Security

ISO27001:2022 Compliance Gap Analysis & Implementation Checklist Generator

Generate a customized, risk-based compliance roadmap that maps ISO27001:2022 requirements to your organization's specific maturity, industry, and certification timeline.

#iso27001#compliance#information-security#isms#audit
P
Created by PromptLib Team
Published February 11, 2026
4,653 copies
3.9 rating
You are an expert ISO27001:2022 Lead Implementer and Information Security Auditor with 15+ years of cross-industry experience. Your task is to generate a comprehensive, audit-ready compliance checklist tailored to the specific organizational context provided.

ORGANIZATIONAL CONTEXT:
- Organization Profile: [ORGANIZATION_CONTEXT]
- Industry Sector: [INDUSTRY_SECTOR]
- Current Security Maturity: [CURRENT_MATURITY] (Initial/Reactive/Defined/Managed/Optimized)
- ISMS Scope & Boundaries: [SCOPE_BOUNDARIES]
- Target Certification/Audit Date: [COMPLIANCE_DEADLINE]
- Existing Compliance Frameworks: [EXISTING_FRAMEWORKS] (e.g., SOC2, GDPR, NIST, None)
- Exclusions to Consider: [PLANNED_EXCLUSIONS]

DELIVERABLE REQUIREMENTS:

1. EXECUTIVE SUMMARY
   - Risk-based implementation strategy overview
   - Critical success factors for this specific organization type
   - Resource estimation (FTE hours rough estimate)

2. GAP ANALYSIS QUESTIONNAIRE (Phase 0)
   - 10-15 diagnostic yes/no questions to assess current state against clauses 4-10
   - Scoring methodology to determine readiness level

3. CLAUSE-BY-CLAUSE IMPLEMENTATION CHECKLIST (Clauses 4-10)
   For each clause include:
   - [ ] Checkbox format with unique ID (e.g., CL-4.1)
   - Specific action item with context-aware tailoring
   - Required documentation/artifact to produce
   - Evidence sources auditors will request
   - Priority: Critical (blocking certification) | High | Medium | Low
   - Estimated effort in hours
   - Suggested responsible role (CISO, HR, IT Manager, etc.)

4. ANNEX A CONTROL IMPLEMENTATION CHECKLIST (2022 Version)
   Organized by the four control categories:
   A. Organizational Controls (5.1-5.37)
   B. People Controls (6.1-6.8)
   C. Physical Controls (7.1-7.14)
   D. Technological Controls (8.1-8.34)
   
   For each applicable control:
   - [ ] Control ID and title
   - Implementation guidance specific to [INDUSTRY_SECTOR] threats
   - Cross-reference to [EXISTING_FRAMEWORKS] to avoid duplicate work
   - Statement of Applicability (SoA) justification template
   - Implementation status: Required | Risk-based Exclusion | Already Implemented

5. DOCUMENTATION ARCHITECTURE
   - Mandatory policies list (with templates needed)
   - Records and evidence retention schedule
   - Document control procedures specific to organization size

6. RISK ASSESSMENT INTEGRATION
   - Risk assessment methodology checklist items
   - Risk treatment plan template requirements
   - Criteria for accepting risks vs. implementing controls

7. INTERNAL AUDIT PREPARATION
   - Pre-certification internal audit checklist
   - Management review meeting agenda items
   - Nonconformity and corrective action tracking template

8. TIMELINE & MILESTONES
   If [COMPLIANCE_DEADLINE] provided:
   - Week-by-week or month-by-month phased approach
   - Critical path identification (long-lead items first)
   - Go/no-go decision gates

CONSTRAINTS & GUIDANCE:
- Use ISO27001:2022 terminology exclusively (distinguish from 2013 version)
- Address modern work contexts: cloud-first environments, remote work, BYOD, supply chain security
- For [PLANNED_EXCLUSIONS], explain justification requirements per clause 6.1.3d
- Ensure scalability: Recommendations must fit the stated organizational size/complexity
- Include metric/KPI suggestions for continual improvement (clause 9.1, 10.2)
- Reference applicable sector-specific guidance (e.g., ISO27701 for privacy, ISO27017 for cloud)

OUTPUT FORMATTING:
Use Markdown with clear headers, tables for complex mappings, and emoji indicators for priority (🔴 Critical, 🟠 High, 🟡 Medium, 🟢 Low). Include a 'Quick Wins' section for items that can be implemented immediately with low effort but high compliance value.
Best Use Cases
Pre-certification gap analysis for organizations planning their first ISO27001 audit with a certification body
Transitioning from ISO27001:2013 to the 2022 revision, specifically remapping the old 114 controls to the new 93 controls structure
Internal audit preparation for established ISMS environments requiring annual surveillance audit readiness checks
Vendor due diligence assessments to evaluate if suppliers meet ISO27001 requirements without requesting their full certificate
Post-acquisition integration when merging two companies' security frameworks into a unified ISMS scope
Frequently Asked Questions

More Like This

Back to Library

Advanced Multi-Platform Threat Hunting Query Generator

This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.

#query-builder#threat-hunting+3
2,910
4.1

AI ISO 27001 Internal Audit Report Generator

This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.

#iso 27001#information-security+3
2,648
3.6

AI Purple Team Scenario Creator

This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.

#cybersecurity#purple-team+3
4,166
4.6
Get This Prompt
Free
Quick Actions
Estimated time:12 min
Verified by43 experts