Gap Analysis Process
A thorough gap analysis identifies the difference between your current state and ISO 27018 requirements. This lesson guides you through conducting an effective gap analysis.
Gap Analysis Overview
Purpose: Identify gaps between current practices and ISO 27018 requirements
Benefits:
- Understand scope of work required
- Prioritize remediation efforts
- Estimate costs and timeline
- Create roadmap to certification
- Identify quick wins
Gap Analysis Methodology
Phase 1: Current State Assessment
Step 1: Document Current Practices
- Inventory existing policies and procedures
- Review current security controls
- Map data flows and processing activities
- Identify current certifications (ISO 27001, SOC 2, etc.)
- Interview key personnel
Step 2: Gather Evidence
- Technical documentation
- Security configurations
- Audit logs
- Training records
- Incident reports
- Contracts and agreements
Phase 2: Requirements Mapping
Step 1: Review ISO 27018 Controls Create checklist of all requirements:
- Section 6: Privacy principles
- Section 7: PII controller/processor obligations
- Section 8: Additional ISO 27002 controls
- Section 9: Guidance for public cloud PII processors
Step 2: Map to Current Controls For each requirement, identify:
- Existing control (if any)
- Implementation status
- Evidence available
- Gaps identified
Phase 3: Gap Identification
For Each Control, Determine:
Fully Compliant:
- Control implemented completely
- Evidence available
- Meets all requirements
- No action needed
Partially Compliant:
- Control exists but incomplete
- Some evidence available
- Remediation needed
- Quick fix possible
Not Compliant:
- No control in place
- No evidence
- Significant work required
- Major implementation needed
Not Applicable:
- Control doesn't apply to your environment
- Justification documented
Gap Analysis Template
ISO 27018 GAP ANALYSIS
Organization: _______________
Date: _______________
Conducted By: _______________
Control Reference: CLD.6.3 (Consent and Choice)
Requirement: "Organization shall not use PII for marketing without explicit consent"
CURRENT STATE:
☐ Fully Compliant ☐ Partially Compliant ☑ Not Compliant ☐ N/A
Current Implementation:
- Marketing emails sent to all users
- No consent mechanism for marketing
- Terms of service implies consent
Evidence Available:
- Marketing policy document
- Email templates
- User database schema
GAP IDENTIFIED:
- No explicit consent collection
- No consent management system
- No opt-out mechanism
- No consent records
REMEDIATION REQUIRED:
1. Implement consent management system
2. Add consent checkboxes to signup
3. Create opt-out process
4. Retroactively obtain consent from existing users
5. Update privacy policy
Priority: ☑ High ☐ Medium ☐ Low
Estimated Effort: 40 hours
Estimated Cost: $8,000
Target Completion: Q1 2026
Owner: Privacy Team
DEPENDENCIES:
- Development team availability
- Legal review of consent language
- Customer communication plan
---
[Repeat for all controls...]
Control Categories Checklist
1. Consent and Choice (CLD.6.3)
- Consent management system
- Explicit marketing consent
- Consent withdrawal mechanism
- Consent records maintained
- Purpose-specific consent
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
2. Purpose Legitimacy (CLD.6.4)
- Processing purposes documented
- Legal basis identified
- Purpose register maintained
- Purpose limitation controls
- Privacy notices
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
3. Collection Limitation (CLD.6.5)
- Minimal collection practices
- Justification for each field
- Progressive collection
- Optional vs. required fields
- Regular review of forms
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
4. Data Minimization
- Anonymization where possible
- Pseudonymization implemented
- Data masking
- Storage minimization
- Retention policies
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
5. Use, Retention, Disclosure (CLD.6.7)
- Use limitation controls
- Retention schedule defined
- Automated deletion
- Disclosure logging
- Sub-processor management
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
6. Accuracy and Quality
- Data validation
- Correction procedures
- Quality monitoring
- Update mechanisms
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
7. Openness and Transparency
- Privacy policy published
- Processing transparency
- Sub-processor registry
- Transparency reports
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
8. Data Subject Rights
- Access request process
- Correction process
- Deletion process
- Portability process
- Objection process
- 30-day response SLA
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
9. Accountability
- DPO or privacy officer
- Privacy policies
- Training program
- Audit program
- Compliance monitoring
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
10. Security Controls
- Encryption (rest & transit)
- Access controls
- Authentication (MFA)
- Audit logging
- Incident response
- Vulnerability management
Gap Rating: ☐ Complete ☐ Partial ☐ Missing
Prioritization Matrix
Prioritize gaps based on:
Priority 1 (Critical): Start Immediately
- Criteria: High risk, required for compliance, quick to fix
- Examples:
- Missing encryption
- No access controls
- No audit logging
- No incident response
- Timeline: 0-30 days
Priority 2 (High): Address Soon
- Criteria: Medium-high risk, significant effort
