Annual Control Review and Testing
Plain English Translation
Organizations must regularly verify that their security measures actually work as intended. CyberSecure Canada requires businesses to test or review their cybersecurity controls at least once every year, or immediately after a major system change. This ensures that defenses remain effective against evolving threats and that any gaps are promptly identified and fixed before an incident occurs.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Conduct a basic annual review of your control implementations against the CyberSecure Canada baseline requirements.
- Document findings in a simple spreadsheet and create a task list to fix any identified gaps.
Required Actions (scaleup)
Required Actions (enterprise)
- Implement continuous control monitoring where possible, supplementing automated checks with manual audits.
- Engage third-party assessors to perform independent testing of critical controls, simulating real-world attacks via penetration testing.
CyberSecure Canada Section 4.4.3.9 requires organizations to periodically review and/or test their cybersecurity controls to ensure they are effective. This testing must occur at a minimum annually, or immediately after a major change occurs in the system.
Both reviewing (checking policies and configurations) and testing (validating that the control actually stops a threat) must be performed at least annually. Organizations may choose to review administrative controls periodically while performing ongoing technical tests on operational safeguards.
A major change includes significant IT environment shifts such as migrating to a new cloud provider, deploying a core business application, a major network overhaul, or changes following a cybersecurity incident. The control testing frequency after major system changes ensures new vulnerabilities are not inadvertently introduced.
Start by inventorying all implemented controls, then distribute them across the calendar based on criticality and resource availability. Using a security control testing plan template can help ensure every control is evaluated at least once within the 12-month period. Tools like WatchDog Security's Compliance Center can also help maintain a single testing calendar with owners and reminders tied to each control.
Organizations should collect internal audit reports, security performance reports, vulnerability scan results, and management review minutes. Providing documented evidence for security control testing and review is essential for demonstrating compliance to auditors. Tools like WatchDog Security's Trust Center can help organize and share evidence bundles with controlled access and an audit-friendly structure.
While all CyberSecure Canada baseline controls require annual review, prioritize those protecting highly sensitive data or critical infrastructure. Controls mitigating the highest risks identified in your cybersecurity risk assessment should always be tested first.
Common methods include policy walkthroughs for administrative controls, sampling access logs to verify least privilege, and technical tests like vulnerability scanning to validate perimeter defenses. These control validation procedures for cybersecurity compliance ensure comprehensive coverage.
Organizations can use internal IT or compliance staff to perform reviews, provided they have sufficient objectivity. However, deciding who should perform control testing internal vs third party often leans toward third parties for critical controls to ensure unbiased validation.
Failed controls should be logged in a risk register or tracking system along with a remediation plan and assigned owner. Once the fix is applied, the control must be re-tested, and the new successful result recorded to demonstrate effectiveness. Tools like WatchDog Security's Risk Register can support consistent tracking of exceptions, remediation tasks, and re-test dates.
Control testing focuses on verifying that individual safeguards operate as designed, whereas an annual security audit evaluates the entire compliance program against a standard. A penetration test is a specific, aggressive form of technical testing that simulates an attacker to uncover complex vulnerabilities.
Annual reviews often fail due to missed deadlines, unclear ownership, and scattered evidence. Tools like WatchDog Security's Compliance Center can help map this control to a testing calendar, assign owners, track evidence requests, and flag gaps so re-testing happens on time after major system changes.
Auditors typically expect a clear chain from test plan to results, exceptions, remediation, and re-test proof. Tools like WatchDog Security's Trust Center can help centralize evidence packages with access controls for assessors, while keeping a consistent record of what was shared, when, and by whom.
"The organization shall periodically review and/or test cyber security controls to ensure effectiveness. Testing and/or review shall take place at a minimum annually, or if a major change occurs in their system."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-24 | WatchDog Security GRC Team | Initial publication |