Compliance Briefing — January 1, 2024
OSFI Guideline B-13 now governs Canadian FRFIs, demanding board-led technology risk governance, resilience testing, and third-party oversight backed by auditable controls.
Canada’s Office of the Superintendent of Financial Institutions (OSFI) brought Guideline B-13 on Technology and Cyber Risk Management into force on 1 January 2024, concluding a multi-year consultation that sets detailed expectations for federally regulated financial institutions (FRFIs). The guideline codifies a risk-based, principles-driven regime spanning governance, cyber resilience, technology operations, third-party management, and incident response. Boards and executives must now demonstrate that they can anticipate, withstand, recover from, and adapt to technology disruptions across increasingly complex ecosystems. Compliance leaders face a significant implementation lift: harmonising B-13’s expectations with OSFI’s broader prudential framework, translating qualitative principles into control testing plans, and coordinating with critical service providers that underpin Canadian banking, insurance, and pension operations.
Establishing governance, accountability, and risk appetite
Guideline B-13 positions governance as the foundation for technology and cyber resilience. FRFIs need board-approved strategies that explain how technology enables business objectives, describe the associated risks, and articulate risk appetite statements that are specific, measurable, and aligned with capital and liquidity planning. Boards must review management information packages that cover threat trends, resilience metrics, capital at risk, and the status of remediation initiatives. They should update committee mandates—particularly risk, audit, and technology committees—to capture B-13 oversight responsibilities and ensure directors receive ongoing education about emerging technologies, geopolitical cyber threats, and sector-wide interdependencies.
Management should embed accountability throughout the three lines of defence. The first line owns the design and operation of technology services, the second line challenges risk decisions and monitors compliance with B-13 expectations, and the third line provides independent assurance. Organisations should designate executive owners for each B-13 domain—such as chief information security officers for cyber controls, chief technology officers for system resilience, and chief procurement officers for third-party risk. Accountability matrices must demonstrate how responsibilities flow through business lines, shared service centres, and subsidiaries, highlighting escalation triggers and cross-border coordination for FRFIs with international footprints.
Building comprehensive technology and cyber risk management programs
OSFI expects FRFIs to maintain integrated technology and cyber risk management programs that cover identification, assessment, mitigation, and monitoring. Implementation teams should first catalogue all technology assets, services, data flows, and dependencies, creating an enterprise architecture inventory that distinguishes between critical and non-critical components. Risk assessments must evaluate inherent and residual risks for each asset, considering factors such as exposure to the internet, sensitivity of data processed, and concentration risk with vendors. These assessments should feed into enterprise risk registers, capital planning, and recovery and resolution strategies.
Controls must address both preventative and detective capabilities. Preventative controls include secure software development lifecycle practices, access management, network segmentation, vulnerability management, and resilience engineering. Detective controls require continuous monitoring, threat intelligence integration, anomaly detection, and logging architectures capable of supporting forensic analysis. FRFIs should align their control frameworks with recognised standards—such as NIST CSF, ISO/IEC 27001, and COBIT—while documenting mappings to B-13 principles to simplify regulatory attestation. Control testing schedules should prioritise high-risk assets and be coordinated across cyber, operational risk, and internal audit teams to avoid duplication and ensure complete coverage.
Operational resilience and business continuity expectations
B-13 expands OSFI’s focus on operational resilience by demanding that FRFIs define tolerances for disruption, not just recovery. Entities must identify their most critical business services—such as payments processing, market trading, claims adjudication, or pension benefit disbursement—and set impact tolerances measured in maximum allowable downtime, transaction failures, or customer detriment. Scenario analysis should test these tolerances against cyber incidents, system failures, supply chain disruptions, and concurrent crises. Exercises should involve business, technology, and third-party participants, with lessons learned feeding into resilience investment plans.
Business continuity and disaster recovery strategies must now integrate cyber resilience. Playbooks should outline failover procedures, clean-room recovery capabilities, and communications plans that span regulators, customers, and market infrastructures. FRFIs are expected to maintain reliable backup and restoration processes, including immutable backups, geographically distributed data centres, and automated restoration testing. They should also ensure that resilience plans cover legacy systems that may not be easily migrated to modern architectures but remain critical for regulatory reporting or customer servicing.
Third-party and supply chain management
OSFI is explicit that FRFIs retain accountability for outsourced services, regardless of contractual arrangements. Compliance teams must categorise third-party relationships based on criticality, document the rationale, and maintain current inventories that include subcontractors and fourth parties. Due diligence should evaluate service providers’ governance frameworks, cyber controls, financial health, and concentration risks. Contracts must contain clauses covering service levels, access and audit rights, notification timelines for incidents, data residency, and exit strategies. FRFIs should also require alignment with Canadian privacy laws and international data transfer rules.
Ongoing monitoring must include periodic control assessments, independent assurance reports (such as SOC 2 Type II), and testing of joint incident response procedures. FRFIs should track key risk indicators for third parties—such as patch timeliness, change success rates, or customer impact metrics—and integrate them into board reporting. Where cloud services are involved, institutions must comply with OSFI’s technology and cyber security incident reporting advisory, ensuring that cloud outages or breaches trigger immediate regulatory notifications. Exit plans should be rehearsed through tabletop exercises, validating the feasibility of transitioning services back in-house or to alternative providers within acceptable timeframes.
Incident response, reporting, and recovery
Guideline B-13 requires FRFIs to maintain incident response programs that encompass preparation, detection, analysis, containment, eradication, and recovery. Response playbooks should define severity tiers, decision-making authorities, regulatory notification requirements, and criteria for invoking business continuity plans. Institutions must integrate B-13 with OSFI’s August 2021 Technology and Cyber Security Incident Reporting Advisory, which mandates reporting of significant incidents within 24 hours. To meet this timeline, FRFIs should automate incident logging, maintain on-call rosters, and pre-authorise communications with law enforcement, sector information-sharing centres, and critical infrastructure partners.
Post-incident reviews are equally important. Organisations should capture root causes, assess control breakdowns, quantify financial and customer impacts, and track remediation commitments to completion. Lessons learned must update risk assessments, inform model adjustments in capital planning, and recalibrate operational risk appetite. FRFIs should document how they share insights with peers through Canadian Cyber Threat Exchange (CCTX) or Financial Services Information Sharing and Analysis Center (FS-ISAC) channels without violating confidentiality obligations.
Integrating compliance, reporting, and assurance
FRFIs must be able to demonstrate Guideline B-13 compliance to OSFI supervisors during regular and ad hoc reviews. Compliance functions should maintain detailed control libraries mapped to each B-13 expectation, supported by policies, standards, and procedure documents. Management information dashboards should display key metrics, including open remediation actions, incident volumes, resilience test results, and third-party risk indicators. Institutions should schedule self-assessments at least annually, using maturity models to benchmark progress and highlight areas requiring investment.
Internal audit should incorporate B-13 into its multi-year audit plan, focusing on governance effectiveness, high-risk technology services, and third-party oversight. Auditors should test both design and operating effectiveness, evaluate cultural drivers of technology risk, and assess whether management responses are timely and sustainable. Findings should feed into OSFI supervisory discussions and be cross-referenced with other regulatory commitments, such as recovery planning or anti-money laundering technology controls.
Roadmap for sustained compliance
Implementation teams should develop a roadmap that sequences foundational governance work, control enhancements, and continuous improvement. Short-term priorities include updating board charters, finalising accountability matrices, refreshing policies, and conducting gap assessments against B-13’s domains. Medium-term actions involve modernising tooling—such as adopting integrated risk management platforms, automating control testing, and implementing security orchestration—to support monitoring at scale. Long-term, FRFIs should pursue resilience innovations, including chaos engineering for critical services, quantum-resistant cryptography pilots, and artificial intelligence-enabled threat detection, while ensuring that change management keeps employees engaged and aware of their responsibilities.
By treating Guideline B-13 as an opportunity to elevate technology governance rather than a compliance checkbox, FRFIs can strengthen trust with regulators, customers, and investors. Demonstrable resilience will become a competitive differentiator as digital banking, open finance, and cross-border ecosystems continue to expand. Institutions that build transparent, well-controlled, and adaptive technology risk programs will be best positioned to navigate future OSFI expectations and align with global supervisory trends.
Continue in the Compliance pillar
Return to the hub for curated research and deep-dive guides.
Latest guides
-
Third-Party Risk Oversight Playbook — Zeph Tech
Operationalize OCC, Federal Reserve, EBA, and MAS outsourcing expectations with lifecycle controls, continuous monitoring, and board reporting.
-
Compliance Operations Control Room — Zeph Tech
Implement cross-border compliance operations that satisfy Sarbanes-Oxley, DOJ guidance, EU DORA, and MAS TRM requirements with verifiable evidence flows.
-
SOX Modernization Control Playbook — Zeph Tech
Modernize Sarbanes-Oxley (SOX) compliance by aligning PCAOB AS 2201, SEC management guidance, and COSO 2013 controls with data-driven testing, automation, and board reporting.




