Compliance Risk Assessment Framework-Agnostic Gap Analysis

A formal gap analysis against the compliance frameworks your business is required to meet: CMMC Levels 1, 2, and 3; HIPAA Security Rule; SOC 2 Type II; PCI DSS 4.0; GLBA Safeguards; NIST CSF 2.0; NIST 800-53; NIST 800-171; and ISO 27001. Evidence-based scoring, a written remediation roadmap, and a finding-by-finding register you can hand to an assessor, a board, or an insurance underwriter. Petronella Technology Group, CMMC-AB Registered Provider Organization #1449, founded 2002 in Raleigh.

RPO #1449| CMMC-RP Team| Founded 2002| BBB A+
What A Compliance Risk Assessment Is

A Single Engagement That Answers Three Questions

A compliance risk assessment from Petronella Technology Group answers three questions the typical compliance audit never gets to in one sitting: where is the organization right now against every framework that applies, where is the organization most exposed if a regulator or assessor walks in tomorrow, and what is the sequenced, priced, owner-assigned plan to close the gap in a timeframe your leadership will sign off on. The output is not a two-hundred-page consulting PDF. The output is a written finding register, a remediation roadmap, and an assessor-ready evidence baseline that your internal compliance team can operate from the day after we hand it over.

The engagement is framework-agnostic by design. Most organizations have more than one applicable framework and usually a messy overlap between them. A healthcare technology vendor might carry HIPAA, SOC 2 Type II from an enterprise customer demand, PCI DSS because a subset of traffic handles cards, and FTC Safeguards Rule because of a financial data touchpoint. A defense contractor might carry CMMC Level 2, NIST 800-171, ITAR considerations, and SOC 2 if a commercial subsidiary is in scope. We do not charge for each framework as a separate assessment. A single engagement walks the controls once and maps findings to every framework that applies, because the underlying technical evidence overlaps more than vendors will admit.

The deliverable is structured for three audiences. Executives read the risk-register summary and the roadmap cost-and-timeline view. Compliance owners read the finding-by-finding detail with evidence pointers and remediation owner fields. Technical teams read the appendix that enumerates what to change in the identity platform, the firewall, the EDR deployment, the backup architecture, and the documentation library. Each reader gets what they need without slogging through the other two.

The Five-Phase Methodology

How A Compliance Risk Assessment Actually Runs

Every compliance risk assessment runs through five phases. No framework skips any phase. No client is told "we can shortcut by skipping the technical probe." The rigor is the value.

01

Scoping And Framework Selection

A two-hour working session defines the in-scope systems, business units, data types, and applicable frameworks. Contract flowdowns, customer mandates, and regulatory posture drive the framework list. The scope is written before the assessment begins so findings are bounded.

02

Stakeholder Interviews

Structured interviews with executive sponsors, IT leadership, security operations, HR, facilities, and third-party vendors. The interview protocol is framework-aware so the same conversation produces evidence for every applicable control family. We record, transcribe, and include excerpts as evidence citations.

03

Document And Evidence Review

Policies, procedures, SSPs, risk registers, DR and BCP plans, vendor contracts, training records, incident tickets, and prior audit reports are reviewed against the control objective each framework requires. Missing documents are cataloged. Outdated documents are flagged. Documents that claim a control exists but contradict technical reality are flagged louder.

04

Technical Probe

Authenticated configuration review of identity provider, endpoint management, EDR coverage, firewall and segmentation, backup immutability, logging and retention, encryption at rest and in transit, privileged access, and cloud-control-plane posture. Authenticated vulnerability scanning of in-scope assets. A light penetration-test overlay on the external perimeter and the identity edge, bounded by scope.

05

Finding Register And Roadmap

Every observed gap becomes a finding with severity rating, framework citation, root-cause note, remediation proposal, estimated level of effort, named remediation owner, and a target close date. Findings are aggregated into a sequenced roadmap with a board-level view and a technical task view. Delivery is a working session, not an emailed PDF.

06

Re-Test And Attestation

Optional sixth phase. After remediation, a re-test validates each finding closed, updates the evidence library, and produces a written attestation suitable for auditors, C3PAOs, customer security questionnaires, and cyber-insurance renewals. The attestation is signed by a senior assessor at Petronella Technology Group.

Frameworks We Assess Against

The Regulated Environments You Already Know

One assessment, one scoped engagement, evidence mapped against every applicable framework. These are the frameworks most clients land in. If you face something rarer, the methodology still applies.

CMMC Levels 1, 2, And 3

Defense Industrial Base contractors under DFARS flowdowns. We assess against all three levels because most clients straddle two. Level 3 is assessed, not avoided.

  • Practice-by-practice evidence review
  • C3PAO-ready SSP and POA&M scaffolding
  • Supply-chain flowdown mapping

NIST 800-171 And 800-172

The underlying control set for CUI environments and the enhanced controls for high-value assets. Assessment includes authenticated technical validation, not just documentation review.

  • 110-control NIST 800-171 Rev 3 review
  • Enhanced 800-172 controls where applicable
  • Cross-map to CMMC Level 2 and Level 3

NIST 800-53 And CSF 2.0

Enterprise control catalog for federal contractors and the broader risk-management framework adopted by regulated private-sector organizations. We handle both the catalog and the framework view.

  • Tailored control baseline selection
  • CSF 2.0 Govern, Identify, Protect, Detect, Respond, Recover
  • Maturity-tier scoring per function

HIPAA Security Rule

Administrative, physical, and technical safeguards for covered entities and business associates. Includes the specific OCR audit-protocol items that bite organizations on investigation.

  • Full Security Rule section 164.308-316 review
  • OCR audit-protocol alignment
  • Business Associate Agreement inventory audit

SOC 2 Type II

Trust Services Criteria readiness assessment before the CPA firm arrives. The gap analysis you want before you pay for a Type II audit that finds the same things you could have found first.

  • Security, Availability, Confidentiality criteria
  • Optional Processing Integrity and Privacy
  • Evidence-library pre-build for audit period

PCI DSS 4.0

Payment Card Industry Data Security Standard for merchants and service providers. Scoping and segmentation validation that determines whether you have a ten-control problem or a three-hundred-control problem.

  • Cardholder data environment scoping
  • SAQ selection and pre-QSA readiness
  • Segmentation verification

ISO 27001 And 27002

The international information-security management standard. Suitable for organizations with international customers, multi-regional operations, or enterprise buyer requirements that specifically ask for it.

  • ISMS scope and risk-treatment review
  • Annex A control coverage
  • Statement of Applicability drafting

GLBA And FTC Safeguards Rule

Financial institution safeguards obligations plus the revised FTC rule that now pulls many non-bank financial services firms into scope. Assessment catches the obligations many organizations did not know applied.

  • Qualified Individual appointment review
  • Nine-element safeguards program assessment
  • Board-reporting cadence verification

Emerging State And Sector Rules

SEC cyber-disclosure rules for public registrants, NY-DFS 500 for financial services operating in New York, CCPA and CPRA for consumer-data processors, and the emerging state privacy patchwork. Assessed only when in-scope.

  • SEC 8-K materiality-assessment readiness
  • NY-DFS 500 amended-rule review
  • State privacy-rule applicability analysis
What You Receive

The Assessment Deliverables

Every compliance risk assessment produces a set of artifacts designed to be used, not stored. The core deliverables include an executive risk register with heat-map visualization, a finding-by-finding control register mapped to every framework in scope, a prioritized remediation roadmap with cost and level-of-effort estimates, an evidence baseline package organized in the folder structure your future auditor will expect, and a written readiness opinion from a senior assessor at Petronella Technology Group.

The executive risk register is the one-page view your board, your CEO, and your legal counsel need. It lists the top findings by business impact, maps them to the framework clock that drives the deadline, assigns an executive owner, and flags any finding that rises to a reportable-condition threshold under SEC, HIPAA OCR, or state-attorney-general rules. It is written in plain business language. Nobody has to translate.

