WikiFrameworksCyberSecure CanadaTest the Incident Response Plan

Test the Incident Response Plan

Updated: 2026-02-24

Plain English Translation

A written incident response plan is only useful if the organization knows how to execute it under pressure. CyberSecure Canada requires organizations to conduct regular incident response plan testing, such as a cybersecurity tabletop exercise, to validate that procedures work as intended. This testing must include relevant third-party vendors and managed service providers to ensure everyone is aligned on communication and recovery efforts before a real crisis occurs.

Executive Takeaway

Regularly testing the incident response plan ensures teams can respond swiftly and effectively during a real cyber emergency, minimizing downtime and business impact.

ImpactHigh
ComplexityMedium

Why This Matters

  • Identifies critical gaps in processes, communication strategies, and technical readiness before an actual cyber attack.
  • Ensures third-party vendors and internal teams understand their specific roles and hand-offs during high-stress situations.

What “Good” Looks Like

  • Conducting at least an annual incident response tabletop exercise involving key stakeholders from IT, leadership, and critical third-party vendors.
  • Producing an after-action report following tests to document lessons learned and driving continuous improvement into the incident response plan; tools like WatchDog Security's Compliance Center can help centralize evidence and track remediation tasks to completion.

Organizations should conduct incident response plan testing at least annually, or immediately following significant changes to the IT environment, personnel changes, or a real cyber incident.

A cybersecurity tabletop exercise is a discussion-based session where the response team walks through a simulated threat scenario step-by-step to evaluate the plan's effectiveness in a low-stress environment.

To provide incident response plan testing documentation evidence for auditors, retain the exercise scenario, a list of participants, the date it was held, and an after-action report detailing lessons learned and planned improvements.

Invite key contacts from your managed service providers or hosting vendors to participate directly in the tabletop exercise to validate communication protocols, service level agreements, and shared security responsibilities.

Testing should cover the most likely and impactful threats to the organization, particularly incident response plan testing scenarios like a ransomware infection, a major data breach, business email compromise, or an insider threat.

A tabletop exercise is a verbal discussion of a scenario; a functional drill involves hands-on testing of specific technical tasks like restoring a backup; a full simulation mimics a live incident that affects production systems and operations.

Testing should include the primary IT and security responders, alongside key stakeholders from executive leadership, legal counsel, human resources, and public relations, as cyber incidents affect the entire business.

Success is measured by comparing the team's actions against the documented procedures, evaluating communication efficiency, tracking hypothetical recovery times, and determining if the overall business impact was effectively mitigated.

Review the incident response plan exercise after action report to identify gaps or outdated information, update the written procedures and contact lists accordingly, and distribute the revised plan to all stakeholders.

Section 5.1.2.3 requires the organization to test the incident response plan to ensure it meets its intended outcomes, and mandates that relevant third-party cyber security service providers be included in the testing where appropriate.

Incident response testing often creates follow-up work (policy updates, new controls, vendor action items) that can get lost across emails and tickets. Tools like WatchDog Security's Compliance Center can map each exercise to this control, attach the tabletop materials and after-action report as evidence, and track remediation tasks to closure so the next test validates measurable improvements.

Including providers in exercises is useful, but it also adds coordination and proof requirements (who attended, what was agreed, what SLAs and handoffs were validated). Tools like WatchDog Security's Vendor Risk Management can maintain vendor contacts and criticality, record exercise participation, and store the resulting communications and evidence needed to demonstrate that third-party roles were tested where appropriate.

CYBERSECURE-CANADA Section 5.1.2.3

"The organization shall test the incident response plan to ensure that the plan meets the intended outcomes. Where appropriate, this shall include any third-party cyber security service providers."

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication