<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Truvo Cyber Blog</title>
    <link>https://truvocyber.com/blog</link>
    <description>Practical guidance on building effective security programs - SOC 2, ISO 27001, ISO 42001, CMMC, CPCSC and privacy compliance; by a Canadian cybersecurity consulting company.</description>
    <language>en</language>
    <pubDate>Sat, 04 Apr 2026 01:38:10 GMT</pubDate>
    <dc:date>2026-04-04T01:38:10Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Risk Assessment and Security Planning for ITSP.10.171</title>
      <link>https://truvocyber.com/blog/cpcsc-risk-assessment-security-planning</link>
      <description>&lt;p&gt;The majority of &lt;a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171" style="display: inline;"&gt;ITSP.10.171&lt;/a&gt; control families deal with operational security: how you configure systems, manage access, protect data. The Risk Assessment (RA) and Planning (PL) families sit a layer above that. They define how an organization understands its risk posture and documents the security architecture that addresses it.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;The majority of &lt;a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171" style="display: inline;"&gt;ITSP.10.171&lt;/a&gt; control families deal with operational security: how you configure systems, manage access, protect data. The Risk Assessment (RA) and Planning (PL) families sit a layer above that. They define how an organization understands its risk posture and documents the security architecture that addresses it.&lt;/p&gt;  
&lt;p&gt;This distinction matters because RA and PL controls shape everything else. A vulnerability scanning program without a risk register is just generating data. A collection of security controls without a system security plan is a set of disconnected activities that an assessor has no way to evaluate as a coherent program.&lt;/p&gt; 
&lt;p&gt;RA and PL are not among the six families expected at Level 1; they apply at Level 2, which requires compliance with the full ITSP.10.171 standard. For organizations preparing for &lt;a href="https://truvo.ca/blog/cpcsc-canadian-cyber-security-certification-guide" style="display: inline;"&gt;CPCSC Level 2 certification&lt;/a&gt;, these two families represent the governance layer that ties the entire program together. They are not the most technically complex controls in ITSP.10.171, but they are among the most consequential when they are missing or incomplete.&lt;/p&gt; 
&lt;div style="background-color: #F0F7FA; border-left: 4px solid #009FDA; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;Level 2 Governance Controls&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;RA and PL are Level 2 control families under CPCSC. They are not required at Level 1, but organizations planning ahead should understand them early. These two families form the governance backbone that makes every other control family auditable.&lt;/p&gt; 
&lt;/div&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Risk Assessment (RA): What ITSP.10.171 Requires&lt;/h2&gt; 
&lt;p&gt;The RA family covers the process of identifying, evaluating, and responding to security risks across systems that handle controlled information. The controls fall into three operational areas.&lt;/p&gt; 
&lt;h3&gt;Risk Assessment Process&lt;/h3&gt; 
&lt;p&gt;Organizations must conduct and document periodic risk assessments that identify threats and vulnerabilities to their systems and data. The keyword here is documented. Running an informal assessment, discussing risks in a meeting, or relying on institutional knowledge does not satisfy the control. The assessment must produce a documented output that identifies specific risks, evaluates their likelihood and impact, and records the results.&lt;/p&gt; 
&lt;p&gt;For CPCSC purposes, this means a risk assessment that covers all systems within the certification boundary, conducted at a defined frequency, with results that feed directly into risk treatment decisions.&lt;/p&gt; 
&lt;h3&gt;Vulnerability Monitoring and Scanning&lt;/h3&gt; 
&lt;p&gt;ITSP.10.171 requires organizations to monitor and scan for vulnerabilities in their systems and applications. This is the most operationally visible RA control, and it is also the one where the gap between doing something and meeting the requirement is widest.&lt;/p&gt; 
&lt;p&gt;Running vulnerability scans is common. Organizations with any security maturity typically have a scanning tool in place. What distinguishes a compliant program from an informal one is the full lifecycle: scanning at defined intervals, triaging results against risk criteria, remediating within established timeframes, and documenting exceptions where vulnerabilities are accepted rather than remediated.&lt;/p&gt; 
&lt;p&gt;The scanning requirement aligns closely with &lt;a href="https://csrc.nist.gov/pubs/sp/800/171/r3/final" style="display: inline;"&gt;NIST SP 800-171 Rev 3&lt;/a&gt;, which treats vulnerability scanning as an ongoing operational activity rather than a periodic event. ITSP.10.171 follows the same logic. The expectation is continuous or near-continuous monitoring of the threat landscape, not quarterly scan-and-forget cycles.&lt;/p&gt; 
&lt;div style="background-color: #fff0f3; border-left: 4px solid #ff1054; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;Common Pitfall&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;Running quarterly scans and filing the reports does not satisfy RA controls. ITSP.10.171 expects continuous or near-continuous vulnerability monitoring with documented triage, remediation timeframes, and acceptance rationale for every finding.&lt;/p&gt; 
&lt;/div&gt; 
&lt;h3&gt;Risk Response&lt;/h3&gt; 
&lt;p&gt;After risks are identified and vulnerabilities are catalogued, the organization must document its response. For each identified risk, there must be a recorded decision: mitigate, accept, transfer, or avoid. Each decision requires a documented rationale.&lt;/p&gt; 
&lt;p&gt;This is where many organizations fall short. The scan runs, the report generates, and the high-severity items get patched. But the medium-severity items sit in a queue, the accepted risks have no formal documentation, and six months later nobody can explain why a particular vulnerability was left unpatched on a specific system.&lt;/p&gt; 
&lt;p&gt;A compliant risk response process produces a clear trail from identification through to resolution or documented acceptance, with rationale that would hold up under assessor scrutiny.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Planning (PL): The System Security Plan and Rules of Behavior&lt;/h2&gt; 
&lt;p&gt;The PL family addresses the documentation that describes how an organization's security program is structured and how personnel are expected to behave within it.&lt;/p&gt; 
&lt;h3&gt;The System Security Plan&lt;/h3&gt; 
&lt;p&gt;The system security plan (SSP) is the single most important document in a CPCSC certification effort. It describes the system boundary, the security controls in place, how those controls are implemented, and who is responsible for maintaining them. For Level 2 assessments, the SSP is the primary artifact that assessors use to understand the organization's security posture before they begin testing.&lt;/p&gt; 
&lt;p&gt;An incomplete SSP creates problems that cascade across every other control family. If the SSP does not accurately describe the system boundary, the assessor cannot determine whether access controls are applied to the right systems. If the SSP omits a control implementation, the assessor has no basis to verify it. If the SSP describes a control that does not match the actual implementation, that creates a finding regardless of whether the implementation itself is adequate.&lt;/p&gt; 
&lt;div style="background-color: #F0F7FA; border-left: 4px solid #009FDA; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;The SSP Is Not a Checkbox&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;The system security plan is the narrative document that makes every other control auditable. Organizations that treat it as an afterthought, something to complete the week before an assessment, consistently encounter more findings than those that maintain it as a living document.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;What the SSP Must Cover&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;System boundary definition: which systems, networks, and data stores are in scope&lt;/li&gt; 
 &lt;li&gt;Control implementation descriptions: how each applicable ITSP.10.171 control is satisfied&lt;/li&gt; 
 &lt;li&gt;Roles and responsibilities: who owns each control area&lt;/li&gt; 
 &lt;li&gt;Interconnections: how the system connects to external systems and networks&lt;/li&gt; 
 &lt;li&gt;Authorization status: the current security posture and any known gaps under remediation&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Rules of Behavior&lt;/h3&gt; 
&lt;p&gt;ITSP.10.171 requires documented rules of behavior that describe the responsibilities and expected conduct of personnel who access systems containing controlled information. This is the formal agreement that personnel acknowledge before being granted access.&lt;/p&gt; 
&lt;p&gt;Rules of behavior typically cover acceptable use, data handling expectations, incident reporting obligations, and consequences for non-compliance. The control requires that these rules are documented, distributed to relevant personnel, and acknowledged before access is provisioned.&lt;/p&gt; 
&lt;p&gt;For organizations that already maintain an acceptable use policy, this control often requires minimal additional effort. The key requirement is that the rules specifically address the handling of controlled information, not just general IT usage, and that there is documented evidence of personnel acknowledgment.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Where SOC 2 and ISO 27001 Overlap&lt;/h2&gt; 
&lt;p&gt;Organizations with existing SOC 2 or ISO 27001 certifications will find meaningful overlap in these two families, though the mapping is not one-to-one.&lt;/p&gt; 
&lt;h3&gt;Risk Assessment Overlap&lt;/h3&gt; 
&lt;p&gt;SOC 2 CC3.1 through CC3.4 (Risk Assessment criteria) require an annual risk assessment process that identifies and evaluates risks. ISO 27001 Clause 6.1 requires risk assessment processes that identify information security risks and evaluate their likelihood and consequences. Both frameworks expect a documented risk register and defined risk treatment plans. The operational mechanics are similar enough that an organization with a mature risk assessment process under either framework has the foundation in place for RA compliance under ITSP.10.171.&lt;/p&gt; 
&lt;p&gt;The primary gap tends to be scope. SOC 2 and ISO 27001 risk assessments cover the systems and data within their own audit boundaries. ITSP.10.171 requires the risk assessment to cover all systems that handle controlled government information, which may include systems outside the existing certification scope.&lt;/p&gt; 
&lt;h3&gt;Planning Overlap&lt;/h3&gt; 
&lt;p&gt;SOC 2 does not require a formal system security plan in the way ITSP.10.171 defines it. The SOC 2 system description serves a related purpose, describing the system boundaries and controls, but it is structured for auditor consumption during the SOC 2 examination rather than as an ongoing operational document.&lt;/p&gt; 
&lt;p&gt;ISO 27001 comes closer through its Statement of Applicability (SoA) and the ISMS documentation requirements, which collectively describe which controls are implemented and how. But the SoA is not a system security plan. An organization with ISO 27001 certification will need to create a dedicated SSP for ITSP.10.171 compliance, though much of the content can be drawn from existing ISMS documentation.&lt;/p&gt; 
&lt;table style="width: 100%; border-collapse: collapse; margin: 24px 0;"&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Framework&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Risk Assessment Overlap&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Planning (SSP) Overlap&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;SOC 2&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC3.1-CC3.4 cover annual risk assessment, risk register, treatment plans&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;System description is related but not equivalent to an SSP&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;ISO 27001&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Clause 6.1 requires risk identification, likelihood, and consequence evaluation&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;SoA + ISMS docs provide a starting point; dedicated SSP still required&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Key Gap&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Scope must extend to all systems handling controlled government information&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Neither framework produces an SSP in the ITSP.10.171 format&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Bottom Line&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Methodology reusable; scope adjustment needed&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Content reusable; new document required&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Common Gaps That Create Problems&lt;/h2&gt; 
&lt;p&gt;Across organizations preparing for CPCSC certification, several patterns appear consistently in the RA and PL control families.&lt;/p&gt; 
&lt;h3&gt;Scattered Risk Registers&lt;/h3&gt; 
&lt;p&gt;Risk tracking spread across multiple tools, spreadsheets, ticketing systems, and email threads is a common failure. An assessor expects a single, authoritative source that shows all identified risks, their current status, and the documented treatment decision for each. When risks are tracked in a vulnerability scanner, a project management tool, and a shared spreadsheet simultaneously, the organization cannot demonstrate a coherent risk management process.&lt;/p&gt; 
&lt;p&gt;The fix is not necessarily a dedicated GRC platform, though that helps at scale. The fix is a single location, whatever the format, where every identified risk is tracked from identification through treatment with a clear rationale for each decision.&lt;/p&gt; 
