← Back to Gap Assessment
About this sample: This document represents the output of the thinking. The value is in the conversations that produced it — the site walk, the stakeholder interviews, the engineering judgements made along the way. What you are reading is the record. The work that matters happened before the first page was written.
Client Organisation
████████████ Ltd
Site / Facility
████████ Plant, UK
Assessment Type
OT/ICS Gap Assessment
Framework Applied
IEC 62443 / NIST CSF 2.0
Target Maturity Level
IEC 62443 ML-2
Lead Engineer
[Named Engineer]
What This Report Contains

This Gap Assessment Report documents the findings of a structured assessment conducted against the IEC 62443 standard and NIST CSF 2.0 framework. It identifies the precise distance between your current OT/ICS security posture and the target maturity level agreed at engagement scoping.

The report is structured in four sections:

SectionTitleContentsAudience
01Executive SummaryOverall maturity score, top 5 findings, immediate actionsLeadership / Board
02Assessment MethodologyScope, framework mapping, assessment approach and limitationsTechnical / Management
03Detailed FindingsGap register — all identified gaps with evidence, risk weighting, and operational impactTechnical
04Visual Resilience RoadmapPhased remediation plan — quick wins, 90-day actions, long-term programmeAll
Why phased, and why visual? The Visual Resilience Roadmap is structured in phases because remediation competes with operational schedules — sequencing matters. It is visual because a complex gap closure programme needs to be communicated to stakeholders who are not security specialists. The format is a deliberate design decision, not a presentation choice.
Current State vs Target
Security Management
1.5 / 3
Asset Management
0.8 / 3
Access Control
1.8 / 3
Network Segmentation
0.7 / 3
Incident Response
1.4 / 3
Vendor Management
2.1 / 3
Note: Scores above are illustrative sample values from a representative engagement. Your actual scores will reflect your specific environment, existing controls, and the agreed target maturity level established at scoping. All findings are evidence-based and documented with supporting observations.
Identified Gaps (Extract)

The following is an extract from Section 03 of the full report. The complete gap register contains [N] findings across all assessment domains. Each finding includes the IEC 62443 requirement reference, observed evidence, risk weighting, and a recommended treatment action.

Gap IDDomainFindingRiskIEC 62443 Ref
GA-003Network ArchitectureNo documented zone and conduit model exists. OT and IT traffic traverse the same network segment without enforced boundary controls.HighSR 5.1 / ZCR-1
GA-007Asset ManagementNo complete OT asset inventory exists. Passive monitoring during assessment identified 14 devices not present in any documented register.HighSR 7.8 / AM-2
GA-011Access ControlShared engineering accounts in use across multiple PLCs. No individual accountability for configuration changes. No account review process documented.MediumSR 1.1 / AC-3
GA-014Patch ManagementNo formal OT patch management process exists. Three historian servers running OS versions with known unpatched CVEs (CVSS 7.8, 6.5).HighSR 7.7 / PM-1
GA-019Incident ResponseIncident response plan does not address OT-specific scenarios. No escalation path defined for process-impacting cyber events. Last tested 2021.MediumSR 6.1 / IR-4
GA-022Remote AccessVendor remote access via a single shared VPN credential. No session recording, no time-limited access, no formal approval process.HighSR 1.3 / RA-2
GA-025Security AwarenessNo OT-specific security awareness training delivered. Staff awareness assessed as low — 3 of 8 operators unaware of removable media policy.LowSR 2.1 / AT-1
Phased Remediation Overview
PhaseTimeframeActionsEffort
Quick Wins0 – 30 daysDocument asset inventory. Implement individual accounts on PLCs. Remove shared VPN credential.Low
Phase 130 – 90 daysDesign and implement zone/conduit architecture. Deploy OT patch management process. Deliver security awareness training.Medium
Phase 290 – 180 daysDeploy passive OT network monitoring. Update and exercise incident response plan. Implement vendor access management platform.High
Ongoing180+ daysAnnual reassessment. Continuous monitoring review. IEC 62443 ML-2 formal certification preparation.Ongoing
What this enables: The full Gap Assessment Report is delivered as a branded PDF and editable document. It includes this gap register in full (all domains, all findings), the complete Visual Resilience Roadmap with effort estimates tied to your operational calendar, an executive summary slide deck, and a debrief session with your engineering and leadership teams. A 30-day follow-up review is included in the engagement.