Gordon Security Checklist assesses an organization's current security controls against a structured set of industry-standard requirements and produces a prioritized, plain-language action list identifying what is in place, what is missing, and what to address first without requiring prior compliance experience or a dedicated security team to operate.
The checklist covers controls across identity and access management, endpoint security, network configuration, data handling, incident response, backup and recovery, vendor management, and employee security practices. Each control is assessed through a combination of automated technical verification drawing on live data from connected systems, including Microsoft 365, Google Workspace, and cloud environments, and guided self-assessment questions for controls that cannot be verified programmatically. This means checklist results reflect the actual state of the environment, not only what an administrator has manually confirmed.
Each gap identified in the checklist is assigned a risk severity, a plain-language explanation of why the control matters, and step-by-step remediation instructions that can be executed by an IT generalist without specialised security knowledge. Controls are grouped into a recommended fix sequence based on risk impact and implementation effort, so teams know where to start rather than working through an undifferentiated list of findings.
Completed checklists are saved and re-run on a configurable schedule, tracking which gaps have been closed and flagging new issues introduced by environmental changes. Progress reports are formatted in two views: an operational task list for IT and security teams, showing open items and fix status, and an executive summary showing the overall security posture score, trends over time, and outstanding risk areas for leadership and board reporting.
Checklist results map to SOC 2, ISO 27001, NIST CSF, Cyber Essentials, PCI DSS, and HIPAA control requirements, generating a compliance gap report that can be used as evidence during certification preparation or, on request, supplied to auditors, insurers, and enterprise procurement teams.