Risk Assessment of External Services
Plain English Translation
Organizations must formally evaluate the security posture of their cloud, MSP, and outsourced IT vendors through a documented vendor risk assessment. Implementing a robust third party risk management program ensures external providers do not introduce vulnerabilities into your environment. Completing a third party risk assessment for all external services is a mandatory step for CyberSecure Canada compliance, enabling organizations to verify that their sensitive information is handled securely.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Identify and list all externally provided IT services and cloud applications.
- Distribute a basic third party security questionnaire template to all current IT vendors to establish a security baseline.
Required Actions (scaleup)
A vendor risk assessment evaluates the security controls of external providers to ensure they adequately protect organizational data. It is required for outsourced IT services because these vendors often have access to sensitive networks, and their operational vulnerabilities can directly impact your organization's security posture.
To perform a risk assessment for outsourced IT services, begin by classifying the data the vendor will access. Have the vendor complete a cloud service provider risk assessment checklist or a third party security questionnaire template, and thoroughly review their independent security audits or certifications.
Organizations should collect independent security assurance reports during SOC 2 report vendor due diligence. In addition to SOC 2 Type II or ISO 27001 certificates, request penetration test summaries, data privacy policies, and the vendor's own third party risk management program documentation.
Vendor risk assessments should be conducted during the initial procurement phase and reassessed at least annually. High-risk vendors, such as Managed Service Providers (MSPs), may require more frequent reviews to maintain continuous compliance and address emerging threats.
A third-party security questionnaire template should include questions about access controls, encryption standards, incident response procedures, data residency, and employee background checks. Annex C of the CyberSecure Canada standard provides a foundational vendor due diligence questionnaire for this purpose.
You assess these risks by reviewing the vendor's architecture documentation, data processing agreements, and SOC 2 reports. Ensure the vendor risk assessment explicitly verifies that data is encrypted at rest and in transit, and confirms the specific geographical jurisdictions where data is stored or processed.
The CyberSecure Canada requirements for external service risk assessment mandate that organizations complete a formal risk assessment of all externally provided IT services, evaluate their risk tolerance level, and obtain documented compliance reports from their vendors.
Inherent risk is scored based on the vendor's level of access to sensitive data and critical systems before any security measures are considered. Residual risk is determined by evaluating the effectiveness of the vendor's security controls, as validated during the third party risk assessment, against that initial inherent risk.
Third-party risk management is typically a collaborative effort. While procurement handles the vendor relationship and legal manages contracts, the IT or security team should own the technical evaluation and validation of the vendor due diligence for IT service providers.
Common findings in a managed service provider security risk assessment include weak access controls, lack of multi-factor authentication, or inadequate incident response plans. You remediate these by requiring the vendor to implement corrective actions as a condition of the contract, or by applying compensating controls internally.
Managing vendor assessments in spreadsheets often leads to inconsistent questionnaires, missing evidence, and missed reassessment dates. Tools like WatchDog Security's Vendor Risk Management can centralize a vendor catalog, standardize security assessments, apply risk-tiering, and track required evidence and renewal cycles in one place.
Vendor evidence like SOC 2 reports, penetration test summaries, and security policies can be sensitive and is risky to exchange via email attachments. Tools like WatchDog Security's Secure File Sharing support encrypted sharing, TOTP verification, and audit logs so teams can request and store vendor evidence with stronger access controls.
"The organization using cloud applications and/or outsourcing IT services shall: a. complete a risk assessment of externally provided services."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-24 | WatchDog Security GRC Team | Initial publication |