Skip to main content

PAM Gap Analysis

The PAM Gap Analysis module assesses the maturity of your Privileged Access Management programme against industry frameworks. It walks you through a structured questionnaire and produces a findings report — showing which controls are compliant, partially implemented, or have gaps — together with a signed PDF export suitable for auditors or management review.

Requires Pro or Enterprise edition.

Gap Analysis

Supported Frameworks

Each assessment evaluates your PAM posture against the following frameworks simultaneously:

FrameworkDescription
NIST SP 800-53 Rev 5US federal controls for access management and audit
NIST SP 800-63BDigital identity guidelines focusing on authentication assurance
ISO/IEC 27001:2022International information security management standard
BS EN ISO/IEC 29146:2026Access management framework covering privileged access controls, entitlement lifecycle, role management, and access governance
ISO/IEC 24760Identity management framework covering identity lifecycle, proofing, non-human identities, and governance
SOx IT General ControlsSarbanes-Oxley ITGC requirements for financial systems (in-scope assessments only)
GxP (21 CFR 11 / EU Annex 11)Regulatory requirements for life sciences and pharmaceutical environments (in-scope assessments only)

SOx and GxP controls are included only when you indicate those areas are in scope during the questionnaire. All other frameworks are evaluated for every assessment.

Assessment Lifecycle

DRAFT → IN_PROGRESS → COMPLETE
StatusDescription
DRAFTAssessment created but the questionnaire has not been started
IN_PROGRESSQuestionnaire is being completed; responses can still be edited
COMPLETEAssessment has been finalised; responses and findings are locked

Once an assessment is marked Complete it cannot be modified. A PDF export can be downloaded at any time after completion.

Creating an Assessment

  1. Navigate to Reports > PAM Gap Analysis
  2. Click New Assessment
  3. Fill in the details:
FieldRequiredDescription
TitleYesA name for this assessment (e.g., "Q1 2026 PAM Maturity Review")
DescriptionNoAdditional context or scope notes
  1. Click Create

The new assessment opens directly in the questionnaire wizard.

note

When you create a new assessment, OrbisID pre-populates the questionnaire with responses from the most recently completed assessment. This saves time on repeat assessments and lets you focus on what has changed.

Completing the Questionnaire

The questionnaire is divided into sections presented as a wizard. Navigate between sections using the step bar at the top of the page, or use Back and Next.

Sections

SectionDescription
1. Scope & ContextOrganisation size, industry, and which frameworks apply (including SOx/GxP)
2. PAM ToolingWhether a PAM tool is in use, which product, and deployment maturity
3. Technology Stack SelectionWhich technology areas are in scope for this assessment
3a–3g. Stack sub-sectionsPer-stack questions for AD, Windows, Linux, Network, Databases, Cloud, and Other (shown only for selected stacks)
4. Access GovernanceLifecycle management, access reviews, separation of duties, role management approach, and privileged access elevation process
5. Identity ManagementIdentity proofing, non-human identity lifecycle, identity ownership, federated identity, and identity reconciliation
6. AuthenticationMFA, password policies, and credential strength
7. Session ManagementSession recording, monitoring, and just-in-time access
8. Audit & MonitoringLogging, alerting, and SIEM integration
9. SOx ITGCChange management, access controls for financial systems (shown when SOx is in scope)
10. GxPAudit trail completeness, electronic signatures (shown when GxP is in scope)
note

The Identity Management section (step 5) was added to support the BS EN ISO/IEC 29146:2026 and ISO/IEC 24760 frameworks. If you have existing assessments, these questions will be blank and the corresponding controls will be evaluated on available OrbisID product data alone until you complete a new assessment.

Question Types

TypeHow to Answer
Yes / NoClick the Yes or No button
SelectChoose one option from the dropdown
Multi-selectChoose all applicable options
TextFree-text response

Some questions are conditional and only appear based on earlier answers (for example, stack-specific questions only appear for stacks you selected).

Saving Progress

Click Save Responses at the bottom of each section to save your current answers. Responses are saved per-section. You can return to any section at any time while the assessment is IN_PROGRESS.

Completing the Assessment

When all sections are answered to your satisfaction:

  1. Navigate to the final section
  2. Click Complete Assessment
  3. Confirm the prompt

OrbisID processes all responses, evaluates each framework control, and generates the findings. The assessment status changes to COMPLETE and the questionnaire becomes read-only.

note

Completing an assessment is irreversible. Ensure all responses are accurate before proceeding.

Delegating Sections to Subject Matter Experts

Requires Enterprise edition.

If parts of the questionnaire cover technology areas managed by other teams, you can delegate those sections to external contributors without giving them an OrbisID login.

  1. Open an IN_PROGRESS assessment
  2. Click Delegate
  3. Fill in the delegation details:
FieldRequiredDescription
Technology AreaNoFree-text label for the area being delegated (e.g., "Network Infrastructure")
Stack(s)NoSpecific stacks this delegation covers (for reference only)
Recipient EmailNoEmail address to send the link to
DescriptionNoInstructions or context for the recipient
Link ExpiryYesHow many days the link remains valid (default: 14)
  1. Click Create Delegation

A unique link is generated. If you supplied an email address, OrbisID sends the link automatically. You can also copy the link and share it manually.

What the Recipient Sees

The recipient opens the link in any browser — no account required. They see a standalone questionnaire page showing only the questions relevant to their delegation. At the bottom of the page they must:

  1. Enter their full name
  2. Tick the acknowledgment checkbox confirming their responses are accurate
  3. Click Submit & Sign

Submission is a one-time action. Once submitted, the link is consumed and responses are stored against the assessment.

Managing Delegations

The delegations panel on the assessment page shows all tokens created for the assessment:

ColumnDescription
EmailRecipient email (if provided)
Technology AreaLabel given at creation
CreatedDate the token was created
ExpiresDate the link expires
StatusPending, Submitted, or Expired
SignatoryName entered by the recipient on submission

You can:

  • Copy link — copy the URL to share manually
  • Edit email — update the recipient address and resend
  • Resend — send the link again to the current email address

Findings

After an assessment is completed, navigate to Findings (the default view) to see the control-by-control evaluation.

Framework Summary

At the top of the findings page, each framework shows:

ElementDescription
CompliantControls fully satisfied
PartialControls partially satisfied
GapControls with identified gaps
N/AControls not applicable to this assessment
ScoreOverall compliance percentage for the framework

Finding Detail

Each row in the findings table represents a single framework control:

ColumnDescription
Control IDFramework reference (e.g., AC-2, A.9.2.3)
Control NameShort name of the control
StatusCompliant, Partial, Gap, or Not Applicable
RiskCritical, High, Medium, Low, or Informational
Evidence / Gap / RecommendationDetail of what was found and what action is needed

Controls are grouped by framework. Click a framework panel header to collapse or expand it.

Overriding a Finding

If a finding does not accurately reflect your environment, an administrator can override it:

  1. Click the override icon on a finding row
  2. Select the corrected status
  3. Enter a justification
  4. Click Save Override

Overrides are recorded with the justification and are visible in the PDF export.

Responses

Click Responses to see a read-only view of all questionnaire answers, grouped by section.

This view shows:

  • Assessor responses — answers entered directly in OrbisID
  • Delegatee responses — one panel per submitted delegation, showing the signatory name, submission date, and their answers

Downloading the PDF Report

Click Download PDF to generate a full assessment report. The PDF includes:

SectionContent
Cover pageAssessment title, date, licensed organisation, and edition
Executive SummaryOverall maturity score (CMMI level), framework scores, and key risk indicators
Framework FindingsControl-by-control results for each applicable framework
Risk SummaryFindings grouped by risk level
Remediation RoadmapPrioritised list of recommended actions
Appendix A — MethodologyExplanation of the scoring approach
Appendix B.1 — Assessor ResponsesFull questionnaire Q&A from the primary assessor
Appendix B.2+ — Delegatee ResponsesOne appendix section per submitted delegation, including signatory name and submission date

The PDF is generated on demand and reflects the assessment state at the time of download.

Threat Detections and Gap Analysis

If you have deployed Endpoint Sensors, OrbisID automatically incorporates your Threat Detection activity as evidence when evaluating monitoring controls. No extra configuration is required.

How it works

When you complete an assessment, OrbisID takes a snapshot of your current Threat Detection state:

Data pointUsed for
Active Endpoint Sensors (online count)Evidence that real-time Windows endpoint monitoring is in place
Open Threat DetectionsShows the engine is actively generating detections
Confirmed Threat DetectionsAnalyst review evidence — demonstrates detections are being triaged

This data is factored into the following controls:

ControlFrameworkEffect
AU-2 Event Logging — Audit EventsNIST 800-53Active sensors + SIEM = Compliant. Active sensors without SIEM = Partial (with recommendation to forward via CEF syslog)
AC-6(9) Log Use of Privileged FunctionsNIST 800-53Active sensors count as partial logging coverage for Windows endpoints
A.8.15 LoggingISO/IEC 27001Active sensors count toward the alerting dimension
29146-8.1 Access Event MonitoringBS EN ISO/IEC 29146:2026Active sensors count as real-time alerting evidence. Active sensors + SIEM = Compliant
ITGC-OP-1 Monitoring of Privileged ActivitySOx ITGCActive sensors + confirmed detections = Compliant. Active sensors without SIEM = Partial (SOx requires 7-year log retention via a SIEM)

Answering "No" to monitoring questions

If you answer No to "Is there real-time alerting configured for anomalous privileged activity?" or "Are privileged access events forwarded to a SIEM?", the recommendation for affected controls will include guidance on how OrbisID Endpoint Sensors can help close the gap — including using the built-in CEF syslog integration to forward detections to a SIEM.

Building SOx evidence with Threat Detections

For SOx in-scope assessments, the ITGC-OP-1 control requires evidence that privileged activity is both monitored and reviewed. To satisfy both:

  1. Deploy at least one Endpoint Sensor (provides the monitoring evidence)
  2. Confirm at least one genuine Threat Detection in the Threat Detections page (provides the analyst-review evidence)
  3. Enable CEF syslog forwarding to a SIEM for log retention (Administration → Settings)

BS EN ISO/IEC 29146:2026 — Access Management Framework

BS EN ISO/IEC 29146:2026 is the British Standard adoption of the international access management framework. It focuses specifically on how organisations govern, control, and monitor access rights — making it a natural fit for PAM programmes.

Controls Evaluated

Control IDControl NameKey Evidence Sources
29146-5.2Access Management PolicyFormal Access Management Policy documented; formal definition of privileged access in place
29146-6.1Entitlement Lifecycle ManagementJML process covering privileged access; inactive identity remediation SLA; OrbisID detected inactive identities with active accounts
29146-6.2Privileged Access ControlsPAM tool deployed; JIT/JEA in use; privileged elevation process (PAM-managed preferred); PAM coverage percentage from OrbisID
29146-6.3Access CertificationReview frequency; risk-based stratification (high-risk accounts certified more frequently)
29146-7.1Separation of DutiesSoD enforced at system access level
29146-7.2Role and Entitlement ManagementRole management approach (formal RBAC or entitlement catalogue); formal change management for access changes
29146-7.3Emergency Access ManagementDocumented and tested break-glass procedure
29146-8.1Access Event MonitoringSIEM integration; real-time alerting; OrbisID Endpoint Sensors count as alerting evidence

Key Questions (Section 4 — Access Governance)

Three questions were added to the Access Governance section specifically to support this framework:

QuestionPurpose
Does your organisation have a formally documented and approved Access Management Policy?Drives 29146-5.2
How are roles and access permissions managed?Drives 29146-7.2 (RBAC Formal, Entitlement Catalogue, etc.)
How is temporary privileged access elevation requested and approved?Drives 29146-6.2 (PAM-managed elevation is the strongest control)

ISO/IEC 24760 — Identity Management Framework

ISO/IEC 24760 is a multi-part international standard that defines the framework for managing identities throughout their lifecycle — from proofing and provisioning through to de-provisioning and reconciliation. It applies to both human and non-human identities.

Controls Evaluated

Control IDControl NameKey Evidence Sources
24760-3.1Identity Lifecycle ManagementJML process; identity proofing before provisioning; OrbisID detected inactive identities with active accounts
24760-3.2Identity Proofing and BindingIdentity proofing process in place; account-to-identity linkage percentage from OrbisID
24760-3.3Orphaned Identity DetectionOrphaned account tracking approach; OrbisID unlinked account count
24760-3.4Identity Information QualityNamed identity owners defined; account-to-identity linkage percentage; total identity count from OrbisID
24760-3.5Non-Human Identity ManagementNHI lifecycle management approach; OrbisID non-human account count
24760-4.2Identity GovernanceNamed identity owners defined; Access Management Policy in place
24760-5.1Federated Identity ManagementFederation model (fully/partially/not federated); SSO deployed
24760-5.2Identity ReconciliationIdentity reconciliation frequency across systems

Key Questions (Section 5 — Identity Management)

A dedicated Identity Management section (step 5 in the wizard) was added for this framework:

QuestionPurpose
Is there a formal identity proofing process before accounts are provisioned?Drives 24760-3.1 and 24760-3.2
How are non-human identity lifecycles managed?Drives 24760-3.5 (automated lifecycle is highest maturity)
Is a named owner formally defined for every identity?Drives 24760-3.4 and 24760-4.2
Does the organisation use federated identity management?Drives 24760-5.1
How frequently is identity data reconciled across systems?Drives 24760-5.2

OrbisID Data Used

Both frameworks make extensive use of live OrbisID metrics captured at assessment completion:

MetricControls
Account-to-identity linkage %24760-3.2, 24760-3.4
Unlinked (orphaned) account count24760-3.3
Non-human account count24760-3.5
Inactive identities with active accounts24760-3.1, 29146-6.1
PAM-managed account %29146-6.2

Assessment List

Navigate to Reports > PAM Gap Analysis to see all assessments.

ColumnDescription
TitleAssessment name
StatusDRAFT, IN_PROGRESS, or COMPLETE
FrameworksWhich frameworks were evaluated, including SOx and GxP when in scope
CMMI LevelMaturity level (1–5) calculated at completion
CreatedDate the assessment was created
CompletedDate the assessment was finalised

Click an assessment row to open it.

Deleting an Assessment

  1. Click the delete icon on an assessment row
  2. Confirm the prompt

Deletion is permanent and removes all responses and findings. It is recorded in the Audit Log.