WikiFrameworksCyberSecure CanadaRisk Assessment of External Services

Risk Assessment of External Services

Updated: 2026-02-24

Plain English Translation

Organizations must formally evaluate the security posture of their cloud, MSP, and outsourced IT vendors through a documented vendor risk assessment. Implementing a robust third party risk management program ensures external providers do not introduce vulnerabilities into your environment. Completing a third party risk assessment for all external services is a mandatory step for CyberSecure Canada compliance, enabling organizations to verify that their sensitive information is handled securely.

Executive Takeaway

Conducting risk assessments on external IT service providers protects your sensitive data from supply chain attacks and ensures vendor accountability.

ImpactHigh
ComplexityMedium

Why This Matters

  • Reduces the likelihood of data breaches originating from third-party IT service providers.
  • Satisfies CyberSecure Canada requirements for external service risk assessment and improves overall supply chain security.
  • Provides visibility into the security controls of cloud providers and MSPs before entrusting them with sensitive organizational data.

What “Good” Looks Like

  • Maintaining an accurate inventory of all externally provided IT services and their associated data access (tools like WatchDog Security's Asset Inventory can help identify SaaS and outsourced services and map data/identity access).
  • Conducting a documented vendor security assessment for every critical IT service provider prior to onboarding (tools like WatchDog Security's Vendor Risk Management can standardize questionnaires, risk-tiering, and evidence tracking).
  • Regularly reviewing SOC 2 reports and utilizing a cloud service provider risk assessment checklist for ongoing monitoring.

A vendor risk assessment evaluates the security controls of external providers to ensure they adequately protect organizational data. It is required for outsourced IT services because these vendors often have access to sensitive networks, and their operational vulnerabilities can directly impact your organization's security posture.

To perform a risk assessment for outsourced IT services, begin by classifying the data the vendor will access. Have the vendor complete a cloud service provider risk assessment checklist or a third party security questionnaire template, and thoroughly review their independent security audits or certifications.

Organizations should collect independent security assurance reports during SOC 2 report vendor due diligence. In addition to SOC 2 Type II or ISO 27001 certificates, request penetration test summaries, data privacy policies, and the vendor's own third party risk management program documentation.

Vendor risk assessments should be conducted during the initial procurement phase and reassessed at least annually. High-risk vendors, such as Managed Service Providers (MSPs), may require more frequent reviews to maintain continuous compliance and address emerging threats.

A third-party security questionnaire template should include questions about access controls, encryption standards, incident response procedures, data residency, and employee background checks. Annex C of the CyberSecure Canada standard provides a foundational vendor due diligence questionnaire for this purpose.

You assess these risks by reviewing the vendor's architecture documentation, data processing agreements, and SOC 2 reports. Ensure the vendor risk assessment explicitly verifies that data is encrypted at rest and in transit, and confirms the specific geographical jurisdictions where data is stored or processed.

The CyberSecure Canada requirements for external service risk assessment mandate that organizations complete a formal risk assessment of all externally provided IT services, evaluate their risk tolerance level, and obtain documented compliance reports from their vendors.

Inherent risk is scored based on the vendor's level of access to sensitive data and critical systems before any security measures are considered. Residual risk is determined by evaluating the effectiveness of the vendor's security controls, as validated during the third party risk assessment, against that initial inherent risk.

Third-party risk management is typically a collaborative effort. While procurement handles the vendor relationship and legal manages contracts, the IT or security team should own the technical evaluation and validation of the vendor due diligence for IT service providers.

Common findings in a managed service provider security risk assessment include weak access controls, lack of multi-factor authentication, or inadequate incident response plans. You remediate these by requiring the vendor to implement corrective actions as a condition of the contract, or by applying compensating controls internally.

Managing vendor assessments in spreadsheets often leads to inconsistent questionnaires, missing evidence, and missed reassessment dates. Tools like WatchDog Security's Vendor Risk Management can centralize a vendor catalog, standardize security assessments, apply risk-tiering, and track required evidence and renewal cycles in one place.

Vendor evidence like SOC 2 reports, penetration test summaries, and security policies can be sensitive and is risky to exchange via email attachments. Tools like WatchDog Security's Secure File Sharing support encrypted sharing, TOTP verification, and audit logs so teams can request and store vendor evidence with stronger access controls.

CYBERSECURE-CANADA Section 6.2.3.1(a)

"The organization using cloud applications and/or outsourcing IT services shall: a. complete a risk assessment of externally provided services."

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication