Use Case

Control gap remediation
as a workflow on the engagement record, not a spreadsheet ticking exercise

Most enterprise programmes carry a control gap register that lives in a spreadsheet, drifts between assessments, and only fully reconciles the week before audit. Run control gap remediation as a workflow on the engagement record so each gap has a named owner, a closure plan, evidence requirements, and an audit trail that reproduces from one record rather than from a multi-system reconciliation sprint.

No credit card required. Free plan available forever.

Run control gap remediation as a workflow on the engagement record

Most enterprise programmes carry a control gap register that lives in a spreadsheet, drifts between assessments, and only fully reconciles the week before audit. The list of gaps is long, the owners are vague, the evidence is everywhere, and the closure events are recorded as colour fills on a tab nobody reads between cycles. The cost arrives at the next external assessment when the audit committee asks for the reproducible chain from gap to closure to operating evidence and the answer is a multi-team sprint to assemble it from email threads, ticket comments, and shared drives. Control gap remediation is rarely the bottleneck on purpose; it is the chokepoint by default because nobody owns the workflow layer between the framework register and the live security record.

This is the GRC workflow that sits between assessments. For the assessment event itself, read the compliance audits use case. For the per-finding lifecycle from open to verified closed, read the remediation tracking workflow. For the deferred-risk track that signs an exception when a gap cannot close on schedule, read the vulnerability acceptance and exception management workflow. For the queue-level discipline that keeps open work observable, read the vulnerability backlog management workflow. For the leadership-level read of remediation progress, read the security leadership reporting workflow. For the analytical view of how operating controls erode between audits, read the research on security control drift and the analysis of audit evidence half-life. The companion analysis of continuous control monitoring cadence covers the per-control reconciliation rhythm and change-trigger policy that turns gap detection from an audit-week sprint into a live operating discipline.

Six gap patterns the workflow has to handle

Control gaps are not all the same shape. The six patterns below recur in every multi-framework programme that runs gap remediation as a discipline rather than a spreadsheet exercise. Each one starts as a routine GRC task and ends as an audit-reconciliation problem if the workflow layer is not deliberate.

PatternHealthy postureDefault failure
A gap exists with no operating evidenceThe control is documented and a named owner is accountable, but the operating evidence (policy review, configuration baseline, scanner output, attestation) is missing or stale. The gap closes when the evidence artefact lands on the record with a date, a source, and an owner. Programmes that operate this way pass framework reads because evidence is reproducible from one record rather than reassembled at audit week.The control is described in the policy library and never reconciled against the live operating record. The gap is invisible until the assessor asks for current evidence and the answer is a multi-team sprint to assemble artefacts from email threads, ticket comments, and shared drives.
A finding exposes a control that is failing in productionThe vulnerability finding is linked to the affected framework control on the engagement record. Closing the finding reduces the gap; documenting compensating controls or signing an exception with residual rationale closes the remaining gap on the framework view. The control coverage view always reads the live findings record rather than a parallel manual count.The finding closes in the security record and the control register never updates because the two systems are not joined. The audit committee reads two different pictures of the same control: closed on the security side, open on the GRC side, and neither side can produce the reconciliation in under a week.
An exception covers the gap and the exception expiresThe exception register entry carries an expiry date and a reassessment trigger. Approaching expiry creates an open gap on the control coverage view with the named owner and the planned closure path (renew, remediate, retire) before the exception lapses. The transition from accepted risk to active remediation is a deliberate event recorded on the engagement.The exception expires unnoticed and the control silently slides from accepted-risk to unmanaged-gap. The next audit reads the exception as expired and the control as failing, without the closure plan, the residual rationale, or the named owner that the original acceptance carried.
A control is in scope on paper and out of scope in practiceThe asset boundary on the engagement record reconciles with the system description the assessor agreed to. When an asset moves out of scope, the gap on its associated controls closes through retirement rather than remediation. When an asset is in scope but unaccounted for, the gap opens with a named owner and a closure plan rather than aging in a backlog.The control register reflects the original system description and the live environment has drifted: assets retired, services migrated, environments split. Controls that the assessor expects to read against the live environment fail to reconcile and the closure conversation defaults to scoping debate rather than remediation evidence.
Compensating controls erode quietly between auditsCompensating controls are recorded against the primary gap with the residual position the original approval signed off on. When the substitute mechanism changes (replaced, retired, modified, moved to a different platform), the gap reopens for re-evaluation rather than carrying the original acceptance forward. The compensating control register and the exception register are tracked as different artefacts because they drift differently.A compensating control accepted a year earlier is read as still applicable on the current control register even though the substitute mechanism has been replaced. The audit committee reads operating coverage that has not actually operated for two quarters, and the residual risk is larger than the dashboard suggests.
Closure on plan rather than on evidenceThe closure event happens when the planned evidence artefact lands on the record: a policy update, a configuration baseline, a scanner re-run with the underlying finding absent, a signed attestation with a named approver, or an updated procedure in document management. The remediation date and the evidence date are independent fields on the gap so the audit trail is reproducible.A gap is closed because the planned remediation date passed, not because evidence landed. The headline closure rate looks healthy and the next assessment reads several closures as still-failing because the evidence chain was never produced. Closure rate is fast; reopen rate is the truer signal.

