1. NIST Special Publication 800-37 Rev. 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. While not using the exact term "gap analysis" in this specific context, the described process is functionally identical. Section 2.3, "Relationship to Existing Processes," explains that for existing systems, organizations apply the RMF steps to ensure compliance, which necessitates comparing the current state to the required state.
2. NIST Interagency Report (NISTIR) 8170, The Cybersecurity Framework: Implementation Guidance for Federal Agencies. This document, which provides guidance on implementing a risk framework closely related to the RMF, explicitly defines this process. Section 3.2, "Step 3: Create a Target Profile," states, "The results of this activity can be used to perform a gap analysis between the Current Profile and the Target Profile to determine what is necessary to meet the cybersecurity risk management requirements." This directly maps to evaluating a legacy system (Current Profile) against an RMF baseline (Target Profile).
3. Carnegie Mellon University, Software Engineering Institute (SEI), CERT Resilience Management Model (CERT-RMM) v1.2. As a reputable academic and research institution, the SEI's work on resilience management aligns with RMF principles. The model emphasizes assessing existing capabilities against required practices, stating, "A gap analysis can reveal weaknesses in practices that an organization can then resolve." (CERT-RMM v1.2, Section 2.4, "Appraisal and Improvement"). This validates the use of gap analysis for evaluating existing systems against a framework.