The finding-by-finding control register is the working document your compliance team will operate from for the next six to twenty-four months. Each finding includes the framework citation, a severity rating with justification, a root-cause note that distinguishes policy failures from technical failures from operational-gap failures, a remediation proposal with enough specificity that a midlevel engineer can begin work, an estimated level of effort in hours and dollars, a named remediation owner, and a target close date. Findings are tagged so the register can be filtered by framework when an auditor arrives asking about one specific standard.

The remediation roadmap sequences the findings into a plan. Quick-win items that close significant exposure with low effort are clustered into the first thirty days. Medium-effort items that close substantial framework gaps sequence into the next ninety. Capital projects (major architectural changes, vendor replacements, certification timelines) are placed on a six-to-twenty-four-month arc with milestones. The roadmap is the document your board, your finance team, and your managed security provider will all reference when the year-ahead budget is being written.

The evidence baseline is a folder structure populated with the artifacts we collected or produced during the assessment. Policies, SSPs, diagrams, access-review records, training records, vendor-assurance records, audit trails, and a set of templates your team can continue populating in the same structure. The baseline is how we hand off the engagement so you do not lose the work.

Who Needs A Compliance Risk Assessment

Trigger Events And Regulatory Clocks

Most compliance risk assessment engagements do not start from a standing operating review. They start from a trigger event. The trigger is almost always external and almost always on a short clock. The following are the real-world triggers we see at Petronella Technology Group every month.

A new contract flowdown. A prime contractor just sent a modification that references CMMC Level 2 compliance by a specific date. The subcontractor has nine months, maybe fewer, to demonstrate readiness. A gap analysis is the first engagement on the clock so every subsequent dollar spends on the right remediation in the right sequence.

A customer security questionnaire. A strategic enterprise customer sent a three-hundred-question security-and-compliance questionnaire as part of a renewal. The organization has two weeks to answer with evidence. The assessment produces the finding register that maps the questionnaire and the evidence library that supplies the answers.

A cyber-insurance renewal. The underwriter has moved from a checklist to an attestation. Premium, sublimit, and whether the policy renews at all now depend on evidence that specific controls are implemented. A failed attestation is a material event. The assessment gets the attestation right the first time.

A regulatory notice. HHS OCR, a state attorney general, the SEC, FINRA, or a sector regulator just opened an inquiry. The assessment is now discoverable. The goal is not to survive the inquiry. The goal is to close every finding within the window the regulator will watch.

An incident aftermath. A breach, a ransomware event, a BEC event, or a near-miss has already occurred. The assessment is the formal post-incident readiness review that the cyber-insurance carrier, the attorneys, and the board will demand before the organization can move forward.

An M&A due-diligence event. Either the acquirer or the target has requested a formal compliance posture review as part of the transaction. The assessment produces a deliverable defensible under the representation and warranty insurance review that follows.

A routine annual review. Mature organizations with active compliance programs run an annual external assessment to validate internal evidence, catch drift, and demonstrate third-party oversight to their board. This is the best posture to be in. If you are reading this list and do not see your trigger, you are likely the annual-review customer, and we welcome that work.

How We Are Different

Why Framework-Agnostic Actually Matters

The compliance consulting market is dominated by firms that have specialized in one framework and bolt every other engagement onto the specialty. That works when your exposure is clean, single-framework. It fails when your business carries three or four overlapping obligations. A HIPAA specialist will produce a great HIPAA report and miss the SOC 2 implications. A CMMC specialist will produce a great SSP and never notice the PCI segmentation problem in the back office.

Petronella Technology Group took the opposite approach. The assessment methodology was built from the start to ingest the control objective, walk the evidence once, and produce findings that map to every framework simultaneously. This is the only honest way to assess organizations with overlapping obligations, and it is the only way to produce a remediation roadmap where one dollar of spend retires multiple-framework exposure.

The second differentiator is operational. The same team that runs the assessment also delivers managed cybersecurity services, which means the remediation roadmap is written by people who will have to operate it. Findings that look elegant in a consulting deck but fail in production do not survive this filter. When a finding reaches the register, it has been pressure-tested against the reality of running a 24/7 security program against that control for real clients.

The third differentiator is scope honesty. There are engagements we decline. We do not accept assessments where the client is shopping for a clean bill of health without the intention to remediate. We do not accept engagements as a rubber stamp for a predetermined conclusion. We do not accept engagements where scope pressure prevents us from delivering the technical probe that actually validates claims. A "yes" from Petronella Technology Group is worth more because we say "no" sometimes.

The fourth differentiator is the technical depth of the probe. A large share of consulting-firm compliance assessments are effectively policy reviews. The consultant reads your written policies, interviews a handful of stakeholders, and writes a report on whether the documents exist. The approach is cheap to deliver, easy to scale, and almost always wrong about reality. A control that is written in policy but disabled in production will pass a policy review and fail a C3PAO assessment, a forensic investigation, and a cyber-insurance post-claim audit. Our methodology walks the technical evidence directly: authenticated configuration read from the identity provider, endpoint management console, firewall, EDR platform, backup system, and cloud control plane. If a policy says MFA is required on administrative access and the identity console says a privileged account has MFA disabled, the finding is written against reality, not against the policy statement.

The fifth differentiator is continuity. A gap analysis followed by silence is worth a fraction of a gap analysis followed by a working partnership that retires the findings on a published schedule. Clients who want a one-shot engagement and nothing more can take that path; the deliverable is self-contained. Clients who want the remediation phase to land on the same team that wrote the register can continue into managed cybersecurity, advisory retainers, or project engagements specific to high-priority findings. The continuity option is never required, and the deliverable is written to work without it.

Frameworks At A Glance

One Engagement. Every Framework That Applies.

CMMC Level 1 CMMC Level 2 CMMC Level 3 NIST 800-171 NIST 800-172 NIST 800-53 NIST CSF 2.0 HIPAA Security Rule SOC 2 Type II PCI DSS 4.0 GLBA Safeguards FTC Safeguards Rule ISO 27001 ISO 27002 SEC Cyber Disclosure NY-DFS 500 CCPA / CPRA CJIS
Frequently Asked

Questions Before A Scope Call

How long does a compliance risk assessment take?
Most single-framework assessments run four to six weeks from kickoff to delivered register. Multi-framework assessments for mid-market organizations run eight to twelve weeks. Large, multi-business-unit, multi-region engagements can run a full quarter. The timeline is written into the scope document before the engagement starts.
Is this the same as a CMMC assessment from a C3PAO?
No. A compliance risk assessment is a readiness engagement. A CMMC Level 2 or Level 3 assessment is the formal certification event delivered by a Certified Third-Party Assessment Organization. We are not a C3PAO. Petronella Technology Group is a Registered Provider Organization (RPO #1449) that prepares you to pass the C3PAO assessment. The two roles are deliberately separated by the CMMC-AB.
What if we have never had a compliance program before?
That is the most common starting point. The assessment is designed to work from a greenfield posture. We document the current state honestly, identify the quick wins that close significant exposure, and produce a roadmap that builds the program in the right sequence. The engagement has handled organizations that arrived with no SSP, no risk register, and no written information-security policy.
How do you score findings?
Each finding receives a severity rating on a five-level scale from informational to critical. The rating weighs likelihood of exploitation, business impact if exploited, regulatory-reporting threshold crossed, and framework-certification impact. The scoring methodology is documented in the deliverable so the register can be defended against scrutiny.
Will this assessment satisfy our cyber-insurance carrier?
In most cases yes. The assessment produces the attestation format most major carriers accept for renewal, including MFA coverage, EDR coverage, privileged-access controls, backup immutability, logging retention, and incident-response readiness. If your broker has a specific carrier template, we adapt. The assessment has been used to move clients from non-renewal notices to full renewal with expanded sublimits.
Can you remediate the findings after the assessment?
Yes. Clients frequently engage Petronella Technology Group on the remediation work directly, often folding it into a managed cybersecurity program. There is no obligation to do so. The assessment register is written to be actionable by any competent internal team or third-party consultant. If you prefer to remediate internally or with another vendor, the deliverable works.
What is the pricing model?
Custom quote based on organization size, framework scope, and the complexity of the environment. A small single-framework SOC 2 readiness engagement starts materially lower than a multi-framework, multi-region enterprise assessment. Pricing is transparent. You receive a proposal with inclusions, exclusions, timeline, and total cost before any contract is signed.
Is the engagement covered by attorney-client privilege?
When the engagement is retained through external legal counsel, aspects of the work product can be structured under attorney-client privilege and attorney work product doctrine. This is especially common during regulatory inquiries, post-incident reviews, and M&A due diligence. Coordinate this at the contracting phase, not after delivery.
The Scope Boundaries We Publish

What A Compliance Risk Assessment Is Not

To keep expectations aligned, here is what a compliance risk assessment from Petronella Technology Group does not do. The assessment is not a penetration test, although a bounded external and identity-edge probe is included as validation. If a full red-team engagement is the objective, see our penetration testing services scope. The assessment is not a formal C3PAO CMMC Level 2 or Level 3 certification event; those are delivered by accredited C3PAOs only, and Petronella Technology Group functions as the Registered Provider Organization that prepares clients for the C3PAO visit, not as the certifying body.

The assessment is not a substitute for legal advice on regulatory reporting obligations. When findings approach reporting thresholds under HIPAA Breach Notification Rule, SEC Item 1.05 cyber disclosure, state attorney-general notification statutes, or sector-specific regulatory timelines, we flag the issue and recommend outside counsel. The assessment is not a consumer identity-theft investigation, a private-investigator engagement, or a mobile-device forensic imaging service. Craig Petronella holds a Digital Forensic Examiner certification (DFE #604180) focused on network and crypto investigations, and the practice does not accept engagements outside that scope.

The assessment also does not guarantee audit success. A formal assessor (a CPA firm for SOC 2, an OCR investigator for HIPAA, a C3PAO for CMMC, a QSA for PCI) makes the determination. What the assessment does is close the gap between where you are and where the assessor needs you to be, in writing, with evidence, before the formal event. No honest consulting firm will promise more than that, and the ones who do are selling something other than a compliance risk assessment.

Why North Carolina Companies Choose Us

Twenty-Four Years In The Triangle

Petronella Technology Group is headquartered at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606, founded in 2002, and operated continuously in the Raleigh and Research Triangle market for twenty-four years. The firm holds CMMC-AB Registered Provider Organization status (RPO #1449), verifiable in the public CyberAB registry, and the entire delivery team is CMMC-RP certified. Founder Craig Petronella holds CMMC-RP, CCNA, CWNE, and DFE #604180 credentials and is listed in the North Carolina Office of Indigent Defense Services Forensic Resources registry. The firm has maintained a BBB A+ rating since 2003.

Those credentials matter because the compliance risk assessment is a trust engagement. The deliverable becomes a discoverable document in legal proceedings, a bindable attestation for insurance carriers, and a foundation for board-level security reporting. The credibility of the firm producing the assessment determines the weight the document carries. Local accountability, verifiable credentials, and a long operating history are deliberate choices, not marketing points.

Regionally the practice serves Raleigh, Durham, Chapel Hill, Cary, Apex, Morrisville, Wake Forest, Holly Springs, Fuquay-Varina, Garner, Knightdale, Clayton, Smithfield, Wendell, Zebulon, Rolesville, and Research Triangle Park, with extended coverage across Charlotte, Greensboro, Winston-Salem, Fayetteville, Wilmington, Jacksonville, and the remainder of the North Carolina business corridor. Assessments are conducted on-site or remote depending on the scope, the travel-sensitivity of the environment, and whether classified or CUI handling requires a cleared meeting space.

A Clear Picture Beats A Guessing Game

A thirty-minute scoping call defines the framework scope, the timeline, and the deliverable so the proposal you receive reflects your actual business, not a templated sales pitch.