🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Perform a Gap Analysis and Translate Findings into an Executable Roadmap: Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-2

Step-by-step guidance for performing a gap analysis against ECC‑2:2024 Control 1-1-2 and converting findings into a prioritized, executable roadmap to meet Compliance Framework requirements.

March 28, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Performing a robust gap analysis and turning the results into an executable roadmap is a foundational step to meet Essential Cybersecurity Controls (ECC – 2 : 2024), specifically Control 1-1-2 under the Compliance Framework; this post provides practical, actionable steps, real-world small-business examples, technical implementation details, and compliance tips you can apply immediately.

Overview: What Control 1-1-2 requires and why a gap analysis matters

Control 1-1-2 in ECC‑2:2024 (as implemented under the Compliance Framework) expects organizations to identify where current cybersecurity capabilities diverge from the defined control objectives, document the deficiencies, and produce an actionable remediation plan. A gap analysis converts abstract compliance language into measurable evidence and prioritized actions — it transforms "we need to do better" into "these concrete steps, owners, timelines, and artifacts will demonstrate compliance." Without this, organizations drift, auditors see inconsistent evidence, and risk reductions are never realized.

Step-by-step gap analysis process (Compliance Framework specific)

Follow this sequence to structure your gap analysis so it maps cleanly to ECC controls and produces audit-ready evidence:

1) Define scope and control mapping

List assets, systems, and processes in scope (e.g., cloud tenants, production servers, identity providers). Map each scoped item to the specific requirements of Control 1-1-2 and any related ECC controls. Use a simple matrix: Asset/Process → Control Clause → Expected Evidence (policy, config, log, test).

2) Collect evidence and perform control tests

Gather artifacts: configuration files, policy documents, authentication logs, vulnerability scan results, and screenshots. For each clause, perform an evidence-based test (e.g., verify MFA is enforced for all administrator accounts by attempting a login with a test account and capturing the authentication flow). Record results in a standardized template (Pass/Fail/Partial + notes + timestamp + collector).

3) Assess severity and root cause

Score each gap by impact and likelihood to derive a risk rating. Use business-impact categories (confidentiality, integrity, availability) and a simple likelihood scale (1–5). For Control 1-1-2, emphasize whether the gap undermines the ability to demonstrate control operation to an auditor (evidence risk) versus a technical exposure.

Translating findings into an executable roadmap

Once gaps are identified and scored, convert them into a prioritized roadmap that the business can execute and auditors can validate. Key fields for each roadmap item: title, description, control reference, priority (Critical/High/Medium/Low), owner, dependencies, acceptance criteria, estimated effort, target dates, and required evidence artifacts. Include quick wins (low effort, high impact) and milestones for larger improvements.

Practical implementation details & technical examples for small businesses

Example: a 50‑employee SaaS small business with AWS-hosted apps. Findings may include: no centralized asset inventory, no enforced MFA on admin accounts, weekly patching not in place, logging retained only 7 days, and no endpoint detection & response (EDR). Roadmap sample items: 1) Establish inventory using AWS Config + a lightweight CMDB (2–4 weeks); 2) Enforce MFA via Identity Provider (Okta/Azure AD) and enable conditional access (1–2 business days for baseline users, 2–4 weeks for full rollout); 3) Implement automated patching via SSM/Ansible with a weekly cadence and maintenance window (2–6 weeks); 4) Centralize logs to a managed SIEM or cloud logging (e.g., CloudWatch Logs → OpenSearch or third-party SIEM) and set retention to 90 days (3–8 weeks); 5) Deploy EDR agents to endpoints and servers, integrate with ticketing and incident response runbook (4–8 weeks). For each item, list the artifact auditors expect: configuration snapshots, policy text, change requests, test logs, and screenshots of settings.

Compliance tips, best practices, and concrete artifacts

Document everything with timestamps and owners — auditors want repeatable evidence. Use a consistent evidence naming convention (e.g., "EVID_AWS_CFG_STACK_2026-03-01.json"). Create a RACI for roadmap items and publish status in a compliance tracker (spreadsheet, Jira board, or GRC tool). Automate evidence capture where possible: export IAM policies, MFA configuration, and log retention via scripts, and store outputs in a versioned evidence repository. Define measurable KPIs tied to the roadmap (percentage of critical gaps closed, mean time to remediate (MTTR), % of assets inventoried).

Risk of not implementing Control 1-1-2

Failing to perform and act on a gap analysis increases the likelihood of regulatory non‑compliance findings, incident response failures, or material security incidents. For a small business, risks include customer churn after a breach, contractual penalties, inability to pass vendor security reviews, and unclear remediation histories that cause audit failures. Technically, lack of prioritized remediation can leave exploitable exposures such as unpatched services, unprotected administrative accounts, and insufficient logging that prevent detection and forensic analysis.

Conclusion: Next steps and summary

Control 1-1-2 is not a one‑time exercise — it is a discipline: scope clearly, collect evidence, score and root‑cause, then convert gaps into an executable roadmap with owners, acceptance criteria, and artifacts aligned to the Compliance Framework. For small businesses, prioritize quick wins (inventory, MFA, patching) while planning medium-term investments (SIEM, EDR). Use automation to capture evidence, keep stakeholders accountable with a RACI and KPIs, and iterate the gap analysis quarterly or after major changes. Doing this will dramatically improve your demonstrable compliance posture and reduce technical and business risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes