Reveal what’s missing. Prioritize what’s next
Too many organizations dive into security and compliance without knowing their starting point.
A gap assessment shows exactly where you are and how far you have to go.
It’s where clarity replaces guesswork, and smart prioritization replaces wasted motion.
Whether you're aiming for SOC 2, HIPAA, NIST, ISO 27001, or other frameworks, this step is where your plan becomes real.
Understand Scope: What’s in and what’s out?
Understand Scope: What’s in and what’s out?
Surface Gaps Early: Before your auditor finds them.
Break your framework into control-level requirements. This might include:
SOC 2 Trust Services Criteria
NIST CSF or 800-53
HIPAA Security Rule
ISO 27001 Annex A controls
Address the following questions each control:
Are you currently meeting it? Fully, partially, or not at all?
What evidence exists (or is missing)?
Are there written policies and proof of implementation?
Are controls formalized or just tribal knowledge?
Overlay your risk assessment results to add teeth to your findings:
Gaps in high-risk areas = top priority
Gaps in low-impact areas = schedule for later
The above steps ensure your compliance roadmap is risk-aligned, not checkbox-driven.
Don’t treat every gap the same. Score gaps by:
Severity (How far off are you?)
Risk impact (If unaddressed, what’s the consequence?)
Effort level (Is this a quick win or a long-term project?)
Dependency (Does this block other progress?)
Assign every gap a clear owner and a realistic due date.
Create a simplified report for execs:
Number of gaps by category
Top 5 critical gaps
High-effort vs. low-effort wins
Progress toward readiness
No need to boil the ocean. Follow this playbook to get it done:
Choose the standards you’re targeting: SOC 2, HIPAA, ISO, etc. If multiple, pick a “primary” and map others to it.
Document your policies, procedures, tools, vendors, and evidence repositories. Collect what you have before you focus on what’s missing.
Use your GRC platform (or Gap Tracker) to score each control (Fully Met, Partially Met, Not Met) and include notes, evidence links, and screenshots.
Mark each gap with severity, effort, risk, and urgency. Focus your team on high-risk, low-effort wins first.
Add each gap to a tracker or GRC platform, assign an owner, and monitor progress in weekly standups or reviews.
Show them a clear picture: where you are, what’s missing, and what the team is doing to get you audit-ready.
Now that you know your gaps, it’s time to close them.
We’ll guide you through creating and updating the policies, controls, and safeguards that fill those gaps and keep you compliant.
Kevin Brown
ISO & Director of Professional Services
Ideally, right after your risk assessment—and anytime you’re planning for a new framework or upcoming audit.
It’s especially useful in early program stages to build a focused remediation roadmap.
Many teams also revisit it quarterly or annually to track progress and adjust priorities.
Not necessarily—but it helps. You can start with a structured template or checklist, but experienced security or compliance professionals can provide valuable insight into what’s missing and what matters most.
Some organizations partner with CaaS (Compliance-as-a-Service) providers or GRC software companies (like Ostendio) who offer professional services to deliver expert-led gap assessments without hiring a full team.
A risk assessment evaluates threats and their potential impact.
A gap analysis looks at requirements and whether you’re meeting them.
Risk is about what could go wrong; a gap assessment is about what you're currently not doing that you should be.
Tools like GRC platforms, automated control mappers, and audit readiness checklists can help compare your current practices to framework requirements.
Many organizations also use spreadsheets or internal assessments early on—but these can get messy fast without structure.
Learn more by speaking to one of our experts