WikiFrameworksCyberSecure CanadaLegacy System Risk Assessment

Legacy System Risk Assessment

Updated: 2026-02-25

Plain English Translation

Not all software or hardware can be updated automatically. When an organization has systems incapable of automatic patching, they must formally evaluate the security danger these legacy systems pose. This patch management risk assessment helps business leaders decide whether it is safer and more cost-effective to replace the outdated technology entirely, or to keep it running while adding strong compensating controls to prevent cyberattacks.

Executive Takeaway

Organizations must formally assess the risk of systems that cannot be automatically patched to make informed decisions on replacement versus mitigation.

ImpactHigh
ComplexityMedium

Why This Matters

  • Legacy systems without automatic patching are prime targets for cybercriminals looking for easy entry points.
  • A formal risk assessment clarifies the hidden financial and security costs of maintaining outdated technical debt.
  • Documenting the replace vs mitigate legacy systems decision ensures compliance and protects against liability in the event of a breach.

What “Good” Looks Like

  • All systems exempt from automatic patching are documented in a centralized risk register. Tools like WatchDog Security's Risk Register can help standardize risk scoring, ownership, treatment plans, and review dates for these exceptions.
  • A formal legacy system risk assessment is conducted annually to review the viability of replacing unpatchable assets. Tools like WatchDog Security's Compliance Center can help map the assessment and supporting evidence to CSC-05-007 and highlight gaps ahead of audits.
  • Compensating controls, such as strict network segmentation, are actively enforced for any end-of-life systems that remain in production.

A legacy system risk assessment is a formal process of identifying and evaluating the security dangers posed by outdated hardware or software. It specifically focuses on systems that no longer receive support or lack automatic patching capabilities, determining the likelihood and impact of those vulnerabilities being exploited.

To assess the risk, organizations should evaluate the sensitivity of the data the system handles, its connectivity to the internet or other internal networks, and the severity of its known vulnerabilities. This helps quantify the potential impact of a breach versus the operational cost of replacing the system.

A legacy system should be replaced when the cost of implementing and maintaining compensating controls exceeds the cost of a new system, or when the residual risk remains unacceptably high. Systems handling highly sensitive data or those exposed directly to the internet should almost always be prioritized for replacement.

Acceptable compensating controls for unpatchable systems include strict network segmentation, placing the system behind dedicated internal firewalls, removing internet access, enforcing multi-factor authentication for access, and utilizing enhanced monitoring to detect anomalous behavior.

Organizations should reassess risk for legacy systems at least annually. A reassessment should also be triggered whenever a new critical vulnerability is discovered in the legacy system or when there are major changes to the network architecture.

Risk register entries for legacy systems should clearly identify the asset, the specific vulnerability (e.g., incapable of automatic patching), the inherent risk score, the compensating controls applied, the residual risk score, and the designated risk owner responsible for the asset. Tools like WatchDog Security's Risk Register can help maintain consistent fields, approvals, and review cadences so exceptions don’t become permanent technical debt.

Auditors expect a formal patch management exception process that includes a completed risk assessment report, active risk register entries, and technical evidence demonstrating that compensating controls (like network isolation) are functioning as intended. Tools like WatchDog Security's Compliance Center can help organize those artifacts by control and track evidence collection status over time.

Network segmentation for legacy systems involves moving the vulnerable assets into their own restricted network zone. This prevents an attacker who successfully compromises the unpatchable system from moving laterally to access the organization's broader network or sensitive databases.

Under CyberSecure Canada Section 5.2.2.3, the organization shall perform a risk assessment to determine whether to replace systems incapable of automatic patching. This ensures business leaders actively decide on replacing the system or accepting and mitigating the associated risks.

Prioritize legacy system replacement by analyzing the risk register to identify the systems with the highest residual risk scores. Focus first on systems that are internet-facing, process sensitive customer data, or lack adequate compensating controls.

Legacy systems that can’t auto-patch often require an explicit exception process so the business can decide to replace, isolate, or accept the residual risk. Tools like WatchDog Security's Risk Register can help document each exception with risk scoring, a named risk owner, compensating controls, a treatment plan (replace vs mitigate), and a scheduled review date for ongoing governance.

Audit-ready evidence typically includes the risk assessment report, the decision rationale (replace vs mitigate), approvals, and proof that compensating controls are operating. Tools like WatchDog Security's Compliance Center can help link those artifacts and evidence checks directly to CSC-05-007, track gaps, and simplify auditor requests by keeping evidence organized by control.

CYBERSECURE-CANADA Section 5.2.2.3

"The organization shall perform a risk assessment to determine whether to replace systems incapable of automatic patching."

VersionDateAuthorDescription
1.0.02026-02-25WatchDog Security GRC TeamInitial publication