&lt;h3&gt;No Documented Risk Response&lt;/h3&gt; 
&lt;p&gt;Remediation happens. Vulnerabilities get patched, configurations get tightened, exceptions get made. But the decision trail is missing. There is no record of who decided to accept a particular risk, what the rationale was, or when the acceptance will be reviewed.&lt;/p&gt; 
&lt;p&gt;For RA compliance, the documented rationale matters as much as the action itself. An assessor reviewing a risk register will look for mitigation evidence on mitigated risks and acceptance rationale on accepted risks. A decision to accept risk without a documented business justification is a finding.&lt;/p&gt; 
&lt;h3&gt;Outdated or Incomplete SSP&lt;/h3&gt; 
&lt;p&gt;The most problematic gap in the PL family is an SSP that does not reflect the current state of the environment. This happens frequently when the SSP is written once during initial certification preparation and then not updated as systems change. New applications are deployed, network architecture evolves, personnel change roles, and the SSP quietly drifts from reality.&lt;/p&gt; 
&lt;p&gt;When the SSP describes a different environment than the one the assessor evaluates, every control verification becomes complicated. The assessor must reconcile what the documentation says with what they observe, and discrepancies create findings even if the underlying security posture is sound.&lt;/p&gt; 
&lt;h3&gt;Missing Vulnerability Management Lifecycle&lt;/h3&gt; 
&lt;p&gt;Running scans is step one. Many organizations stop there, or stop after remediating critical findings. A complete vulnerability management lifecycle under ITSP.10.171 requires scanning, triaging, remediating or accepting with rationale, verifying remediation, and reporting, all at defined intervals appropriate to the risk level of each system.&lt;/p&gt; 
&lt;div style="background-color: #fff0f3; border-left: 4px solid #ff1054; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;The Evidence Trail Matters&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;For every gap listed above, the underlying problem is the same: the work may be happening, but the evidence is not there. Under ITSP.10.171, undocumented controls are unverifiable controls, and unverifiable controls are findings.&lt;/p&gt; 
&lt;/div&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Implementation: Building It Right&lt;/h2&gt; 
&lt;h3&gt;Centralize the Risk Register&lt;/h3&gt; 
&lt;p&gt;Consolidate all risk tracking into a single authoritative source. This register should capture, at minimum:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Risk identifier and description&lt;/li&gt; 
 &lt;li&gt;Date identified and source (risk assessment, vulnerability scan, incident, audit finding)&lt;/li&gt; 
 &lt;li&gt;Risk owner&lt;/li&gt; 
 &lt;li&gt;Likelihood and impact rating&lt;/li&gt; 
 &lt;li&gt;Treatment decision: mitigate, accept, transfer, or avoid&lt;/li&gt; 
 &lt;li&gt;Treatment rationale&lt;/li&gt; 
 &lt;li&gt;Target remediation date for mitigated risks&lt;/li&gt; 
 &lt;li&gt;Review date for accepted risks&lt;/li&gt; 
 &lt;li&gt;Current status&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The format matters less than the discipline. A well-maintained spreadsheet outperforms a poorly maintained GRC platform. What matters is that every identified risk has a single, traceable record from identification through disposition.&lt;/p&gt; 
&lt;h3&gt;Implement Tiered Vulnerability Scanning&lt;/h3&gt; 
&lt;p&gt;Not every system warrants the same scanning cadence. A tiered approach aligns scanning frequency with risk:&lt;/p&gt; 
&lt;table style="width: 100%; border-collapse: collapse; margin: 24px 0;"&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;System Tier&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Scan Frequency&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Rationale&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Internet-facing systems&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Weekly&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Broadest threat surface, shortest time-to-exploitation for known vulnerabilities&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Internal systems handling controlled information&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Monthly or quarterly&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Depends on data classification and exposure profile&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Low-risk and supporting infrastructure&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Annual + ad-hoc&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Supplemented by scanning after significant changes&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;Each tier should have defined triage and remediation timeframes. Critical vulnerabilities on internet-facing systems might carry a 48-hour remediation window. The same vulnerability on an isolated internal system might allow 30 days. The timeframes should reflect actual risk, documented in the vulnerability management policy, and tracked in the risk register.&lt;/p&gt; 
&lt;h3&gt;Structure the System Security Plan&lt;/h3&gt; 
&lt;p&gt;The SSP does not need to be a 200-page document, but it must be complete and accurate. A practical structure:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;strong&gt;System identification:&lt;/strong&gt; Name, purpose, categorization, and authorization status&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;System boundary:&lt;/strong&gt; Network diagrams, data flow diagrams, and a clear description of what is in scope&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;System environment:&lt;/strong&gt; Physical and logical architecture, hosting, and interconnections&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Control implementation:&lt;/strong&gt; For each applicable ITSP.10.171 control, a description of how the organization satisfies it, including tools, processes, and responsible personnel&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Roles and responsibilities:&lt;/strong&gt; A responsibility matrix mapping control families to specific roles&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Continuous monitoring strategy:&lt;/strong&gt; How the organization tracks control effectiveness over time&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Plan of action and milestones (POA&amp;amp;M):&lt;/strong&gt; Known gaps, remediation plans, and target dates&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;The control implementation section is the core of the document and typically the most time-intensive to develop. Each control description should be specific enough that an assessor could verify it. Stating that MFA is used is insufficient. Describing that MFA is enforced for all user accounts accessing the production environment via a specific identity provider, configured to require a hardware token or authenticator application as a second factor, gives the assessor something to test.&lt;/p&gt; 
&lt;h3&gt;Maintain the SSP as a Living Document&lt;/h3&gt; 