Six failure modes that quietly inflate the gap register

Gap-register failures rarely look like failures at the moment they happen. They look like convenience: a faster spreadsheet update, a simpler closure rule, a quicker handoff between security and GRC. The cost arrives at the next audit lookback when the closure-evidence question takes a multi-week sprint rather than a one-line query.

The gap register lives in a spreadsheet outside the platform

When the gap register is a spreadsheet on a shared drive, severity, owner, evidence, and closure events drift away from the live findings record. The audit lookback question (show me how this gap closed and what evidence supports the closure) becomes a multi-team reconciliation sprint because the closure trail lives across tabs, ticket comments, and email threads.

Gaps are tracked against frameworks but not against owners

When the gap is mapped to ISO 27001 Annex A 8.8 but not to a named role on a named team, ownership defaults to whoever opens the spreadsheet first. The hard gaps sit untouched, the easy ones get assigned the closures that look like progress, and the dashboard reflects the visible work rather than the residual posture.

Evidence is captured but never linked to the gap

When the evidence artefact (a policy PDF, a scanner CSV, a configuration screenshot) is uploaded to a shared drive without a record reference back to the gap, the audit walk has to reconstruct the relationship from filenames and folder structure. The artefact exists, the gap exists, and the link between them lives in institutional memory rather than on a query.

Closure rate is reported without aging or evidence quality

When the gap-closure dashboard shows percent closed without splitting by aging bucket, evidence quality, or framework, the headline reads as healthy progress while the long tail of unowned gaps grows untouched. The leadership read drifts further from the audit-committee read each cycle and the gap surfaces only at the next assessment.

Gap remediation runs parallel to the vulnerability programme

When the gap-closure track operates separately from findings management, the same underlying vulnerability is counted twice (once on the security side, once on the GRC side) and closed twice with different evidence. The audit committee asks for a unified view and the unification work happens the week before the audit rather than continuously.

No reassessment trigger on closed gaps

When a closed gap has no reassessment cadence, the closure stays valid indefinitely on the control register even though the underlying environment has changed. Configurations drift, exceptions expire, assets are replaced. The closed gap reads as still closed until the next audit reopens it as failing.

Six fields every gap-remediation policy has to record

A defensible gap-remediation policy is six concrete fields on the engagement record, not an abstract paragraph in a GRC handbook. Anything missing from the list below is a known gap in the workflow discipline rather than a detail that surfaces later.

Gap inclusion definition

What counts as a control gap on this engagement: a missing control, a documented control without operating evidence, an expired exception, an out-of-scope asset bringing a control into question, a finding that exposes a failing control, or a compensating control whose substitute mechanism has changed. The definition is recorded on the engagement so cycle-on-cycle gap counts are comparable.