- Examples:
- Incomplete consent management
- Partial deletion capability
- Limited monitoring
- Timeline: 30-90 days
Priority 3 (Medium): Plan and Implement
- Criteria: Medium risk, moderate effort
- Examples:
- Documentation gaps
- Process improvements
- Training enhancements
- Timeline: 90-180 days
Priority 4 (Low): Continuous Improvement
- Criteria: Low risk, nice-to-have
- Examples:
- Automation opportunities
- Enhanced reporting
- Advanced features
- Timeline: 180+ days
Gap Analysis Report Template
ISO 27018 GAP ANALYSIS REPORT
EXECUTIVE SUMMARY
Organization: Example Corp
Assessment Date: December 8, 2025
Conducted By: Privacy Team + External Consultant
Scope: All cloud services processing customer PII
OVERALL COMPLIANCE STATUS:
- Fully Compliant Controls: 25 (45%)
- Partially Compliant Controls: 20 (36%)
- Non-Compliant Controls: 10 (18%)
- Not Applicable: 1 (1%)
MATURITY LEVEL: Developing (60% compliant)
TARGET CERTIFICATION DATE: Q3 2026 (8 months)
KEY FINDINGS:
Strengths:
- ISO 27001 certification provides strong foundation
- Encryption and access controls mostly in place
- Security monitoring operational
- Incident response procedures documented
Critical Gaps:
1. No consent management system (CLD.6.3)
2. Data retention not automated (CLD.6.7)
3. Sub-processor registry not public
4. Data subject rights partially implemented
5. Cross-border transfers not documented
REMEDIATION ROADMAP:
Phase 1 (Months 1-2): Critical Gaps
- Implement consent management
- Deploy automated deletion
- Create public sub-processor registry
- Document all cross-border transfers
Budget: $50,000
Owner: Privacy Team
Phase 2 (Months 3-4): High Priority
- Complete data subject rights implementation
- Enhance documentation
- Conduct staff training
- Perform internal audit
Budget: $30,000
Owner: Privacy Team + IT
Phase 3 (Months 5-6): Medium Priority
- Process improvements
- Automation enhancements
- Testing and validation
- Pre-assessment audit
Budget: $20,000
Owner: Compliance Team
Phase 4 (Months 7-8): Certification
- Address pre-assessment findings
- Final documentation review
- Certification audit
- Continuous improvement planning
Budget: $25,000
Owner: Management
TOTAL ESTIMATED INVESTMENT:
- Budget: $125,000
- Effort: 500 person-hours
- Timeline: 8 months
- FTEs Required: 2-3
RECOMMENDATIONS:
Immediate Actions:
1. Secure budget approval
2. Establish project team
3. Engage certification body
4. Begin Phase 1 implementation
Success Factors:
- Executive sponsorship
- Dedicated resources
- Clear ownership
- Regular progress reviews
- Early engagement with auditors
CONCLUSION:
Organization is 60% compliant with ISO 27018. With focused effort and adequate resources, certification is achievable within 8 months. Critical gaps are identifiable and remediable. Strong existing security foundation provides significant advantage.
SIGN-OFF:
Privacy Officer: _______________ Date: _______________
CISO: _______________ Date: _______________
CTO: _______________ Date: _______________
Gap Remediation Planning
For Each Gap, Define:
1. Gap Description Clear statement of the gap
2. Control Requirement What the standard requires
3. Current State What exists today
4. Desired State What needs to exist
5. Remediation Steps Specific actions required
6. Resources Needed People, tools, budget
7. Timeline Start and completion dates
8. Owner Person accountable
9. Dependencies What must happen first
10. Success Criteria How to know it's done
11. Verification Method How to prove compliance
Quick Win Opportunities
Look for:
1. Documentation Gaps
- Often quick to create
- High compliance impact
- Low cost
Examples:
- Privacy policy updates
- Procedure documentation
- Form templates
2. Process Formalization
- Activities already happening
- Just need documentation
- Minimal behavioral change
Examples:
- Document existing training
- Formalize incident response
- Record management reviews
3. Configuration Changes
- Technical controls exist
- Just need proper configuration
- Can be implemented quickly
Examples:
- Enable existing encryption
- Configure audit logging
- Adjust access controls
Common Pitfalls
❌ Incomplete Assessment
- Skipping technical verification
- Not interviewing staff
- Missing shadow IT
✓ Thorough Approach
- Technical scans
- Staff interviews
- Complete documentation review
❌ Underestimating Effort
- "It's just documentation"
- Ignoring organizational change
- Not accounting for dependencies
✓ Realistic Planning
- Include change management
- Account for reviews/approvals
- Build in contingency
❌ Lack of Prioritization
- Trying to fix everything at once
- Equal priority to all gaps
- Resource overload
✓ Strategic Approach
- Risk-based prioritization
- Phased implementation
- Quick wins first
Next Steps After Gap Analysis
-
Present Findings
- Executive summary
- Key gaps
- Remediation plan
- Resource requirements
-
Secure Approval
- Budget allocation
- Resource assignment
- Timeline agreement
- Executive sponsorship
-
Establish Governance
- Project team
- Steering committee
- Progress reporting
- Issue escalation
-
Begin Implementation
- Phase 1 kickoff
- Quick wins
- Regular status updates
- Risk management
-
Monitor Progress
- Weekly team meetings
- Monthly steering committee
- Gap closure tracking
- Timeline management
Next Lesson: Audit preparation - get ready for your ISO 27018 certification audit.