&lt;p&gt;The SSP loses its value the moment it stops reflecting reality. Build SSP updates into existing change management processes. When a system component changes, when a new application enters the boundary, when a control implementation changes, the SSP should be updated as part of the change, not retroactively before the next assessment.&lt;/p&gt; 
&lt;p&gt;Assign SSP ownership to a specific role and define a review cadence, quarterly at minimum, to catch any drift between documentation and implementation.&lt;/p&gt;  
&lt;div style="background-color: #333333; border-radius: 12px; padding: 40px 32px; margin: 40px 0; background-image: url('https://truvocyber.com/hubfs/Frame%201686556595%20%281%29.png'); background-size: 60% auto; background-position: left 70%; background-repeat: no-repeat; display: flex; align-items: center; gap: 32px; flex-wrap: wrap;"&gt; 
 &lt;div style="flex: 1; min-width: 250px;"&gt; 
  &lt;h3 style="color: #ffffff; margin: 0 0 12px 0; font-size: 1.4em; font-weight: 700;"&gt;Building Your CPCSC Security Program?&lt;/h3&gt; 
  &lt;p style="color: #ffffff; margin: 0; font-size: 0.95em;"&gt;We build effective security programs that produce CPCSC compliance as a byproduct of doing security well.&lt;/p&gt; 
 &lt;/div&gt; 
 &lt;div style="flex-shrink: 0;"&gt; 
  &lt;a href="https://truvo.ca/contact-us" style="display: inline-block !important; width: auto !important; background-color: #009FDA !important; color: #ffffff !important; padding: 14px 32px !important; border-radius: 999px !important; text-decoration: none !important; font-weight: bold; font-size: 1em; white-space: nowrap;"&gt;Book Your Strategy Call&lt;/a&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Frequently Asked Questions&lt;/h2&gt; 
&lt;h3&gt;How often should risk assessments be conducted under ITSP.10.171?&lt;/h3&gt; 
&lt;p&gt;ITSP.10.171 requires risk assessments at an organization-defined frequency and whenever significant changes occur to systems or the operating environment. Annual assessments are the typical baseline, supplemented by event-driven assessments when new systems are deployed, significant vulnerabilities are discovered, or the threat landscape shifts materially. The defined frequency and triggering events should be documented in organizational policy.&lt;/p&gt; 
&lt;h3&gt;What is the difference between the SSP and the POA&amp;amp;M?&lt;/h3&gt; 
&lt;p&gt;The system security plan describes the security controls that are implemented and how they satisfy ITSP.10.171 requirements. The plan of action and milestones (POA&amp;amp;M) documents known gaps where controls are not yet fully implemented, along with specific remediation plans and target dates. Together, the SSP shows what is in place and the POA&amp;amp;M shows what still needs to be done. Both are expected artifacts in a Level 2 assessment.&lt;/p&gt; 
&lt;h3&gt;Can we reuse our SOC 2 risk assessment for CPCSC compliance?&lt;/h3&gt; 
&lt;p&gt;The process and methodology can often be reused. If the organization has a mature risk assessment framework under SOC 2, the same approach, likelihood and impact criteria, risk register structure, and treatment process, can serve as the foundation for the ITSP.10.171 risk assessment. The scope must be adjusted to ensure it covers all systems handling controlled government information, which may extend beyond the existing SOC 2 boundary. The risk assessment output should also map identified risks to ITSP.10.171 controls rather than SOC 2 Trust Services Criteria.&lt;/p&gt; 
&lt;h3&gt;What level of detail does the SSP require for each control?&lt;/h3&gt; 
&lt;p&gt;Each control description should be specific enough that a third-party assessor could verify the implementation without additional explanation. This means naming the tools, processes, frequencies, and responsible roles involved. Vague descriptions will prompt the assessor to request clarification or issue findings. The standard does not prescribe a specific format or length, but practical experience suggests that each control requires a paragraph-level description covering the implementation mechanism, cadence, ownership, and any relevant configuration details.&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;This post is part of our &lt;a href="https://truvo.ca/blog/cpcsc-canadian-cyber-security-certification-guide" style="display: inline;"&gt;CPCSC series&lt;/a&gt;. For guidance on building an effective security program that satisfies ITSP.10.171 requirements, &lt;a href="https://truvo.ca/contact-us" style="display: inline;"&gt;reach out to our team&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;   
&lt;img src="https://track-na3.hubspot.com/__ptq.gif?a=341945322&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ftruvocyber.com%2Fblog%2Fcpcsc-risk-assessment-security-planning&amp;amp;bu=https%253A%252F%252Ftruvocyber.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>CMMC</category>
      <category>CMMC 2.0</category>
      <category>CPCSC</category>
      <category>ITSP.10.171</category>
      <pubDate>Sat, 04 Apr 2026 01:37:37 GMT</pubDate>
      <author>ali@truvo.ca (Ali Aleali)</author>
      <guid>https://truvocyber.com/blog/cpcsc-risk-assessment-security-planning</guid>
      <dc:date>2026-04-04T01:37:37Z</dc:date>
    </item>
    <item>
      <title>From SOC 2 to CPCSC: Extending Your Security Program for Defence Contracts</title>
      <link>https://truvocyber.com/blog/soc2-to-cpcsc-mapping-guide</link>
      <description>&lt;p&gt;The question comes up consistently when companies with established security programs look at entering the Canadian defence supply chain: Do we need to build a completely new security program for &lt;a href="https://truvo.ca/blog/cpcsc-canadian-cyber-security-certification-guide" style="display:inline"&gt;CPCSC&lt;/a&gt;?&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;The question comes up consistently when companies with established security programs look at entering the Canadian defence supply chain: Do we need to build a completely new security program for &lt;a href="https://truvo.ca/blog/cpcsc-canadian-cyber-security-certification-guide" style="display:inline"&gt;CPCSC&lt;/a&gt;?&lt;/p&gt;  
&lt;p&gt;The short answer is no. A SOC 2 Type II certification means an organization has already invested in designing, implementing, and evidencing a security program across the &lt;a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/aaborelatedtosoc2engagements" style="display:inline"&gt;Trust Services Criteria&lt;/a&gt;. That investment translates directly into a meaningful portion of what &lt;a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171" style="display:inline"&gt;ITSP.10.171&lt;/a&gt; requires. The overlap is structural, not coincidental, because both frameworks draw from common security principles and, in several areas, from the same NIST lineage that underpins &lt;a href="https://csrc.nist.gov/pubs/sp/800/171/r3/final" style="display:inline"&gt;NIST SP 800-171&lt;/a&gt;.&lt;/p&gt; 
