Skip to main content

PAM Gap Analysis

The PAM Gap Analysis module assesses the maturity of your Privileged Access Management programme against industry frameworks. It walks you through a structured questionnaire and produces a findings report — showing which controls are compliant, partially implemented, or have gaps — together with a signed PDF export suitable for auditors or management review.

Requires Pro or Enterprise edition.

Gap Analysis

Supported Frameworks

Each assessment evaluates your PAM posture against the following frameworks simultaneously:

FrameworkDescription
NIST SP 800-53 Rev 5US federal controls for access management and audit
NIST SP 800-63BDigital identity guidelines focusing on authentication assurance
ISO/IEC 27001:2022International information security management standard
SOx IT General ControlsSarbanes-Oxley ITGC requirements for financial systems (in-scope assessments only)
GxP (21 CFR 11 / EU Annex 11)Regulatory requirements for life sciences and pharmaceutical environments (in-scope assessments only)

SOx and GxP controls are included only when you indicate those areas are in scope during the questionnaire.

Assessment Lifecycle

DRAFT → IN_PROGRESS → COMPLETE
StatusDescription
DRAFTAssessment created but the questionnaire has not been started
IN_PROGRESSQuestionnaire is being completed; responses can still be edited
COMPLETEAssessment has been finalised; responses and findings are locked

Once an assessment is marked Complete it cannot be modified. A PDF export can be downloaded at any time after completion.

Creating an Assessment

  1. Navigate to Reports > PAM Gap Analysis
  2. Click New Assessment
  3. Fill in the details:
FieldRequiredDescription
TitleYesA name for this assessment (e.g., "Q1 2026 PAM Maturity Review")
DescriptionNoAdditional context or scope notes
  1. Click Create

The new assessment opens directly in the questionnaire wizard.

note

When you create a new assessment, OrbisID pre-populates the questionnaire with responses from the most recently completed assessment. This saves time on repeat assessments and lets you focus on what has changed.

Completing the Questionnaire

The questionnaire is divided into sections presented as a wizard. Navigate between sections using the step bar at the top of the page, or use Back and Next.

Sections

SectionDescription
1. Scope & ContextOrganisation size, industry, and which frameworks apply (including SOx/GxP)
2. PAM ToolingWhether a PAM tool is in use, which product, and deployment maturity
3. Technology Stack SelectionWhich technology areas are in scope for this assessment
3a–3g. Stack sub-sectionsPer-stack questions for AD, Windows, Linux, Network, Databases, Cloud, and Other (shown only for selected stacks)
4. Access GovernanceLifecycle management, access reviews, separation of duties
5. AuthenticationMFA, password policies, and credential strength
6. Session ManagementSession recording, monitoring, and just-in-time access
7. Audit & MonitoringLogging, alerting, and SIEM integration
8. SOx ITGCChange management, access controls for financial systems (shown when SOx is in scope)
9. GxPAudit trail completeness, electronic signatures (shown when GxP is in scope)

Question Types

TypeHow to Answer
Yes / NoClick the Yes or No button
SelectChoose one option from the dropdown
Multi-selectChoose all applicable options
TextFree-text response

Some questions are conditional and only appear based on earlier answers (for example, stack-specific questions only appear for stacks you selected).

Saving Progress

Click Save Responses at the bottom of each section to save your current answers. Responses are saved per-section. You can return to any section at any time while the assessment is IN_PROGRESS.

Completing the Assessment

When all sections are answered to your satisfaction:

  1. Navigate to the final section
  2. Click Complete Assessment
  3. Confirm the prompt

OrbisID processes all responses, evaluates each framework control, and generates the findings. The assessment status changes to COMPLETE and the questionnaire becomes read-only.

note

Completing an assessment is irreversible. Ensure all responses are accurate before proceeding.

Delegating Sections to Subject Matter Experts

Requires Enterprise edition.

If parts of the questionnaire cover technology areas managed by other teams, you can delegate those sections to external contributors without giving them an OrbisID login.

  1. Open an IN_PROGRESS assessment
  2. Click Delegate
  3. Fill in the delegation details:
FieldRequiredDescription
Technology AreaNoFree-text label for the area being delegated (e.g., "Network Infrastructure")
Stack(s)NoSpecific stacks this delegation covers (for reference only)
Recipient EmailNoEmail address to send the link to
DescriptionNoInstructions or context for the recipient
Link ExpiryYesHow many days the link remains valid (default: 14)
  1. Click Create Delegation

A unique link is generated. If you supplied an email address, OrbisID sends the link automatically. You can also copy the link and share it manually.

What the Recipient Sees

The recipient opens the link in any browser — no account required. They see a standalone questionnaire page showing only the questions relevant to their delegation. At the bottom of the page they must:

  1. Enter their full name
  2. Tick the acknowledgment checkbox confirming their responses are accurate
  3. Click Submit & Sign

Submission is a one-time action. Once submitted, the link is consumed and responses are stored against the assessment.

Managing Delegations

The delegations panel on the assessment page shows all tokens created for the assessment:

ColumnDescription
EmailRecipient email (if provided)
Technology AreaLabel given at creation
CreatedDate the token was created
ExpiresDate the link expires
StatusPending, Submitted, or Expired
SignatoryName entered by the recipient on submission

You can:

  • Copy link — copy the URL to share manually
  • Edit email — update the recipient address and resend
  • Resend — send the link again to the current email address

Findings

After an assessment is completed, navigate to Findings (the default view) to see the control-by-control evaluation.

Framework Summary

At the top of the findings page, each framework shows:

ElementDescription
CompliantControls fully satisfied
PartialControls partially satisfied
GapControls with identified gaps
N/AControls not applicable to this assessment
ScoreOverall compliance percentage for the framework

Finding Detail

Each row in the findings table represents a single framework control:

ColumnDescription
Control IDFramework reference (e.g., AC-2, A.9.2.3)
Control NameShort name of the control
StatusCompliant, Partial, Gap, or Not Applicable
RiskCritical, High, Medium, Low, or Informational
Evidence / Gap / RecommendationDetail of what was found and what action is needed

Controls are grouped by framework. Click a framework panel header to collapse or expand it.

Overriding a Finding

If a finding does not accurately reflect your environment, an administrator can override it:

  1. Click the override icon on a finding row
  2. Select the corrected status
  3. Enter a justification
  4. Click Save Override

Overrides are recorded with the justification and are visible in the PDF export.

Responses

Click Responses to see a read-only view of all questionnaire answers, grouped by section.

This view shows:

  • Assessor responses — answers entered directly in OrbisID
  • Delegatee responses — one panel per submitted delegation, showing the signatory name, submission date, and their answers

Downloading the PDF Report

Click Download PDF to generate a full assessment report. The PDF includes:

SectionContent
Cover pageAssessment title, date, licensed organisation, and edition
Executive SummaryOverall maturity score (CMMI level), framework scores, and key risk indicators
Framework FindingsControl-by-control results for each applicable framework
Risk SummaryFindings grouped by risk level
Remediation RoadmapPrioritised list of recommended actions
Appendix A — MethodologyExplanation of the scoring approach
Appendix B.1 — Assessor ResponsesFull questionnaire Q&A from the primary assessor
Appendix B.2+ — Delegatee ResponsesOne appendix section per submitted delegation, including signatory name and submission date

The PDF is generated on demand and reflects the assessment state at the time of download.

Threat Detections and Gap Analysis

If you have deployed Endpoint Sensors, OrbisID automatically incorporates your Threat Detection activity as evidence when evaluating monitoring controls. No extra configuration is required.

How it works

When you complete an assessment, OrbisID takes a snapshot of your current Threat Detection state:

Data pointUsed for
Active Endpoint Sensors (online count)Evidence that real-time Windows endpoint monitoring is in place
Open Threat DetectionsShows the engine is actively generating detections
Confirmed Threat DetectionsAnalyst review evidence — demonstrates detections are being triaged

This data is factored into the following controls:

ControlFrameworkEffect
AU-2 Event Logging — Audit EventsNIST 800-53Active sensors + SIEM = Compliant. Active sensors without SIEM = Partial (with recommendation to forward via CEF syslog)
AC-6(9) Log Use of Privileged FunctionsNIST 800-53Active sensors count as partial logging coverage for Windows endpoints
A.8.15 LoggingISO 27001Active sensors count toward the alerting dimension
ITGC-OP-1 Monitoring of Privileged ActivitySOx ITGCActive sensors + confirmed detections = Compliant. Active sensors without SIEM = Partial (SOx requires 7-year log retention via a SIEM)

Answering "No" to monitoring questions

If you answer No to "Is there real-time alerting configured for anomalous privileged activity?" or "Are privileged access events forwarded to a SIEM?", the recommendation for affected controls will include guidance on how OrbisID Endpoint Sensors can help close the gap — including using the built-in CEF syslog integration to forward detections to a SIEM.

Building SOx evidence with Threat Detections

For SOx in-scope assessments, the ITGC-OP-1 control requires evidence that privileged activity is both monitored and reviewed. To satisfy both:

  1. Deploy at least one Endpoint Sensor (provides the monitoring evidence)
  2. Confirm at least one genuine Threat Detection in the Threat Detections page (provides the analyst-review evidence)
  3. Enable CEF syslog forwarding to a SIEM for log retention (Administration → Settings)

Assessment List

Navigate to Reports > PAM Gap Analysis to see all assessments.

ColumnDescription
TitleAssessment name
StatusDRAFT, IN_PROGRESS, or COMPLETE
FrameworksWhich frameworks were evaluated, including SOx and GxP when in scope
CMMI LevelMaturity level (1–5) calculated at completion
CreatedDate the assessment was created
CompletedDate the assessment was finalised

Click an assessment row to open it.

Deleting an Assessment

  1. Click the delete icon on an assessment row
  2. Confirm the prompt

Deletion is permanent and removes all responses and findings. It is recorded in the Audit Log.