Information Security Gap Analysis Example

ComponentCurrent Score (0–2)Desired Future Score (0–2)Priority (High, Medium, Low)Desired Time FrameComments
People     
  • Strategy

712High12 months
  • No formal strategy exists today

  • Components

810Medium18 months
  • Staff focused on day-to-day firefighting

  • Administration

910Low24 months
  • Minimal involvement of executive staff

People Summary2432   
Process     
  • Strategy

1012High12 months
  • Informal policies that are not followed consistently

  • Components

912Low24 months
  • Policies are not easily accessed by employees

  • Administration

78Low18 months
  • All major security policies have been considered in program

Process Summary2630   
Technology     
  • Strategy

68Medium12 months
  • No technology architecture is in place, and changes are tactical in nature ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.