&lt;div style="background-color: #F0F7FA; border-left: 4px solid #009FDA; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;Key Takeaway&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;Overlap is not equivalence. SOC 2 was designed for service organizations demonstrating trust to commercial customers. CPCSC was designed for organizations handling controlled information in the Canadian defence supply chain. The intent, the scope, and several specific control families diverge in ways that matter.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;The goal is to identify exactly where the existing program carries forward, where it needs deepening, and where entirely new controls are required. This is the approach that produces the best outcomes: treat the existing security program as a foundation, identify what CPCSC adds to the requirements, and extend rather than rebuild. Organizations that take this path consistently reach certification faster and with a program they actually understand and can operate, rather than ending up with a second set of policies that exist independently from the controls they already run.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;The Overlap Map: SOC 2 TSC to ITSP.10.171&lt;/h2&gt; 
&lt;p&gt;The following table maps the SOC 2 Common Criteria to the relevant &lt;a href="https://truvo.ca/blog/itsp-10171-explained-cpcsc-standard" style="display:inline"&gt;ITSP.10.171 control families&lt;/a&gt;. The overlap column reflects how directly the SOC 2 criteria translate to CPCSC requirements when a real, operational program backs them, not just policy documents with a company name swapped in.&lt;/p&gt; 
&lt;table style="width: 100%; border-collapse: collapse; margin: 24px 0;"&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;SOC 2 Common Criteria&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;ITSP.10.171 Families&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Overlap Level&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Notes&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC6: Logical and Physical Access Controls&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-access-control-identity-management" style="display:inline"&gt;Access Control (AC)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-access-control-identity-management" style="display:inline"&gt;Identification &amp;amp; Authentication (IA)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-physical-security-personnel-controls" style="display:inline"&gt;Physical Protection (PE)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Strong&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Strongest overlap area. MFA, RBAC, session controls, physical access all carry forward.&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC7: System Operations&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-audit-logging-monitoring-accountability" style="display:inline"&gt;Audit &amp;amp; Accountability (AU)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-incident-response-system-integrity" style="display:inline"&gt;Incident Response (IR)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-incident-response-system-integrity" style="display:inline"&gt;System &amp;amp; Information Integrity (SI)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Strong&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Monitoring, logging, incident handling, vulnerability management. High direct transferability.&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC8: Change Management&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-configuration-management-maintenance" style="display:inline"&gt;Configuration Management (CM)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-configuration-management-maintenance" style="display:inline"&gt;Maintenance (MA)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Moderate&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Change control processes carry over. Baseline configuration and least functionality requirements require deepening.&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC3: Risk Assessment&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-risk-assessment-security-planning" style="display:inline"&gt;Risk Assessment (RA)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Strong&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Risk identification and response methodologies translate well. Vulnerability scanning cadence may need adjustment.&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC1: Control Environment&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-risk-assessment-security-planning" style="display:inline"&gt;Planning (PL)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-security-awareness-training-governance" style="display:inline"&gt;Awareness &amp;amp; Training (AT)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Moderate&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Governance structure carries over. System Security Plan (SSP) requirements add significant documentation depth.&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC2: Communication and Information&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-security-awareness-training-governance" style="display:inline"&gt;Awareness &amp;amp; Training (AT)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Moderate&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Security awareness and communication concepts translate. Role-based training specificity increases.&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;CC9: Risk Mitigation&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-supply-chain-risk-management" style="display:inline"&gt;Supply Chain Risk Management (SR)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-supply-chain-risk-management" style="display:inline"&gt;System &amp;amp; Services Acquisition (SA)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Low&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;SOC 2 vendor management is a starting point, but CPCSC supply chain requirements go substantially further.&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Not explicitly covered&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;a href="https://truvo.ca/blog/cpcsc-media-communications-security" style="display:inline"&gt;Media Protection (MP)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-physical-security-personnel-controls" style="display:inline"&gt;Personnel Security (PS)&lt;/a&gt;, &lt;a href="https://truvo.ca/blog/cpcsc-media-communications-security" style="display:inline"&gt;System &amp;amp; Communications Protection (SC)&lt;/a&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Gap&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;These families require new controls that SOC 2 programs typically do not address at the required depth.&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;The pattern that emerges: a meaningful portion of what ITSP.10.171 requires has a direct analog in a well-operated SOC 2 program, while the remainder ranges from controls that need deepening (moderate overlap) to entirely new control families (gaps). The overlap is strongest in the families expected at &lt;a href="https://truvo.ca/blog/cpcsc-level-1-self-assessment-guide" style="display:inline"&gt;Level 1&lt;/a&gt; (AC, IA, PE, SC, SI, MP), where SOC 2 CC6 and CC7 provide a solid foundation.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Where SOC 2 Gives You a Head Start&lt;/h2&gt; 
&lt;h3&gt;Access Control and Identity (CC6 to AC, IA, PE)&lt;/h3&gt; 
&lt;p&gt;This is the strongest overlap area. SOC 2 CC6 requires logical access controls, authentication mechanisms, physical access restrictions, and regular access reviews. Organizations with a mature SOC 2 program will already have RBAC, MFA on privileged and remote access, documented access provisioning and deprovisioning procedures, and periodic access reviews.&lt;/p&gt; 
&lt;p&gt;The ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-access-control-identity-management" style="display:inline"&gt;Access Control&lt;/a&gt; and Identification &amp;amp; Authentication families require the same foundational capabilities. The adjustment is typically in documentation depth, specifically around information flow enforcement and session management specifics, rather than in building new technical controls.&lt;/p&gt; 
&lt;div style="background-color: #F0F7FA; border-left: 4px solid #009FDA; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;Strongest Overlap&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;Access control is where SOC 2 certified organizations save the most time. MFA, RBAC, session controls, and physical access restrictions carry forward with minimal adjustment. The work is typically in documentation depth, not new technical controls.&lt;/p&gt; 
&lt;/div&gt; 
&lt;h3&gt;Monitoring, Logging, and Incident Response (CC7 to AU, IR, SI)&lt;/h3&gt; 
&lt;p&gt;SOC 2 CC7 addresses system monitoring, anomaly detection, and incident management. Organizations maintaining SOC 2 Type II typically have centralized logging, defined incident response procedures, vulnerability management programs, and evidence of operational execution.&lt;/p&gt; 
&lt;p&gt;The ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-audit-logging-monitoring-accountability" style="display:inline"&gt;Audit and Accountability&lt;/a&gt; and &lt;a href="https://truvo.ca/blog/cpcsc-incident-response-system-integrity" style="display:inline"&gt;Incident Response&lt;/a&gt; families expect similar capabilities. The deepening required tends to be around audit record content (what specifically gets logged), audit review frequency, and incident reporting timelines specific to defence contracts.&lt;/p&gt; 
&lt;h3&gt;Change Management (CC8 to CM, MA)&lt;/h3&gt; 
&lt;p&gt;SOC 2 CC8 requires documented change management processes with approvals, testing, and rollback procedures. The ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-configuration-management-maintenance" style="display:inline"&gt;Configuration Management&lt;/a&gt; family requires formal configuration baselines, least functionality enforcement, and controlled maintenance.&lt;/p&gt; 
&lt;p&gt;The overlap here is moderate rather than strong. SOC 2 change management tends to focus on the process of approving and deploying changes. ITSP.10.171 adds requirements for documenting baseline configurations, restricting unnecessary services and ports, and maintaining a system component inventory that goes beyond what a typical SOC 2 program tracks.&lt;/p&gt; 
&lt;h3&gt;Risk Assessment (CC3 to RA)&lt;/h3&gt; 
&lt;p&gt;SOC 2 CC3 requires a risk assessment process that identifies threats and vulnerabilities, assesses likelihood and impact, and produces a risk response. The ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-risk-assessment-security-planning" style="display:inline"&gt;Risk Assessment&lt;/a&gt; family expects the same, with additional emphasis on vulnerability scanning at defined intervals and risk response documentation.&lt;/p&gt; 
&lt;p&gt;Organizations with a mature SOC 2 risk assessment methodology can typically extend it to cover the CPCSC scope without fundamental redesign. The key addition is ensuring the risk assessment explicitly addresses the defence supply chain context and the specific information types in scope.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;The Gap Areas: What SOC 2 Does Not Cover&lt;/h2&gt; 
&lt;p&gt;The critical gaps are not areas where SOC 2 is weak. They are areas where SOC 2 was simply not designed to go. These control families exist in ITSP.10.171 because defence supply chain security has requirements that commercial SaaS trust frameworks do not address.&lt;/p&gt; 
&lt;div style="background-color: #fff0f3; border-left: 4px solid #ff1054; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;Critical Gaps&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;Supply chain risk management, personnel security, media protection, and communications protection require entirely new controls. These are not weaknesses in SOC 2. They are areas SOC 2 was never designed to address because defence supply chain security has requirements that commercial trust frameworks do not cover.&lt;/p&gt; 
&lt;/div&gt; 
&lt;h3&gt;Supply Chain Risk Management (SR) and Acquisition Controls (SA)&lt;/h3&gt; 
&lt;p&gt;SOC 2 CC9 includes vendor risk management, but at a level designed for commercial service organizations evaluating their SaaS dependencies. The ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-supply-chain-risk-management" style="display:inline"&gt;Supply Chain Risk Management&lt;/a&gt; family requires a formal supply chain risk management plan, supplier assessments that address the flow of controlled information through the supply chain, and controls over externally provided system components and services.&lt;/p&gt; 
&lt;p&gt;For primes managing subcontractors, this extends to ensuring that downstream suppliers meet equivalent protection standards. This is an entirely new discipline for organizations coming from a commercial SOC 2 context.&lt;/p&gt; 
&lt;h3&gt;Personnel Security (PS)&lt;/h3&gt; 
&lt;p&gt;SOC 2 addresses personnel-related controls primarily through the control environment (CC1), covering background checks, onboarding, and role assignments. ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-physical-security-personnel-controls" style="display:inline"&gt;Personnel Security&lt;/a&gt; requires personnel screening at a depth that reflects defence supply chain requirements, including controls over personnel termination and transfer that go beyond standard commercial offboarding procedures.&lt;/p&gt; 
&lt;p&gt;Organizations accustomed to standard commercial background checks will need to assess whether their screening processes satisfy the ITSP.10.171 assessment objectives, particularly for personnel with access to specified information.&lt;/p&gt; 
&lt;h3&gt;Media Protection (MP)&lt;/h3&gt; 
&lt;p&gt;SOC 2 does not have a dedicated media protection criteria. ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-media-communications-security" style="display:inline"&gt;Media Protection&lt;/a&gt; requires controls over media storage, transport, sanitization, and handling of system media containing controlled information. This includes procedures for marking media, limiting access to media based on information classification, and sanitization methods that meet defined standards before disposal or reuse.&lt;/p&gt; 
&lt;p&gt;For organizations that operate entirely in the cloud and rarely handle physical media, this still matters. The control family extends to digital media and requires documented procedures for how information is stored, transmitted, and destroyed across all media types.&lt;/p&gt; 
&lt;h3&gt;System and Communications Protection (SC)&lt;/h3&gt; 
&lt;p&gt;While SOC 2 CC6 covers encryption in transit and at rest, the ITSP.10.171 &lt;a href="https://truvo.ca/blog/cpcsc-media-communications-security" style="display:inline"&gt;System and Communications Protection&lt;/a&gt; family requires cryptographic protection that meets specific validation standards, boundary protection between network segments, and controls over collaborative computing devices and public-access systems. The cryptographic validation depth required, particularly around FIPS-validated modules for specified information, goes beyond standard commercial encryption practices.&lt;/p&gt; 
&lt;h3&gt;System Security Plan (PL)&lt;/h3&gt; 
&lt;p&gt;SOC 2 does not require a System Security Plan in the structured format that ITSP.10.171 expects. The &lt;a href="https://truvo.ca/blog/cpcsc-risk-assessment-security-planning" style="display:inline"&gt;Planning&lt;/a&gt; family requires a documented SSP that describes the system boundary, the authorization to operate, interconnections with other systems, and the implementation status of every applicable control. This is a significant documentation effort even for organizations with well-documented SOC 2 programs, because the SSP format and content expectations are specific to the defence certification context.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;How to Extend Rather Than Rebuild&lt;/h2&gt; 
&lt;p&gt;The organizations that extend efficiently share a common characteristic: they have a real, operational security program behind their SOC 2 certificate, not a set of policy templates with their company name swapped in.&lt;/p&gt; 
&lt;p&gt;The distinction matters because extending a program requires understanding what actually runs, how evidence is produced, and where controls operate versus where they are documented but not enforced. When an organization has policies that were written to pass an audit but do not reflect actual operations, the extension exercise quickly becomes a rebuild exercise, because there is no real foundation to build on.&lt;/p&gt; 
&lt;div style="background-color: #F0F7FA; border-left: 4px solid #009FDA; padding: 20px 24px; margin: 32px 0; border-radius: 0 8px 8px 0;"&gt; 
 &lt;p style="margin: 0 0 8px 0;"&gt;&lt;strong&gt;Extend, Do Not Rebuild&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;For organizations with an operational program, the extension methodology is straightforward: scope the delta, prioritize gaps, build the evidence layer, write the SSP, and validate through self-assessment.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;For organizations with an operational program, the extension methodology is straightforward:&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Step 1: Scope the delta.&lt;/strong&gt; Map current SOC 2 controls to ITSP.10.171 requirements at the assessment objective level. The table above provides the family-level mapping, but the actual work happens at the individual control and assessment objective level. This produces a clear picture of what carries forward, what needs deepening, and what is entirely new.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Step 2: Prioritize the gaps.&lt;/strong&gt; Not all gaps carry equal weight. Start with the control families that are entirely new (SR, PS, MP, SC depth, PL) rather than deepening existing controls. New control families require design, implementation, and evidence cycles. Deepening existing controls typically requires documentation and process adjustments.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Step 3: Build the evidence layer.&lt;/strong&gt; This is where organizations with strong security architecture sometimes stumble. Teams that built excellent technical controls but never documented the reasoning or produced evidence of ongoing operation face a specific challenge: the controls work, but the evidence layer that an assessor needs does not exist. Building the evidence layer for existing controls is faster than building new controls, but it is real work that should not be underestimated.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Step 4: Write the SSP.&lt;/strong&gt; The System Security Plan is the single largest documentation deliverable for CPCSC that SOC 2 programs do not produce. It documents the complete system boundary, authorization, interconnections, and control implementation status. Starting this early, even as a living draft that evolves as controls are implemented, prevents a documentation crunch before self-assessment submission.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Step 5: Validate through self-assessment.&lt;/strong&gt; For &lt;a href="https://truvo.ca/blog/cpcsc-level-1-self-assessment-guide" style="display:inline"&gt;CPCSC Level 1&lt;/a&gt;, the self-assessment against the applicable controls is where the entire program comes together. Organizations that extended from SOC 2 should validate that the evidence produced for the new and deepened controls meets the ITSP.10.171 assessment objectives, not just the SOC 2 criteria they were originally designed for.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;Implementation Timeline for SOC 2 Certified Companies&lt;/h2&gt; 
&lt;p&gt;Timeline estimates assume an organization with a current SOC 2 Type II report and an operational security program behind it. Organizations with a Type I report or a program that exists primarily on paper should add 4-8 weeks.&lt;/p&gt; 
&lt;table style="width: 100%; border-collapse: collapse; margin: 24px 0;"&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Phase&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Duration&lt;/td&gt; 
   &lt;td style="background-color: #333333 !important; color: #ffffff !important; font-weight: bold; border: 1px solid #333333; padding: 12px 16px;"&gt;Focus&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Gap analysis and scoping&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;2-3 weeks&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Map existing controls to ITSP.10.171, identify delta, define CPCSC scope boundary&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Gap remediation: new control families&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;6-8 weeks&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Supply chain risk management, personnel security, media protection, cryptographic validation&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Gap remediation: control deepening&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;3-4 weeks&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Configuration baselines, audit record specifics, session management documentation&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;SSP development&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;3-4 weeks (overlaps with remediation)&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;System boundary, interconnections, control implementation status&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Evidence collection and validation&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;2-3 weeks&lt;/td&gt; 
