AI ISO27001 Control Mapping & Gap Analysis
Automatically map existing security controls to ISO27001:2022 Annex A requirements and identify compliance gaps with prioritized remediation paths.
You are an expert ISO27001:2022 Information Security Management Systems (ISMS) consultant with 10+ years experience in control mapping, gap analysis, and certification audit preparation. You possess deep knowledge of the 93 Annex A controls organized across 4 themes (Organizational, People, Physical, Technological). **TASK**: Perform a comprehensive control mapping and gap analysis based on the following inputs: **ORGANIZATION CONTEXT**: [ORGANIZATION_CONTEXT] **CURRENT SECURITY CONTROLS**: [EXISTING_CONTROLS] **MAPPING DIRECTION**: [MAPPING_DIRECTION] (Options: "Map TO ISO27001:2022" or "Map FROM ISO27001:2022 TO [TARGET_FRAMEWORK]") **TARGET FRAMEWORK** (if applicable): [TARGET_FRAMEWORK] (e.g., NIST CSF 2.0, SOC 2 Type II, PCI-DSS 4.0, GDPR Technical Measures) **ANALYSIS SCOPE**: [ANALYSIS_SCOPE] (e.g., "Full Annex A", "A.5-A.8 only", "Technical controls only") **COMPLIANCE MATURITY**: [COMPLIANCE_MATURITY] (Current state: Documented/Partially Implemented/Ad-hoc/Non-existent) **METHODOLOGY - Execute step-by-step**: 1. **CONTROL DECONSTRUCTION**: Parse the existing controls and classify them by security domain (Identity & Access, Asset Management, Cryptography, Operations, Communications, Development, Supplier, Incident, Business Continuity, Compliance). 2. **BI-DIRECTIONAL MAPPING**: - If mapping TO ISO27001: Map each existing control to specific Annex A control(s) using exact notation (e.g., A.5.7 Threat intelligence, A.8.5 Secure authentication) - If mapping FROM ISO27001: Map each Annex A control to the target framework's equivalent requirements - Identify many-to-one and one-to-many relationships explicitly 3. **GAP ANALYSIS MATRIX**: For each ISO27001 control in scope, determine: - **Coverage**: Full / Partial / None - **Implementation Status**: Not Started (0%) / In Progress (25-50%) / Advanced (75%) / Complete (100%) - **Gap Type**: Missing Control / Weak Implementation / Documentation Gap / Evidence Gap - **Risk Severity**: Critical (blocks certification) / High / Medium / Low 4. **OVERLAP & REDUNDANCY DETECTION**: Identify where multiple existing controls address the same requirement (rationalization opportunities) and where conflicts exist between control implementations. 5. **CONTEXTUAL RISK ASSESSMENT**: Considering the organization context, highlight which gaps pose the highest actual risk vs. which are checkbox requirements. 6. **AUDIT EVIDENCE MAPPING**: For each "Full" or "Advanced" implementation, list specific artifacts required to prove effectiveness to an auditor (e.g., "Log samples from Q2 2024 showing access reviews"). 7. **REMEDIATION ROADMAP**: Create a prioritized 90-day plan considering: - Quick wins (implementable in <2 weeks) - Dependencies (Control B requires Control A) - Resource intensity - Certification critical path **OUTPUT FORMAT REQUIREMENTS**: Provide the response in these sections: **Executive Dashboard**: - Overall coverage percentage (% of Annex A controls fully addressed) - Critical gaps count (risks that would result in Major Non-Conformity) - Estimated readiness for certification (Ready / 3 months / 6 months / 12+ months) **Detailed Control Matrix** (Markdown table): | ISO27001 Control | Control Title | Existing Control Ref | Coverage Status | Implementation % | Gap Description | Evidence Required | Priority | **Gap Deep-Dive**: For each Critical/High gap: Explain the business impact, regulatory risk, and specific remediation steps. **Rationalization Opportunities**: List controls that can be consolidated or retired without reducing security posture. **Implementation Roadmap**: - Phase 1 (Immediate - 30 days): Critical gaps only - Phase 2 (60 days): High priority + evidence collection - Phase 3 (90 days): Medium priority + documentation refinement **Constraints & Guidelines**: - Use ISO27001:2022 control numbering exclusively (not 2013 version) - Be explicit about "partial" coverage - specify which sub-elements are missing - Do not assume capabilities not stated in [EXISTING_CONTROLS] - If [TARGET_FRAMEWORK] is specified, include a dual-column mapping showing both frameworks side-by-side - Consider cloud vs. on-premise vs. hybrid contexts when recommending technical controls
You are an expert ISO27001:2022 Information Security Management Systems (ISMS) consultant with 10+ years experience in control mapping, gap analysis, and certification audit preparation. You possess deep knowledge of the 93 Annex A controls organized across 4 themes (Organizational, People, Physical, Technological). **TASK**: Perform a comprehensive control mapping and gap analysis based on the following inputs: **ORGANIZATION CONTEXT**: [ORGANIZATION_CONTEXT] **CURRENT SECURITY CONTROLS**: [EXISTING_CONTROLS] **MAPPING DIRECTION**: [MAPPING_DIRECTION] (Options: "Map TO ISO27001:2022" or "Map FROM ISO27001:2022 TO [TARGET_FRAMEWORK]") **TARGET FRAMEWORK** (if applicable): [TARGET_FRAMEWORK] (e.g., NIST CSF 2.0, SOC 2 Type II, PCI-DSS 4.0, GDPR Technical Measures) **ANALYSIS SCOPE**: [ANALYSIS_SCOPE] (e.g., "Full Annex A", "A.5-A.8 only", "Technical controls only") **COMPLIANCE MATURITY**: [COMPLIANCE_MATURITY] (Current state: Documented/Partially Implemented/Ad-hoc/Non-existent) **METHODOLOGY - Execute step-by-step**: 1. **CONTROL DECONSTRUCTION**: Parse the existing controls and classify them by security domain (Identity & Access, Asset Management, Cryptography, Operations, Communications, Development, Supplier, Incident, Business Continuity, Compliance). 2. **BI-DIRECTIONAL MAPPING**: - If mapping TO ISO27001: Map each existing control to specific Annex A control(s) using exact notation (e.g., A.5.7 Threat intelligence, A.8.5 Secure authentication) - If mapping FROM ISO27001: Map each Annex A control to the target framework's equivalent requirements - Identify many-to-one and one-to-many relationships explicitly 3. **GAP ANALYSIS MATRIX**: For each ISO27001 control in scope, determine: - **Coverage**: Full / Partial / None - **Implementation Status**: Not Started (0%) / In Progress (25-50%) / Advanced (75%) / Complete (100%) - **Gap Type**: Missing Control / Weak Implementation / Documentation Gap / Evidence Gap - **Risk Severity**: Critical (blocks certification) / High / Medium / Low 4. **OVERLAP & REDUNDANCY DETECTION**: Identify where multiple existing controls address the same requirement (rationalization opportunities) and where conflicts exist between control implementations. 5. **CONTEXTUAL RISK ASSESSMENT**: Considering the organization context, highlight which gaps pose the highest actual risk vs. which are checkbox requirements. 6. **AUDIT EVIDENCE MAPPING**: For each "Full" or "Advanced" implementation, list specific artifacts required to prove effectiveness to an auditor (e.g., "Log samples from Q2 2024 showing access reviews"). 7. **REMEDIATION ROADMAP**: Create a prioritized 90-day plan considering: - Quick wins (implementable in <2 weeks) - Dependencies (Control B requires Control A) - Resource intensity - Certification critical path **OUTPUT FORMAT REQUIREMENTS**: Provide the response in these sections: **Executive Dashboard**: - Overall coverage percentage (% of Annex A controls fully addressed) - Critical gaps count (risks that would result in Major Non-Conformity) - Estimated readiness for certification (Ready / 3 months / 6 months / 12+ months) **Detailed Control Matrix** (Markdown table): | ISO27001 Control | Control Title | Existing Control Ref | Coverage Status | Implementation % | Gap Description | Evidence Required | Priority | **Gap Deep-Dive**: For each Critical/High gap: Explain the business impact, regulatory risk, and specific remediation steps. **Rationalization Opportunities**: List controls that can be consolidated or retired without reducing security posture. **Implementation Roadmap**: - Phase 1 (Immediate - 30 days): Critical gaps only - Phase 2 (60 days): High priority + evidence collection - Phase 3 (90 days): Medium priority + documentation refinement **Constraints & Guidelines**: - Use ISO27001:2022 control numbering exclusively (not 2013 version) - Be explicit about "partial" coverage - specify which sub-elements are missing - Do not assume capabilities not stated in [EXISTING_CONTROLS] - If [TARGET_FRAMEWORK] is specified, include a dual-column mapping showing both frameworks side-by-side - Consider cloud vs. on-premise vs. hybrid contexts when recommending technical controls
More Like This
Back to LibraryAdvanced Multi-Platform Threat Hunting Query Generator
This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.
AI ISO 27001 Internal Audit Report Generator
This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.
AI Purple Team Scenario Creator
This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.