• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Firewall
      • Managed SaaS Security

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring
      • Managed Email and Collaboration Security

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Fabric

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

IT Control Gap Analysis

  • Written by: Dave Nelson
  • August 9, 2017
Gap Analysis Graphic

When someone says they are getting ready to do a gap analysis of an IT systems, what’s the first thing that comes to mind? Compliance, SOX, HIPAA, log management, change control, identity management? While all of these are valid considerations, they should not be the first.  

The Importance of Processes 

Process should be the starting point for every review. Without a process, systems are worthless. For instance, if you have a log management system but no process that defines who reviews logs, what they should look for and what actions to take, the technology is useless. Priority should be placed on the maturity of the process. This includes policy, procedures and overall documentation. 

It happens time and time again. An outage occurs because a simple procedure was not followed. Perhaps the procedure wasn’t documented or wasn’t documented well. Maybe the procedure exists but nobody knows about it. These types of issues display a lack of maturity, which no amount of technology can fix. Organizations should begin to place more importance, and thus resources, on improving their process. 

Technology will only take you so far with security and compliance. In fact, at times technology will mask poor processes, which may complicate problems in the future. 

5 Questions to Ask During a Gap Analysis 

If you are a CIO, CTO, VP, Director or Manager of a technology group, I implore you to sit down as a leadership team and review the following 5 items. 

  • Do we have a policy which dictates the design, implementation, management and review of our systems? 
  • Do we have a repository of procedures and associated documentation to carry out this policy? 
  • Are team members well educated in the existence, importance and location of this information? 
  • Is someone responsible for managing this repository and performing periodic reviews as our technology and business process evolves? 
  • Is there a system in place to identify and correct actions not in line with our process? 

If more of this activity were to take place, I’d venture to bet companies would spend less time trying to fit various security technologies into their organization and more time finding technology that complements their existing way of doing business. 

Related Content

Risk Matrix Likelihood Impact

Risk Assessment: Likelihood and Impact

Assess risk effectively with the risk assessment likelihood and impact matrix. This decision-making matrix assesses risk based on the likelihood and impact of threats in your organization.

Learn More »
outsourced project management

An IT Manager’s Guide to a Successful Audit

Learn from this overview of the audit process. Discover how IT management can insert themselves into this process to benefit from the exercise.

Explore More »
Meeting at a Table

The IT Audit Process

Take steps to fully understand the phases of your audit to ensure that you have the appropriate resources and input available at each stage.

Read More »
  • Audits, CIO, IT Leadership, Risk Assessment
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
©2026 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.