Prodigy 13 - logo

Security Assessment, and Audit Readiness

Prodigy 13 - Zero Trust Security

Security Assessments (Gap Analysis) are conducted for your benefit, to allow you to establish a baseline or understand how you would score in an audit against a specific governance framework (NIST CSF, SOC 2, ISO 27001, etc). Upon completion, your organization will have an understanding of what aspects of the assessed framework are implemented and operating effectively, and what aspects require additional work.

The process is organized in multiple phases:

Phase 1:

Examine all relevant documentation to determine what aspects of the framework are currently in place. Analysis of the documentation allows the consultant to understand the maturity level of the program and identify areas to improve beyond compliance with the assessed framework. Documents may include, but are not limited to:

  • Incident Response and Disaster Recovery (BCDR) Plans
  • Organizational Chart
  • Employee Handbook
  • Configurations
  • Technical Controls
  • Network Diagrams
  • Compliance Reports
  • Application Assessment Reports
  • Pen Testing Reports
  • Vulnerability Scans
  • Policies, Standards, Guidelines, Procedures

Phase 2:

Conduct interviews with key stakeholders at the organization. These stakeholders will answer questions relating to specific aspects of the framework as well as the overall security posture. Interviewees may include, but are not limited to:

  • Director of Security/Director of IT
  • Security Architect
  • Network Administrator/Engineer
  • Server Administrator/Engineer
  • Desktop Support
  • Legal and Compliance
  • SOC Team
  • Development Team
  • IT Operations Team
  • Senior Leadership
  • Human Resources

Phase 3:

After the interviews are complete, will review the notes and ask for any follow-up documentation.  Additional interviews may be necessary based on clarifying documentation. will attempt to continue to clarify any findings to increase the accuracy of the report.

Phase 4:

Reports, upon completion of the assessment, will capture the results in a report, including:

  • Executive Summary
  • Assessment Findings
  • Remediation Recommendations
  • Remediation Roadmap

Phase 5:

Debrief, once the deliverable has been received, will schedule a debriefing meeting to discuss the results of the assessment. During this phase, will work with you to determine any necessary changes to the report. When changes are complete, will finalize the report and finish the project.

The security assessment report can be used as an Audit Readiness report. You can use this report to determine how well you stack up against a particular compliance framework, and what actions need to be taken to achieve 100% compliance.

At Prodigy 13, the security assessment (gap analysis) is the first step of our process, and is offered as a free complimentary service to all of our current clients.

Zero Trust Blog

Get email alerts when we publish new blog articles!

more blog posts:


Assessments & Questionnaires

Risk assessments, security questionnaires, vendor due diligence, and RFPs are strategic initiatives for organizations managing risk across growing and interconnected supply chains.

Read More
shallow focus photography of computer codes
Cloud Security

What is Threat Hunting?

Threat Hunting is a creative process. One’s abilities to think abstractly, challenge ideas, and be unafraid of failure lead to more knowledge and breakthroughs than someone who does everything the same way every time.

Read More