WikiFrameworksCyberSecure CanadaDocument Accepted Risks

Document Accepted Risks

Updated: 2026-02-24

Plain English Translation

Organizations must formally document any cybersecurity risks they choose to accept, ensuring both the inherent risk and residual risk are clearly recorded. This process requires a senior official to review and authorize the acceptance, providing accountability. By doing so, the organization maintains a transparent cybersecurity risk register and ensures leadership is fully aware of how to document accepted cybersecurity risks and vulnerabilities.

Executive Takeaway

Formalizing risk acceptance ensures senior management understands and approves the residual risk remaining after controls are applied.

ImpactHigh
ComplexityLow

Why This Matters

  • Establishes clear accountability for cybersecurity risk exceptions.
  • Maintains visibility into accepted vulnerabilities that could impact business operations.

What “Good” Looks Like

  • A maintained cybersecurity risk register with documented residual risk sign-offs (tools like WatchDog Security's Risk Register can centralize approvals and evidence).
  • A standardized risk acceptance form explicitly authorized by a senior official, with auditable records and attachments (tools like WatchDog Security's Risk Register can track sign-off and supporting evidence).

A risk acceptance form is a formal document used to record a business decision to tolerate a specific vulnerability without further mitigation. It details the risk, justification, and requires senior management risk acceptance approval. Tools like WatchDog Security's Risk Register can store the form, link it to the associated risk record, and keep the authorization evidence in one place.

Organizations document inherent risk (the raw risk before controls) and residual risk (the risk remaining after controls) within a cybersecurity risk register. This allows teams to track the effectiveness of their overall risk treatment plan.

According to CyberSecure Canada risk acceptance requirements, a senior official within the organization must authorize accepted risks. This ensures leadership accountability and provides a formal residual risk sign off.

Inherent risk is the baseline level of risk without any internal controls applied. Residual risk is the remaining level of risk after the organization implements internal controls and mitigations.

A risk acceptance register template should capture the risk description, inherent risk vs residual risk scores, the business justification, the mitigating controls in place, and the date of senior management risk acceptance approval. Tools like WatchDog Security's Risk Register can standardize these fields and make it easier to report accepted risks by owner, system, or business unit.

Risk acceptance documentation should be retained for at least the duration of the risk exception, plus the organization's standard retention period for compliance records. This provides necessary evidence of risk acceptance for audit purposes.

Accepted risks should be reviewed and re-approved at least annually or whenever significant changes occur in the IT environment. This ensures the residual risk remains within the organization's current risk tolerance.

Auditors look for formal risk treatment plan approval records, signed risk acceptance forms, or documented management minutes showing a senior official explicitly authorizing the accepted residual risks.

When baseline controls cannot be implemented, organizations must use a formal cybersecurity risk exception process. They assess the inherent risk, apply compensating controls to lower the residual risk, and document the final risk acceptance.

CyberSecure Canada requires organizations to document any inherent and residual cybersecurity risks they accept. Furthermore, this documentation must be explicitly authorized by a senior official to meet baseline certification standards.

Risk acceptance can fail during audits when approvals are scattered across emails or tickets and the rationale is unclear. Tools like WatchDog Security's Risk Register help centralize inherent vs residual risk scoring, capture the business justification, and record senior-official sign-off as a traceable approval event with supporting evidence.

Organizations often accept risks once and forget to re-evaluate them as systems and threats change. Tools like WatchDog Security's Compliance Center can help map risk acceptance records to control requirements, track review due dates as evidence tasks, and surface overdue re-approvals for residual risk sign-offs during audits.

CYBERSECURE-CANADA Section 4.4.3.3

"Inherent and residual cyber security risks accepted by the organization shall be documented and authorized by a senior official of the organization."

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication