; no record of actions taken
A.16.1.6Learning from information security incidents — Knowledge gained from analysing and resolving information security incidents shall be used to reduce the likelihood or impact of future incidentsPost-incident review records; evidence that lessons learned drove policy or control changesNo post-mortem process; same incidents recur because root causes aren't fixed
A.16.1.7Collection of evidence — The organization shall define and apply procedures for the identification, collection, acquisition, and preservation of information, which can serve as evidenceEvidence preservation procedures; chain of custody records; forensic capability documentationNo evidence preservation protocol; forensic evidence is often destroyed or contaminated during incident response

Domain A.16 Score: ___ / 7 implemented


Domain A.17: Business Continuity Management

Controls: A.17.1.1 – A.17.2.1

A.17.1 Information Security Continuity

#ControlEvidence RequiredCommon GapStatus
A.17.1.1Planning information security continuity — The organization shall determine its requirements for information security and the continuity of information security management in adverse situations, e.g. during a crisis or disasterBCP/DRP documentation addressing information security requirements; integration with business continuity planningNo BCP/DRP; the company has never formally considered what happens during a major disruption
A.17.1.2Implementing information security continuity — The organization shall establish, document, implement, and maintain processes, procedures, and controls to ensure the required level of continuity for information security during an adverse situationImplemented backup and DR infrastructure; documented recovery procedures; RTO/RPO documentationBCP exists on paper but recovery procedures are never tested; actual recovery capability unknown
A.17.1.3Verify, review, and evaluate information security continuity — The organization shall verify the established and implemented information security continuity controls at regular intervals in order to ensure that they are valid and effective during adverse situationsAnnual BCP/DR test records; tabletop exercise documentation; backup restoration test resultsBCP/DRP has never been tested; there's no evidence the documented recovery steps actually work

A.17.2 Redundancies

#ControlEvidence RequiredCommon GapStatus
A.17.2.1Availability of information processing facilities — Information processing facilities shall be implemented with redundancy sufficient to meet availability requirementsArchitecture documentation showing redundancy; multi-AZ or multi-region deployment evidence; uptime monitoring recordsSingle points of failure in infrastructure; no redundancy for critical systems; SLA commitments not backed by infrastructure

Domain A.17 Score: ___ / 4 implemented


Domain A.18: Compliance

Controls: A.18.1.1 – A.18.2.3

#ControlEvidence RequiredCommon GapStatus
A.18.1.1Identification of applicable legislation and contractual requirements — All relevant legislative statutory, regulatory, and contractual requirements and the organization's approach to meet these requirements shall be explicitly identified, documented, and kept up to date for each information system and the organizationLegal register documenting applicable laws and regulations; contractual obligation tracking; evidence of annual reviewNo formal legal register; compliance obligations are tracked informally or not at all
A.18.1.2Intellectual property rights — Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory, and contractual requirements related to intellectual property rights and use of proprietary software productsSoftware license inventory; policy prohibiting use of unlicensed software; license compliance audit recordsNo software license inventory; unlicensed software found on company devices; no policy
A.18.1.3Protection of records — Records shall be protected from loss, destruction, falsification, unauthorized access, and unauthorized release, in accordance with legislative, statutory, regulatory, and contractual requirementsRecords retention policy; data classification applied to records; access controls; backup confirmationNo records retention policy; records deleted without regard for legal retention requirements
A.18.1.4Privacy and protection of personally identifiable information — Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulations where applicablePrivacy policy; data mapping of PII flows; GDPR/CCPA compliance records; DPA agreements with processorsNo data mapping of PII; privacy policy not updated for GDPR/CCPA; no DPAs with processors
A.18.1.5Regulation of cryptographic controls — Cryptographic controls shall be used in compliance with all relevant agreements, laws, and regulationsEvidence that encryption practices comply with applicable regulations; review of export control requirementsNo review of cryptography regulatory requirements; encryption algorithms used without considering compliance

A.18.2 Information Security Reviews

#ControlEvidence RequiredCommon GapStatus
A.18.2.1Independent review of information security — The organization's approach to managing information security and its implementation (i.e. control objectives, controls, policies, processes, and procedures for information security) shall be reviewed independently at defined intervals or when significant changes occurInternal audit records or external review report; evidence of independent review; management response to findingsNo independent review of the security program has ever occurred; no internal audit function
A.18.2.2Compliance with security policies and standards — Managers shall regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards, and any other security requirementsManagement review records; compliance audit results; corrective action trackingManagers don't conduct compliance checks within their teams; no process exists
A.18.2.3Technical compliance review — Information systems shall be regularly reviewed for compliance with the organization's information security policies and standardsTechnical audit results; vulnerability scan reports; configuration compliance scanning; evidence of remediationTechnical systems have never been audited against security policy requirements

Domain A.18 Score: ___ / 8 implemented


Overall Gap Assessment Summary

DomainControlsImplementedPartialNot ImplementedN/A
A.5: Information Security Policies2
A.6: Organization of Information Security7
A.7: Human Resource Security6
A.8: Asset Management10
A.9: Access Control14
A.10: Cryptography2
A.11: Physical and Environmental Security15
A.12: Operations Security14
A.13: Communications Security7
A.14: System Acquisition, Development and Maintenance13
A.15: Supplier Relationships5
A.16: Incident Management7
A.17: Business Continuity Management4
A.18: Compliance8
TOTAL114

Score Interpretation

90–114 Implemented: You are likely ready for an ISO 27001 Stage 1 audit. Engage a UKAS or IAF-accredited certification body and schedule your Stage 1 assessment.

60–89 Implemented: You have a solid foundation but material gaps to close before Stage 1. Prioritize the controls with the highest audit risk (A.9, A.12, A.16, A.18) and build your remediation roadmap with 60–90 day targets.

30–59 Implemented: Significant gaps across multiple domains. A structured implementation program with dedicated engineering resources is the fastest path to certification. Build your Statement of Applicability and gap assessment before attempting Stage 1.

0–29 Implemented: Pre-implementation stage. ISO 27001 will require a full ISMS build. This is achievable but requires a structured program with executive commitment and engineering resources. Start with A.5, A.6, A.9, and A.16 as your highest-priority domains.


What Comes After This Checklist?

A gap assessment tells you where you stand. Closing the gaps requires implementation — and that's where most companies stall.

QuickTrust's engineers have implemented ISO 27001 controls across 100+ organizations, with a 100% audit pass rate. We don't just hand you a checklist. We implement the controls in your cloud, write your ISMS documentation, build your evidence library, and coordinate with your certification body — so you show up to Stage 1 ready.

Book your free 20-minute ISO 27001 readiness call: trust.quickintell.com

QuickTrust is an open-source, AI-powered GRC platform operated by GPT Innovations, Inc. This checklist is based on ISO/IEC 27001:2013 Annex A and is provided for informational purposes. Engage a qualified implementation partner for certification work.

Ready for ISO 27001 certification?

Our engineers implement Annex A controls, prepare evidence, and coordinate your audit.

Start ISO 27001

Related Articles