Evaluate Outsourced IT Risk Tolerance
Plain English Translation
Organizations increasingly rely on cloud applications and managed IT service providers to handle daily operations. CyberSecure Canada requires organizations to formally evaluate their risk tolerance when outsourcing IT services and sharing sensitive data. This third party risk management process ensures that external providers maintain acceptable security standards, protecting your organization from potential data breaches stemming from vendor vulnerabilities. By conducting a vendor risk assessment and determining how external providers handle and access sensitive information, business owners can make informed decisions about who they trust with their data.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Identify all current cloud service providers and managed service providers.
- Classify the sensitive information shared with these external providers.
Required Actions (scaleup)
- Develop standard vendor due diligence questions for MSPs and cloud services to evaluate their security posture.
- Establish a formal third-party management policy that defines acceptable risk thresholds.
Required Actions (enterprise)
- Implement continuous third party risk management for cloud services with automated compliance tracking.
- Require comprehensive SOC 2 report requirements for vendors and formal data processing agreements.
CyberSecure Canada Section 6.2.2.1 risk tolerance requirements mandate that organizations formally evaluate their risk when using cloud applications and outsourcing IT services. Specifically, it requires understanding and accepting the level of risk associated with how outsourced IT providers handle and access sensitive information.
You evaluate risk tolerance by assessing the criticality of the outsourced service and the sensitivity of the data involved. This forms the foundation of third party risk management, comparing the potential business impact of a vendor breach against the operational benefits of outsourcing the service. Tools like WatchDog Security's Risk Register can help document the vendor risk scenario, score likelihood and impact, and record the chosen treatment or acceptance decision with owners and review dates.
Organizations should establish clear SOC 2 report requirements for vendors or ask for equivalent certifications like ISO 27001. Reviewing these independent audit reports, along with penetration testing summaries, provides objective evidence of the cloud service provider's security controls. Tools like WatchDog Security's Trust Center and Vendor Risk Management can help organize requested reports and evidence in one place so reviewers and stakeholders can access the latest approved versions during assessments.
To know how to assess cloud service provider security, organizations should use an outsourced IT services risk assessment checklist. This includes reviewing their encryption standards, access control policies, incident response plans, and historical breach data.
Contracts should clearly stipulate how to evaluate external provider access to sensitive data, enforcing the principle of least privilege. They must include terms for data ownership, breach notification timelines, right-to-audit clauses, and strict limitations on secondary data use.
Understanding data residency and jurisdiction risk for cloud providers involves determining exactly where your data is stored and processed geographically. Data stored outside of Canada may be subject to foreign laws, so organizations must ensure this aligns with their legal obligations and customer commitments.
A vendor risk assessment should be conducted before onboarding any new provider and reviewed at least annually. High-risk vendors, such as managed IT service providers, may require more frequent or continuous monitoring to ensure ongoing compliance. Tools like WatchDog Security's Vendor Risk Management can schedule reassessments, assign owners, and track evidence refresh cycles so high-risk vendors are reviewed on time.
A vendor risk assessment is a point-in-time evaluation of a specific provider's security controls. Third party risk management for cloud services is the broader, continuous lifecycle program that includes procurement policies, ongoing monitoring, contract management, and vendor offboarding.
Organizations must identify all data types and assign a classification level based on the impact of unauthorized disclosure. This classification directly influences how to set risk tolerance for outsourcing IT handling that specific data.
When developing vendor due diligence questions for MSPs, ensure they mandate minimum controls like multi-factor authentication (MFA) on all administrative accounts, secure logging, robust access controls, and adherence to established frameworks like CyberSecure Canada requirements for outsourced IT services.
Consistent tracking usually breaks down when assessments live in email threads and spreadsheets. Tools like WatchDog Security's Vendor Risk Management can centralize vendor records, questionnaires, evidence requests (e.g., SOC 2, ISO 27001), review dates, and ownership so teams can see what is complete, what is overdue, and what level of risk is being accepted.
Start by documenting the gap, the business impact if exploited, and the compensating controls you will rely on, then obtain formal approval at the right level. Tools like WatchDog Security's Risk Register can capture the exception as a scored risk, link it to the vendor and service, record the rationale for acceptance, assign an owner, and track a remediation or review date.
"Organization using cloud applications and/or outsourcing IT services shall evaluate their risk tolerance level with how their outsourced IT providers handle and access their sensitive information."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-24 | WatchDog Security GRC Team | Initial publication |