   &lt;td style="background-color: #F0F7FA; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Collect evidence for all new and deepened controls, validate against assessment objectives&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Self-assessment and submission&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;1-2 weeks&lt;/td&gt; 
   &lt;td style="background-color: #ffffff; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Complete &lt;a href="https://truvo.ca/blog/cpcsc-level-1-self-assessment-guide" style="display:inline"&gt;Level 1 self-assessment&lt;/a&gt;, attest via Canada Buys&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Total estimated timeline&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;&lt;strong&gt;Estimated 12-16 weeks&lt;/strong&gt;&lt;/td&gt; 
   &lt;td style="background-color: #ffffff !important; padding: 12px 16px; border: 1px solid #d0e3eb;"&gt;Compared to an estimated 20-30 weeks for organizations starting without an existing program (timelines vary based on scope and team capacity)&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;The 12-16 week estimate assumes dedicated resources. Organizations relying on existing team members who are also running the SOC 2 program, building product, and managing infrastructure should expect the longer end of the range. This is the bandwidth problem that a &lt;a href="https://truvo.ca/services/cpcsc-compliance" style="display:inline"&gt;fractional security team&lt;/a&gt; is designed to solve: bringing the CPCSC-specific expertise and capacity without requiring the organization to hire a full-time compliance team for a finite implementation project.&lt;/p&gt; 
&lt;div style="background-color: #333333; border-radius: 12px; padding: 40px 32px; margin: 40px 0; background-image: url('https://truvocyber.com/hubfs/Frame%201686556595%20%281%29.png'); background-size: 60% auto; background-position: left 70%; background-repeat: no-repeat; display: flex; align-items: center; gap: 32px; flex-wrap: wrap;"&gt; 
 &lt;div style="flex: 1; min-width: 250px;"&gt; 
  &lt;h3 style="color: #ffffff; margin: 0 0 12px 0; font-size: 1.4em; font-weight: 700;"&gt;Extend Your SOC 2 Program for Defence Contracts&lt;/h3&gt; 
  &lt;p style="color: #ffffff; margin: 0; font-size: 0.95em;"&gt;We build effective security programs and map frameworks onto them. Start with a gap analysis against ITSP.10.171 to quantify the delta.&lt;/p&gt; 
 &lt;/div&gt; 
 &lt;div style="flex-shrink: 0;"&gt; 
  &lt;a href="https://truvo.ca/contact-us" style="display: inline-block !important; width: auto !important; background-color: #009FDA !important; color: #ffffff !important; padding: 14px 32px !important; border-radius: 999px !important; text-decoration: none !important; font-weight: bold; font-size: 1em; white-space: nowrap;"&gt;Book Your Strategy Call&lt;/a&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;h2&gt;FAQ&lt;/h2&gt; 
&lt;h4&gt;Does a SOC 2 Type II report satisfy any CPCSC requirements directly?&lt;/h4&gt; 
&lt;p&gt;No. CPCSC does not recognize SOC 2 as a reciprocal certification. There is no &lt;a href="https://truvo.ca/blog/cpcsc-vs-cmmc-comparison" style="display:inline"&gt;mutual recognition arrangement&lt;/a&gt; between the two frameworks. However, the controls, processes, and evidence that an organization maintains for SOC 2 translate directly into satisfying many ITSP.10.171 requirements. The work carries over, even though the certificate does not.&lt;/p&gt; 
&lt;h4&gt;What is the biggest gap area for SOC 2 certified companies entering CPCSC?&lt;/h4&gt; 
&lt;p&gt;The System Security Plan (SSP) is typically the single largest new deliverable. SOC 2 programs produce a system description, but the SSP required by ITSP.10.171 is a different document in structure, depth, and purpose. Beyond the SSP, supply chain risk management is the most operationally significant gap, because it requires new processes, new supplier engagement, and new evidence that most commercial programs have not built.&lt;/p&gt; 
&lt;h4&gt;Can we maintain both SOC 2 and CPCSC with a single security program?&lt;/h4&gt; 
&lt;p&gt;Yes, and this is the recommended approach. Organizations that build a single, effective security program and map multiple frameworks onto it operate more efficiently than organizations that maintain parallel programs for each certification. The overlap between SOC 2 and CPCSC is substantial enough that a unified program with framework-specific evidence mappings is both feasible and significantly less expensive to operate than two independent programs.&lt;/p&gt; 
&lt;h4&gt;Should we pause SOC 2 to focus on CPCSC?&lt;/h4&gt; 
&lt;p&gt;In most cases, no. SOC 2 certification serves the commercial side of the business, and CPCSC serves the defence supply chain side. The operational controls are largely the same. The extension approach described in this guide is designed specifically to avoid the false choice between frameworks. The incremental effort to add CPCSC on top of a running SOC 2 program is materially less than building either program from scratch.&lt;/p&gt; 
&lt;div style="margin: 32px 0; border-top: 1px solid #d0e3eb;"&gt;
 &amp;nbsp;
&lt;/div&gt; 
&lt;p&gt;Extending a SOC 2 program for CPCSC is a scoping exercise, a gap remediation project, and a documentation effort. It is not a program redesign. Organizations that approach it this way reach certification faster, with a program that makes operational sense because it was built on controls they were already running.&lt;/p&gt; 
&lt;p&gt;The alternative, treating CPCSC as a separate compliance initiative disconnected from the existing program, produces exactly the kind of paper compliance that fails at the first real test. Whether that test is a Level 2 assessment, a supply chain security incident, or a prime contractor's due diligence questionnaire, the organizations with a unified, operational program are the ones that pass.&lt;/p&gt; 
&lt;p&gt;If your organization has a SOC 2 program and is evaluating defence supply chain opportunities, &lt;a href="https://truvo.ca/contact-us" style="display:inline"&gt;a gap analysis against ITSP.10.171&lt;/a&gt; is the practical first step. It quantifies the delta, prioritizes the work, and produces a realistic timeline for certification.&lt;/p&gt;   
&lt;img src="https://track-na3.hubspot.com/__ptq.gif?a=341945322&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ftruvocyber.com%2Fblog%2Fsoc2-to-cpcsc-mapping-guide&amp;amp;bu=https%253A%252F%252Ftruvocyber.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>CMMC</category>
      <category>CMMC 2.0</category>
      <category>CPCSC</category>
      <category>ITSP.10.171</category>
      <pubDate>Sat, 04 Apr 2026 01:36:42 GMT</pubDate>
      <author>ali@truvo.ca (Ali Aleali)</author>
      <guid>https://truvocyber.com/blog/soc2-to-cpcsc-mapping-guide</guid>
      <dc:date>2026-04-04T01:36:42Z</dc:date>
    </item>
  </channel>
</rss>
