Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

Conducting a Comprehensive Cybersecurity Gap Analysis with Asgard Cyber Security 

Cybersecurity Gap Analysis Written by Megan Parris

July 18th, 2024

 

In the dynamic and ever-evolving landscape of cybersecurity, organizations must continually assess and enhance their security measures to safeguard sensitive data and maintain regulatory compliance. At Asgard Cyber Security, we offer a meticulous Gap Analysis service designed to help organizations identify and address deficiencies in their cybersecurity posture. Overseen by Asgard’s Chief Technology Officer (CTO), our Gap Analysis process is aligned with the guidelines and standards of NIST 800-171 Rev. 3, FAR 52.204-21, and DFAR 252.204-7012. Here’s an overview of the tasks involved in our comprehensive cybersecurity Gap Analysis project. 

Overview of Our Cybersecurity Gap Analysis:

  1. Current State Analysis

  

IT/Business Policy Review: 

- Gather Existing Policies: We start by collecting all current IT and business policies related to cybersecurity. 

- Policy Examination: Each policy is scrutinized for relevance, comprehensiveness, and alignment with NIST 800-171 Rev. 3, FAR 52.204-21, and DFAR 252.204-7012 standards. 

- Practical Implementation Review: We consult with relevant business units to understand how these policies are implemented in practice. 

  

Internal Procedures Review: 

- Procedure Compilation: A list of all internal cybersecurity procedures is compiled. 

- Effectiveness Evaluation: We evaluate the effectiveness of each procedure by examining logs, reports, and user testimonies. 

- Alignment Check: These procedures are then checked against the reviewed policies for consistency and alignment. 

  

Internal Audit / Penetration Testing Review: 

- Audit and Testing Results Review: We review results from recent internal audits and penetration tests. 

- Risk and Vulnerability Identification: Vulnerabilities and risks highlighted in these reports are identified and compared against the required frameworks. 

- Remediation Assessment: We assess how identified issues have been addressed. 

  

  1. Future State Planning

  

Familiarize Your Organization with New Framework: 

- Training Sessions: We organize training sessions or workshops to introduce the new framework requirements to key stakeholders. 

- Educational Materials: We create educational materials, such as handouts and slides, to explain the key aspects and benefits of the security framework. 

  

Identify Exceptions or Modifications: 

- Engage Business Leaders: Through interviews, surveys, or workshops, we understand specific business needs that might require exceptions. 

- Document Changes: Any changes or exceptions are documented with clear rationales. 

  

Map Existing Policies and Procedures: 

- Develop a Matrix: We create a matrix to map current policies and procedures against the framework controls. 

- Highlight Overlaps and Gaps: This matrix helps to highlight any overlaps or gaps in the current cybersecurity measures. 

  

Re-create Risk Analysis: 

- Foundation Re-assessment: We use NIST 800-171 Rev. 3, FAR 52.204-21, and DFAR 252.204-7012 as a foundation to re-assess current risks. 

- Risk Prioritization: Risks are prioritized based on their impact and likelihood under the new framework. 

  

Identify Regulatory Bodies and Compliance Requirements: 

- We identify relevant regulatory bodies and outline the specific compliance requirements applicable to the organization. 

  

  1. Gap Analysis

  

Identify Unaddressed Areas: 

- Pinpoint Framework Deficiencies: Using the developed matrix, we pinpoint areas where the organization's current state does not meet framework standards. 

- Ensure Comprehensive Documentation: For each section of NIST 800-171 Rev. 3, FAR 52.204-21, and DFAR 252.204-7012, we ensure there is either supporting documentation, an aligned policy/procedure, or a documented exception. 

  

  1. Recommended Remediations

 

Develop Remediation Plans: 

- Objective Definition: Clear objectives are defined for each remediation effort. 

- Resource Determination: Required resources, including personnel, tools, time, and potential costs, are determined. 

- Task Prioritization: Remediation tasks are prioritized based on risk exposure and business impact. 

- Timeline Establishment: Timelines and milestones for each task are established. 

- Responsibility Assignment: Responsibilities and ownership are assigned to relevant teams or individuals. 

- Ensure Open Communication: Communication channels are kept open for any clarifications or adjustments needed during the remediation process. 

Conclusion 

By following this detailed Gap Analysis process, Asgard Cyber Security ensures that organizations not only identify their cybersecurity weaknesses but also receive actionable recommendations to fortify their defenses. Our commitment to adhering to industry standards and best practices ensures that your organization is well-equipped to handle current and future cybersecurity challenges. 

Let’s work together

Get in touch with us and send some basic info about your project.
Get started today!