Require Compliance Reports
Plain English Translation
Organizations utilizing cloud services or external IT providers must ensure these vendors maintain robust security practices to protect sensitive data. CyberSecure Canada requires organizations to collect official compliance reports, such as a SOC 2 report or ISO 27001 certification, from their vendors as proof of a verified security posture. If a necessary vendor cannot provide an independent compliance report, the organization must formally document a business case justifying the exception and acknowledging the accepted risks.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Request SOC 2 or ISO 27001 reports from all core cloud platforms and managed IT service providers.
- Document a simple business case for any vendor that lacks a compliance report but is necessary for operations.
Required Actions (scaleup)
- Implement a formalized third-party risk management policy incorporating a third-party due diligence checklist SOC 2 ISO 27001.
- Establish standard non-disclosure agreements (NDAs) to facilitate the receipt of confidential vendor compliance reports.
Required Actions (enterprise)
- Automate the tracking of vendor compliance report expiration dates to ensure continuous validity.
- Conduct deep-dive reviews of SOC 2 Type II exceptions and complementary user entity controls (CUECs) to ensure internal alignment.
A vendor compliance report is an independent audit demonstrating that an external provider has implemented specific security controls. Reports like SOC 2, ISO 27001, or PCI DSS prove that the vendor's security posture has been tested and verified by a qualified third-party assessor, greatly aiding your vendor security assessment.
You can learn how to request a SOC 2 report from a vendor by contacting their sales or security team during the procurement or renewal process. Many large providers also maintain self-service trust centers where customers can download these reports immediately after signing a digital non-disclosure agreement.
When evaluating SOC 2 Type II vs Type I which to require, organizations should prioritize a SOC 2 Type II report whenever possible. A Type II evaluates the operational effectiveness of controls over a period of time (usually 6-12 months), whereas a Type I only assesses the design of controls at a specific point in time.
Vendors should undergo audits and provide updated compliance reports at least annually. Organizations must track these expiration dates to ensure continuous vendor compliance report requirements for SaaS providers are being met over the lifespan of the contract. Tools like WatchDog Security's Vendor Risk Management can track report issue/expiry dates per vendor, assign owners, and alert teams before renewals are due.
Yes, an ISO 27001 certificate vs SOC 2 report for vendors is a frequent comparison, and both are globally recognized and generally acceptable for vendor assurance. CyberSecure Canada explicitly lists ISO 27001 as an equivalent standard for satisfying the requirement to collect vendor compliance evidence.
A business case exception for vendor compliance reports must document why the vendor was chosen despite lacking an audit report. It should detail the operational necessity of the service, the specific data involved, any compensating controls the vendor has in place, and a formal risk acceptance signature by senior leadership. Tools like WatchDog Security's Risk Register can link the exception to a scored third-party risk, capture approval evidence, and track mitigation milestones over time.
To learn how to verify SOC 2 report scope and validity, organizations must review the system description section of the report to ensure it explicitly covers the specific SaaS product or service being purchased. You must also check the report's audit period to ensure it is recent, typically ending within the last 12 months.
If a vendor refuses to share their report publicly, you should submit a formal vendor SOC 2 report NDA confidentiality request, offering to sign a mutual non-disclosure agreement. If they still refuse or simply do not have an audit report, you must evaluate alternative vendors or document a formal business case to accept the risk.
Any external provider that handles, stores, or processes sensitive information, or has administrative access to your network, should provide a report. This includes managed service providers (MSPs), cloud hosting platforms, SaaS applications, and payment processors, who must specifically provide PCI DSS compliance documentation for service providers.
CyberSecure Canada 6.2.3.1(b) require compliance reports mandates that if an external provider cannot share a SOC 2, ISO 27001, or equivalent compliance report, the organization must provide a formally documented business case explaining why they chose not to. This ensures the organization has recognized and accepted the resulting third-party risk.
Centralizing vendor compliance evidence reduces audit scramble and prevents uncontrolled sharing of sensitive reports. Tools like WatchDog Security's Vendor Risk Management can store reports per vendor and track renewals, while WatchDog Security's Secure File Sharing can support encrypted exchange, access controls, and audit logs when collecting documents from providers.
This works best when it is a defined procurement gate with clear owners, required evidence, and an exception path. Tools like WatchDog Security's Policy Management can publish and version the third-party requirements and track acknowledgements, and WatchDog Security's Compliance Center can map the process to CyberSecure Canada and help track completion evidence for audits.
"require that all their external providers share a report that states that they achieved compliance with SOC 2, ISO/IEC 27001, PCI-DSS, ISO/IEC 20000, CAN/DGSI 104:2021 or equivalent, or provide a documented business case as why they chose not to;"
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-24 | WatchDog Security GRC Team | Initial publication |