Source-of-truth control framework

Which framework or set of frameworks the gap register is mapped against (ISO 27001, SOC 2, PCI DSS, NIST SP 800-53, NIST CSF, CIS Controls, sector-specific). Multi-framework programmes record the canonical mapping and the cross-framework relationships so a gap closed against one framework reflects on the others without manual restatement.

Owner routing rule

How control gaps route to named owners on named teams based on the affected control area. The asset-to-owner mapping on the engagement record resolves most cases as a query. Gaps without a resolved owner pause at a routing-decision step before remediation work begins, so the queue cannot accumulate unowned items between assessments.

Evidence requirement per control

The minimum evidence artefact each control expects at closure: a policy document, a configuration baseline, a scanner re-run output, a manual retest, a signed attestation, or a procedure update. The expectation is documented on the engagement so closure is a query against expected evidence rather than a debate at audit week.

Reassessment cadence

How often closed gaps are revalidated against the live environment. Quarterly is common for active programmes; semi-annually is the floor for steady-state programmes. The cadence is recorded on the engagement so a closed gap with stale evidence reopens automatically rather than carrying forward as still-closed.

Exception handoff rule

How a gap transitions from active remediation to accepted risk. The exception register entry carries the residual rationale, the named approver, the expiry date, and the reassessment trigger. Approaching expiry is a routing event that opens an active-remediation track on the engagement before the exception lapses.

Control gap remediation checklist

Before any cycle opens, and at every quarterly review, the security lead, the GRC owner, and the audit liaison walk through a short checklist. Each item takes minutes; missing any one of them is the source of the failure modes above and the audit gaps that follow.

  • The gap inclusion definition is documented on the engagement and shared with security, GRC, and audit.
  • Each gap is opened as a record with the affected control identifier, the framework reference, and the source of the gap.
  • Every gap has a named owner on a named team rather than a queue label.
  • Underlying findings and the exception register entries are linked to the gap so closure work composes with the vulnerability programme.
  • Status changes land in the activity log with timestamp and user attribution.
  • The evidence requirement per control is documented on the engagement so closure is a query rather than a debate.
  • Compensating controls are tracked separately from exceptions and revalidated when the substitute mechanism changes.
  • Closure on plan does not close the gap; verification evidence does.
  • Closed gaps carry a reassessment cadence so stale closures reopen automatically.
  • Exception expiry triggers an open gap with a named owner and a closure path before the acceptance lapses.
  • The compliance tracking view reflects the live gap posture so framework reads do not require a parallel spreadsheet.
  • AI report drafts derive the gap-closure narrative from the live record rather than reauthored prose.
  • The activity log export covers ISO 27001 Annex A 5.7 and 5.36, SOC 2 CC4.1 and CC7.x, PCI DSS Requirement 6 and 11, and NIST SP 800-53 CA-5, RA-5, and SI-2.
  • Quarterly leadership reads the residual gap posture from the live engagement record rather than a hand-built spreadsheet.

How control gap remediation runs in SecPortal

Gap remediation runs on the same feature surfaces the rest of the security and compliance programme already uses: the engagement record, the findings record, the activity log, compliance tracking, document management, and AI reporting. The discipline is keeping the gap on the engagement record, linking to the underlying findings, and producing reproducible closure evidence rather than letting the gap register drift in a spreadsheet between audits.

Policy on the engagement

The gap inclusion definition, the source-of-truth control framework, the owner routing rule, the evidence requirement per control, the reassessment cadence, and the exception handoff rule sit on the engagement record. Gaps logged against the engagement inherit the policy so the workflow is enforced by default rather than reapplied each cycle.

Gaps and findings on one record

Findings management holds the underlying vulnerability findings with CVSS-driven severity. The gap record links to the findings that express the gap so closing a finding reduces the gap and closing a gap can require closing several findings. The two tracks compose rather than running parallel.

Framework coverage view

Compliance tracking reflects the live gap posture against the framework so operating controls, controls under remediation, controls under exception, and controls with reproducible evidence are visible without rebuilding the picture from a parallel spreadsheet.

Evidence in document management

Policies, configuration baselines, attestations, and procedure updates land in document management and reference the gap identifier. Closure evidence is a query against expected artefacts rather than a hunt across shared drives at audit week.

Reports derived from the record

AI-generated reports produce the gap-closure narrative from the live record: open gaps, closures by control area, evidence quality, exception expiries, compensating control changes, and reassessment outcomes. Headline numbers always reconcile to the engagement record because the report draft is generated from the same source.

Audit trail in the activity log

Every status change, owner reassignment, evidence upload, exception transition, and reassessment outcome lands on the activity log with timestamp and user attribution. The CSV export is the evidence trail ISO 27001, SOC 2, PCI DSS, NIST SP 800-53, and NIST CSF assessors expect to see when they ask for the closure history behind the headline gap-closure number.

Five reporting views the gap-remediation cycle drives

The reports that drive gap remediation are not the static PDF that lands at audit close. They are the live views security leads, GRC owners, and audit committees use between assessments. The five below are the ones every meaningful programme settles on, and they all derive from the live engagement record rather than a parallel spreadsheet extract.

Gap posture by framework

Operating, under remediation, under exception, and with reproducible evidence per framework view. The view that shows whether the residual gap posture is shrinking or holding cycle on cycle.

Gap aging

Open gaps split by aging bucket (fresh, working, aging, risk debt) so closure rate does not hide the long tail of unowned gaps. The view that surfaces drift between dashboards and audit reads.

Evidence quality

Closures with verification evidence against closures on plan only. The view that distinguishes durable closure from administrative closure and surfaces the reopen risk before the next assessment exposes it.

Exception transitions

Exceptions approaching expiry, recently expired, recently renewed, and recently transitioned to active remediation. The view that prevents exceptions from silently sliding from accepted risk to unmanaged gap.

Activity log export

Every status change, owner reassignment, evidence upload, exception transition, and reassessment outcome with timestamp and user attribution. The CSV export is the evidence trail behind the headline gap-closure number, ready for ISO 27001, SOC 2, PCI DSS, and NIST audit reads.

What auditors expect from a gap-remediation programme

Gap-remediation evidence shows up in audit reads whenever an external assessor reviews the compliance posture. The frameworks below all expect the programme to demonstrate that gaps are identified, owned, and closed on a defined timeline, with verification evidence on closure rather than closure on plan alone.

FrameworkWhat the audit expects
ISO 27001:2022Annex A 5.7 (threat intelligence and risk treatment), 5.36 (compliance with policies, rules, and standards), and 8.8 (technical vulnerability management) expect documented evidence that controls are operating, that gaps are identified and remediated on a defined timeline, and that exceptions carry residual risk decisions with named approvers. Clause 9.1 expects ongoing performance evaluation and Clause 10.1 expects continual improvement evidence. A gap-remediation workflow on the engagement record produces the artefact each clause expects without a parallel evidence sprint.
SOC 2Common Criteria CC4.1 (monitoring) and CC4.2 (deviation evaluation and remediation) expect the entity to detect control deficiencies and remediate on a defined timeline. CC7.x expects vulnerability detection and response. CC8.1 expects change management to track changes that close gaps. A workflow that keeps the gap on the engagement record, links it to the underlying findings, and pairs closure with operating evidence produces the trail CC4.x and CC7.x reviewers expect.
PCI DSSRequirement 6 (vulnerability management) and Requirement 11 (testing of security systems) expect the assessor to read remediation evidence against documented timelines, with rescanning until pass for high-impact items. Requirement 12.10 expects an incident-response and remediation programme. Gap-remediation evidence shows whether closure is paired with operating artefacts (rescan output, configuration baseline, signed attestation) or only with closure events.
NIST SP 800-53Control CA-5 (plan of action and milestones) expects documented remediation plans for control deficiencies with target dates and named owners. RA-5 (vulnerability scanning) and SI-2 (flaw remediation) expect timely closure on a risk-based schedule. PM-4 expects an overall plan-of-action programme. A gap-remediation workflow that ties POA&M items to the live findings record and to the framework view produces the artefact CA-5, RA-5, SI-2, and PM-4 audits read together.
NIST Cybersecurity FrameworkGV.OC and GV.RM expect organisational context and risk-management strategy to drive prioritisation. ID.RA expects identified risks to map to documented response actions. RS.MI expects mitigation activities to be performed against the documented response. Gap-remediation evidence demonstrates that the prioritisation, the mitigation, and the lessons-learned trail reconcile from one engagement record rather than from disconnected systems.

Where gap remediation sits in the wider programme

Gap remediation composes with the rest of the security and compliance programme on the same engagement record so the workflow stays connected to the assessment that opens the gap and the leadership read that consumes the closure evidence.

Upstream and adjacent

Gap remediation depends on the compliance audits workflow for the assessment that opens new gaps, on the cross-framework control mapping crosswalk so a gap on one control reflects across every framework citation rather than triggering separate update cycles per framework, on scanner result triage for the validated findings that express many gaps in production, on vulnerability prioritisation for the severity decisions that drive the remediation plan, and on vulnerability acceptance and exception management for the deferred-risk track when remediation cannot close on schedule.

Downstream and reporting

Gap-remediation evidence rolls up into the security testing programme and feeds the security leadership reporting workflow where gap-closure rate, evidence quality, and exception transitions become headline indicators on the weekly, monthly, and quarterly leadership cadences. The patch management coordination workflow converts a slice of the gap register (CVE-driven control deficiencies) into closure events tied to maintenance windows. The scanner to ticket handoff governance workflow handles the routing layer when gap-driven findings move into engineering tickets.

Pair the workflow with the long-form guides and the framework references

Gap remediation is operational; the surrounding guides explain the assessment logic, evidence expectations, and audit cadences the workflow has to satisfy. Pair this workflow with the security compliance automation guide for the broader compliance operating model, the ISO 27001 audit checklist for the assessment cadence that opens many gaps, the SOC 2 compliance guide for the trust services criteria that drive the closure expectations, and the cybersecurity risk assessment guide for the underlying risk-treatment vocabulary. The framework references that mandate documented gap closure include ISO 27001 for clauses 9.1 and 10.1 plus Annex A 5.7, 5.36, and 8.8, SOC 2 for CC4.1, CC4.2, CC7.x, and CC8.1, PCI DSS for Requirement 6, Requirement 11, and Requirement 12.10, NIST SP 800-53 for CA-5, RA-5, SI-2, and PM-4 plan-of-action expectations, and NIST CSF for the Govern, Identify, and Respond functions that frame the closure narrative.

Buyer and operator pairing

Control gap remediation is the workflow GRC and compliance teams run as the spine of the audit-readiness programme, internal security teams run alongside vulnerability management, AppSec teams run when product-security controls fail in production, and security engineering teams run when platform controls drift between assessments. CISOs and security operations leaders read gap-closure rate, evidence quality, and exception transitions as the leading indicators of whether the compliance posture is durably audit-ready between assessments rather than only at audit week. Templates that support the workflow include the audit evidence tracker for the evidence catalogue, the security exception register template for the deferred-risk ledger, and the cybersecurity risk register template for the underlying risk-treatment record.

What good gap remediation feels like

One canonical record

The gap, the underlying findings, the evidence, the exception, and the closure event live on the engagement record. Audit lookback queries hit one record rather than a multi-system reconciliation sprint between security, GRC, and the document store.

Owners are named, not implied

Every gap has a named owner on a named team. Gaps without a resolved owner pause at a routing-decision step rather than aging silently in a shared backlog. The hard gaps get owned and the easy ones do not crowd the dashboard.

Closure is verified

A gap moves to closed only when verification evidence lands on the engagement record. Closure on plan does not close the gap; the artefact does. Reopen rate at the next assessment falls because the closures were durable rather than administrative.

Evidence is derivative of the work

Open gaps, closures by control area, evidence quality, exception transitions, and reassessment outcomes derive from the live engagement record. The activity log export is the trail and the AI report is the narrative. Nobody assembles the gap-closure evidence the week before the audit.

Control gap remediation is the workflow that closes the gap between a control that is required and a control that is operational with reproducible evidence. Run it on the engagement record so each gap has a named owner, a closure plan, evidence requirements, and an audit trail that reproduces from one record rather than from a multi-system reconciliation sprint.

Frequently asked questions about control gap remediation

What is a control gap remediation workflow?

A control gap remediation workflow is the operating discipline that closes the gap between a control that is required (by ISO 27001, SOC 2, PCI DSS, NIST SP 800-53, NIST CSF, CIS Controls, or an internal policy) and a control that is operational with reproducible evidence. The workflow opens each gap as a record on the engagement, assigns a named owner, links the gap to the underlying findings and exceptions, captures the planned remediation, requires verification evidence at closure, and rolls the closure into the framework coverage view. SecPortal runs the workflow on the engagement record so the closure trail is reproducible from one record rather than from a multi-system reconciliation sprint.

How is gap remediation different from compliance audits and remediation tracking?

A compliance audit is the assessment event: read controls against a framework and produce an opinion or attestation. Remediation tracking is the per-finding lifecycle from open to verified closed. Gap remediation is the workflow between assessments: when a control is missing operating evidence, an exception expires, a new framework version raises new requirements, or a finding exposes a failing control, the gap opens, an owner is named, the closure path is recorded, and the verification evidence lands on the record before the gap closes. The three workflows compose. Audits identify. Gap remediation closes. Remediation tracking handles the per-finding work that the gap closure depends on.

Does SecPortal integrate with Jira, ServiceNow, or other GRC platforms?

SecPortal does not synchronously create or update tickets in third-party systems. The gap remediation workflow runs on the engagement record. Engineering tasks linked to a gap can live in an external ticketing system as a downstream task that references the gap identifier; the canonical gap record stays on SecPortal so the closure evidence, the framework mapping, and the audit trail are reproducible from one record. Reconciliation between the engagement record and any external task tracker happens on a documented cadence using the activity log export, not through a synchronous connector.

How does gap remediation relate to the vulnerability programme?

Most control gaps express themselves as one or more vulnerability findings, a missing or expired exception, an asset out of scope of the control, or a documented control with no operating evidence. The gap record links to the underlying findings and the exception register entries so the closure work composes with the vulnerability programme rather than running parallel to it. Closing a finding can close a gap; closing a gap can require closing several findings or signing an exception with a residual position. Programmes that operate the two tracks separately end up double-counting and producing two pictures of the same control.

What evidence closes a control gap?

The evidence that closes a gap depends on the control. Common artefacts include a policy document captured in document management, a configuration baseline screenshot, a scanner re-run output where the underlying finding no longer appears, a manual retest captured on the engagement, a signed attestation from the named owner with a named approver, or an updated procedure stored against the engagement. The expected artefact is documented per control on the engagement so closure is a query against expected evidence rather than a debate at audit week.

How should compensating controls be tracked?

Compensating controls are recorded against the primary gap with the residual position the original approval signed off on. They are tracked as a separate artefact from exceptions because they drift differently: an exception expires by date, a compensating control degrades when the substitute mechanism is replaced, retired, modified, or moved. When the substitute mechanism changes, the gap reopens for re-evaluation rather than carrying the original acceptance forward. PCI DSS Appendix B documentation expectations apply to compensating controls and the same documentation has to be revalidated when the underlying mechanism changes.

How does the workflow handle expired exceptions?

The exception register entry carries an expiry date and a reassessment trigger. Approaching expiry creates an open gap on the control coverage view with the named owner and the planned closure path (renew, remediate, retire) before the exception lapses. The transition from accepted risk to active remediation is a deliberate event recorded on the engagement so the residual control posture never silently slides from accepted to unmanaged. Programmes that do not surface approaching expiry routinely read as failing on the next audit because the exception lapsed without a closure plan.

How is closure on plan different from closure on evidence?

Closure on plan happens when the planned remediation date passes; closure on evidence happens when the verification artefact lands on the record. Plan and evidence are independent fields on the gap so the audit trail is reproducible. Programmes that close on plan accumulate gaps that pass the audit window and reopen at the next assessment. Programmes that close on evidence produce a slightly slower headline closure rate with a durable residual posture. The first is fast; the second is the truer signal.

How does AI report generation handle the gap-closure narrative?

AI-generated reports derive the gap-closure narrative from the live engagement record. Open gaps, closures by control area, evidence quality, exception expiries, compensating control changes, and reassessment outcomes all land in the report draft as derived narrative rather than reauthored prose. The leader edits the draft instead of writing from a blank page, and the headline numbers always reconcile to the underlying record because the report is generated from the same engagement record the gap-closure decisions live on.

How often should closed gaps be reassessed?

Closed gaps are revalidated on a documented cadence (quarterly for active programmes, semi-annually for steady-state programmes). The reassessment confirms that the operating evidence is still current, the compensating controls still apply, the exception covers what it was signed against, and the asset boundary still matches. Gaps with stale evidence reopen automatically rather than carrying forward as still-closed. The cadence is recorded on the engagement so no reassessment cycle silently drops between audits.

How it works in SecPortal

A streamlined workflow from start to finish.

1

Open the gap on the engagement record with control context

Each control gap is opened as a finding on the engagement that owns the framework scope (ISO 27001, SOC 2, PCI DSS, NIST SP 800-53, NIST CSF, CIS Controls). The record carries the affected control identifier, the framework reference, the gap description, the source of the gap (internal review, external audit, framework gap analysis, automated scan, exception expiry), the residual control posture, and the asset or process boundary. Without the control context on the gap, the closure work is ambiguous and the audit lookback cannot reconcile what was actually remediated.

2

Assign a named owner and a closure plan

Every gap has a named owner on a named team rather than a queue label. The closure plan records the planned remediation activity, the dependencies (a procurement step, an engineering change, a policy update, a vendor task), the expected evidence artefact at closure, and the target date. Gaps without a resolved owner pause at a routing-decision step rather than landing in a shared backlog where they age silently between assessments.

3

Link the gap to underlying findings and exceptions

A control gap rarely stands alone. Most gaps express themselves as one or more vulnerability findings, a missing or expired exception, an asset out of scope of the control, or a documented control with no operating evidence. The gap record links to the underlying findings, the exception register entry if there is one, and the framework control mapping so the closure work composes with the vulnerability programme rather than running parallel to it. Closing a finding can close a gap; closing a gap can require closing several findings or signing an exception with a residual position.

4

Track remediation progress in the activity log

Status changes on the gap (open, in remediation, awaiting evidence, awaiting approval, closed, deferred under exception) land in the activity log with timestamp and user attribution. Updates from the named owner, the security lead, the policy author, and the audit liaison all post to the same record so the remediation history is a query rather than a survey of email threads. The CSV export of the activity log is the evidence trail external assessors expect to see when they ask how the gap was closed.

5

Capture closure evidence and verify before the gap closes

A control gap moves to closed only when the planned evidence artefact lands on the record: a policy document, a configuration screenshot, a scanner re-run that no longer produces the underlying finding, a manual retest captured on the engagement, a signed attestation from the named owner with a named approver, or an updated procedure stored in document management. Closure on plan alone does not close the gap; verification evidence does. Programmes that close on plan accumulate gaps that pass the audit window and reopen at the next assessment.

6

Roll closure into framework reporting and leadership reads

Closed gaps roll into compliance tracking against the framework so the residual gap posture is visible to leadership, the audit committee, and the assessor without rebuilding the picture from a parallel spreadsheet. AI reports derive the gap-closure narrative from the live record so the leadership read of remediation progress and the audit read of control coverage are the same source. The framework view shows operating controls, controls under remediation, controls under exception, and controls with reproducible evidence.

Run control gap remediation on the engagement record

Open each gap with control context, assign named owners, link to findings and exceptions, evidence the closure, and roll the result into compliance tracking. Start free.

No credit card required. Free plan available forever.