WikiFrameworksCyberSecure CanadaEvaluate Outsourced IT Risk Tolerance

Evaluate Outsourced IT Risk Tolerance

Updated: 2026-02-24

Plain English Translation

Organizations increasingly rely on cloud applications and managed IT service providers to handle daily operations. CyberSecure Canada requires organizations to formally evaluate their risk tolerance when outsourcing IT services and sharing sensitive data. This third party risk management process ensures that external providers maintain acceptable security standards, protecting your organization from potential data breaches stemming from vendor vulnerabilities. By conducting a vendor risk assessment and determining how external providers handle and access sensitive information, business owners can make informed decisions about who they trust with their data.

Executive Takeaway

Evaluating cloud and outsourced IT providers is crucial to ensure they do not introduce unacceptable risks to your organization's sensitive data.

ImpactHigh
ComplexityMedium

Why This Matters

  • Protects sensitive business and customer information from unauthorized access through vulnerable third-party channels.
  • Ensures regulatory and legal compliance by verifying data residency and jurisdiction risk for cloud providers.
  • Defines a clear baseline for how to set risk tolerance for outsourcing IT, reducing business disruption from external incidents.

What “Good” Looks Like

  • A formal third party risk management policy dictating how to assess cloud service provider security before procurement, where tools like WatchDog Security's Policy Management can help maintain versions, approvals, and acceptance tracking.
  • Regular completion of an outsourced IT services risk assessment checklist for all major vendors and MSPs, where tools like WatchDog Security's Vendor Risk Management can standardize assessments and retain supporting evidence.
  • Contracts and agreements explicitly limiting how vendors access, process, and store sensitive information.

CyberSecure Canada Section 6.2.2.1 risk tolerance requirements mandate that organizations formally evaluate their risk when using cloud applications and outsourcing IT services. Specifically, it requires understanding and accepting the level of risk associated with how outsourced IT providers handle and access sensitive information.

You evaluate risk tolerance by assessing the criticality of the outsourced service and the sensitivity of the data involved. This forms the foundation of third party risk management, comparing the potential business impact of a vendor breach against the operational benefits of outsourcing the service. Tools like WatchDog Security's Risk Register can help document the vendor risk scenario, score likelihood and impact, and record the chosen treatment or acceptance decision with owners and review dates.

Organizations should establish clear SOC 2 report requirements for vendors or ask for equivalent certifications like ISO 27001. Reviewing these independent audit reports, along with penetration testing summaries, provides objective evidence of the cloud service provider's security controls. Tools like WatchDog Security's Trust Center and Vendor Risk Management can help organize requested reports and evidence in one place so reviewers and stakeholders can access the latest approved versions during assessments.

To know how to assess cloud service provider security, organizations should use an outsourced IT services risk assessment checklist. This includes reviewing their encryption standards, access control policies, incident response plans, and historical breach data.

Contracts should clearly stipulate how to evaluate external provider access to sensitive data, enforcing the principle of least privilege. They must include terms for data ownership, breach notification timelines, right-to-audit clauses, and strict limitations on secondary data use.

Understanding data residency and jurisdiction risk for cloud providers involves determining exactly where your data is stored and processed geographically. Data stored outside of Canada may be subject to foreign laws, so organizations must ensure this aligns with their legal obligations and customer commitments.

A vendor risk assessment should be conducted before onboarding any new provider and reviewed at least annually. High-risk vendors, such as managed IT service providers, may require more frequent or continuous monitoring to ensure ongoing compliance. Tools like WatchDog Security's Vendor Risk Management can schedule reassessments, assign owners, and track evidence refresh cycles so high-risk vendors are reviewed on time.

A vendor risk assessment is a point-in-time evaluation of a specific provider's security controls. Third party risk management for cloud services is the broader, continuous lifecycle program that includes procurement policies, ongoing monitoring, contract management, and vendor offboarding.

Organizations must identify all data types and assign a classification level based on the impact of unauthorized disclosure. This classification directly influences how to set risk tolerance for outsourcing IT handling that specific data.

When developing vendor due diligence questions for MSPs, ensure they mandate minimum controls like multi-factor authentication (MFA) on all administrative accounts, secure logging, robust access controls, and adherence to established frameworks like CyberSecure Canada requirements for outsourced IT services.

Consistent tracking usually breaks down when assessments live in email threads and spreadsheets. Tools like WatchDog Security's Vendor Risk Management can centralize vendor records, questionnaires, evidence requests (e.g., SOC 2, ISO 27001), review dates, and ownership so teams can see what is complete, what is overdue, and what level of risk is being accepted.

Start by documenting the gap, the business impact if exploited, and the compensating controls you will rely on, then obtain formal approval at the right level. Tools like WatchDog Security's Risk Register can capture the exception as a scored risk, link it to the vendor and service, record the rationale for acceptance, assign an owner, and track a remediation or review date.

CYBERSECURE-CANADA Section 6.2.2.1

"Organization using cloud applications and/or outsourcing IT services shall evaluate their risk tolerance level with how their outsourced IT providers handle and access their sensitive information."

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication