← Frameworks / OSFI B-13 / Control Mappings

OSFI Guideline B-13 Technology and Cyber Risk Management

Canadian federal prudential guideline for technology and cyber risk management at federally regulated financial institutions. Covers 4 domains: governance and risk management, technology operations and resilience, cyber security (identify/defend/detect/respond), and third-party technology risk including cloud-specific considerations.

AC Access Control

Control Name OSFI B-13 References
AC-01 Access Control Policies and Procedures
B-13.1.3B-13.3.2
AC-02 Account Management
B-13.3.2
AC-03 Access Enforcement
B-13.3.2
AC-04 Information Flow Enforcement
B-13.3.2
AC-05 Separation Of Duties
B-13.1.1B-13.3.2
AC-06 Least Privilege
B-13.3.2
AC-07 Unsuccessful Login Attempts
B-13.3.2
AC-08 System Use Notification
B-13.3.2
AC-09 Previous Logon Notification
B-13.3.2
AC-10 Concurrent Session Control
B-13.3.2
AC-11 Session Lock
B-13.3.2
AC-12 Session Termination
B-13.3.2
AC-13 Supervision And Review -- Access Control
B-13.3.2B-13.3.3
AC-14 Permitted Actions Without Identification Or Authentication
B-13.3.2
AC-15 Automated Marking
B-13.3.2
AC-16 Automated Labeling
B-13.3.2
AC-17 Remote Access
B-13.3.2
AC-18 Wireless Access Restrictions
B-13.3.2
AC-19 Access Control For Portable And Mobile Devices
B-13.3.2
AC-20 Use Of External Information Systems
B-13.3.2B-13.4.1

AT Awareness and Training

Control Name OSFI B-13 References
AT-01 Security Awareness And Training Policy And Procedures
B-13.1.1
AT-02 Security Awareness
B-13.1.1
AT-03 Security Training
B-13.1.1
AT-04 Security Training Records
B-13.1.1
AT-05 Contacts With Security Groups And Associations
B-13.1.1B-13.3.3
AT-06 Training Feedback
B-13.1.1

AU Audit and Accountability

Control Name OSFI B-13 References
AU-01 Audit And Accountability Policy And Procedures
B-13.1.3B-13.3.3
AU-02 Auditable Events
B-13.3.3
AU-03 Content Of Audit Records
B-13.3.3
AU-04 Audit Storage Capacity
B-13.3.3
AU-05 Response To Audit Processing Failures
B-13.3.3
AU-06 Audit Monitoring, Analysis, And Reporting
B-13.3.3
AU-07 Audit Reduction And Report Generation
B-13.3.3
AU-08 Time Stamps
B-13.3.3
AU-09 Protection Of Audit Information
B-13.3.2B-13.3.3
AU-10 Non-Repudiation
B-13.3.3
AU-11 Audit Record Retention
B-13.3.3

CA Security Assessment and Authorization

Control Name OSFI B-13 References
CA-01 Certification, Accreditation, And Security Assessment Policies And Procedures
B-13.1.3
CA-02 Security Assessments
B-13.1.3B-13.3.5
CA-03 Information System Connections
B-13.2.2B-13.3.2
CA-04 Security Certification
B-13.1.3B-13.3.5
CA-05 Plan Of Action And Milestones
B-13.1.3B-13.1.4
CA-06 Security Accreditation
B-13.1.3
CA-07 Continuous Monitoring
B-13.1.3B-13.3.3B-13.4.2
CA-09 Internal System Connections
B-13.4.2

CM Configuration Management

Control Name OSFI B-13 References
CM-01 Configuration Management Policy And Procedures
B-13.2.2B-13.2.3
CM-02 Baseline Configuration
B-13.2.2
CM-03 Configuration Change Control
B-13.2.3
CM-04 Monitoring Configuration Changes
B-13.2.3B-13.3.3
CM-05 Access Restrictions For Change
B-13.2.3B-13.3.2
CM-06 Configuration Settings
B-13.2.2B-13.3.2
CM-07 Least Functionality
B-13.2.2B-13.3.2
CM-08 Information System Component Inventory
B-13.2.1B-13.3.1
CM-12 Information Location
B-13.2.1
CM-13 Data Action Mapping
B-13.2.1
CM-14 Signed Components
B-13.2.2B-13.2.3

CP Contingency Planning

Control Name OSFI B-13 References
CP-01 Contingency Planning Policy And Procedures
B-13.2.6
CP-02 Contingency Plan
B-13.2.6
CP-03 Contingency Training
B-13.2.6
CP-04 Contingency Plan Testing And Exercises
B-13.2.6B-13.3.5
CP-05 Contingency Plan Update
B-13.2.6
CP-06 Alternate Storage Site
B-13.2.6
CP-07 Alternate Processing Site
B-13.2.6
CP-08 Telecommunications Services
B-13.2.6
CP-09 Information System Backup
B-13.2.6
CP-10 Information System Recovery And Reconstitution
B-13.2.6B-13.3.4

IA Identification and Authentication

Control Name OSFI B-13 References
IA-01 Identification And Authentication Policy And Procedures
B-13.1.3B-13.3.2
IA-02 User Identification And Authentication
B-13.3.2
IA-03 Device Identification And Authentication
B-13.3.2
IA-04 Identifier Management
B-13.3.2
IA-05 Authenticator Management
B-13.3.2
IA-06 Authenticator Feedback
B-13.3.2
IA-07 Cryptographic Module Authentication
B-13.3.2

IR Incident Response

Control Name OSFI B-13 References
IR-01 Incident Response Policy And Procedures
B-13.2.5B-13.3.4
IR-02 Incident Response Training
B-13.2.5B-13.3.4
IR-03 Incident Response Testing And Exercises
B-13.2.5B-13.3.4B-13.3.5
IR-04 Incident Handling
B-13.2.5B-13.3.4
IR-05 Incident Monitoring
B-13.2.5B-13.3.3
IR-06 Incident Reporting
B-13.1.4B-13.2.5B-13.3.4
IR-07 Incident Response Assistance
B-13.2.5B-13.3.4
IR-09 Information Spillage Response
B-13.2.5B-13.3.4

MA Maintenance

Control Name OSFI B-13 References
MA-01 System Maintenance Policy And Procedures
B-13.2.3
MA-02 Controlled Maintenance
B-13.2.3
MA-03 Maintenance Tools
B-13.2.3
MA-04 Remote Maintenance
B-13.2.3B-13.3.2
MA-05 Maintenance Personnel
B-13.2.3B-13.4.1
MA-06 Timely Maintenance
B-13.2.3B-13.2.4

MP Media Protection

Control Name OSFI B-13 References
MP-01 Media Protection Policy And Procedures
B-13.3.2
MP-02 Media Access
B-13.3.2
MP-03 Media Labeling
B-13.3.2
MP-04 Media Storage
B-13.3.2
MP-05 Media Transport
B-13.3.2
MP-06 Media Sanitization And Disposal
B-13.3.2

PE Physical and Environmental Protection

Control Name OSFI B-13 References
PE-01 Physical And Environmental Protection Policy And Procedures
B-13.3.2
PE-02 Physical Access Authorizations
B-13.3.2
PE-03 Physical Access Control
B-13.3.2
PE-04 Access Control For Transmission Medium
B-13.3.2
PE-05 Access Control For Display Medium
B-13.3.2
PE-06 Monitoring Physical Access
B-13.3.2B-13.3.3
PE-07 Visitor Control
B-13.3.2
PE-08 Access Records
B-13.3.2B-13.3.3
PE-09 Power Equipment And Power Cabling
B-13.2.6
PE-10 Emergency Shutoff
B-13.2.6
PE-11 Emergency Power
B-13.2.6
PE-12 Emergency Lighting
B-13.2.6
PE-13 Fire Protection
B-13.2.6
PE-14 Temperature And Humidity Controls
B-13.2.6
PE-15 Water Damage Protection
B-13.2.6
PE-16 Delivery And Removal
B-13.2.1
PE-17 Alternate Work Site
B-13.2.6B-13.3.2
PE-18 Location Of Information System Components
B-13.2.6
PE-19 Information Leakage
B-13.3.2

PL Planning

Control Name OSFI B-13 References
PL-01 Security Planning Policy And Procedures
B-13.1.2B-13.1.3
PL-02 System Security Plan
B-13.1.2B-13.1.3
PL-03 System Security Plan Update
B-13.1.2B-13.1.3
PL-04 Rules Of Behavior
B-13.1.1
PL-05 Privacy Impact Assessment
B-13.1.3
PL-06 Security-Related Activity Planning
B-13.1.2
PL-09 Central Management
B-13.1.2B-13.1.3
PL-10 Baseline Selection
B-13.1.2
PL-11 Baseline Tailoring
B-13.1.2

PS Personnel Security

Control Name OSFI B-13 References
PS-01 Personnel Security Policy And Procedures
B-13.1.1
PS-02 Position Categorization
B-13.1.1
PS-03 Personnel Screening
B-13.1.1
PS-04 Personnel Termination
B-13.1.1B-13.3.2
PS-05 Personnel Transfer
B-13.1.1B-13.3.2
PS-06 Access Agreements
B-13.1.1
PS-07 Third-Party Personnel Security
B-13.1.1B-13.4.1
PS-08 Personnel Sanctions
B-13.1.1
PS-09 Position Descriptions
B-13.1.1

PT Personally Identifiable Information Processing and Transparency

Control Name OSFI B-13 References
PT-01 Policy and Procedures
B-13.1.3B-13.3.2
PT-02 Authority to Process Personally Identifiable Information
B-13.1.3
PT-03 Personally Identifiable Information Processing Purposes
B-13.1.3
PT-07 Specific Categories of Personally Identifiable Information
B-13.3.2

RA Risk Assessment

Control Name OSFI B-13 References
RA-01 Risk Assessment Policy And Procedures
B-13.1.3
RA-02 Security Categorization
B-13.1.3B-13.3.1
RA-03 Risk Assessment
B-13.1.3B-13.3.1
RA-04 Risk Assessment Update
B-13.1.3B-13.1.4
RA-05 Vulnerability Scanning
B-13.2.4B-13.3.1
RA-07 Risk Response
B-13.1.3B-13.1.4B-13.2.4B-13.3.1
RA-08 Privacy Impact Assessments
B-13.1.3
RA-09 Criticality Analysis
B-13.1.3B-13.3.1B-13.3.5

SA System and Services Acquisition

Control Name OSFI B-13 References
SA-01 System And Services Acquisition Policy And Procedures
B-13.2.2B-13.2.3
SA-02 Allocation Of Resources
B-13.1.2
SA-03 Life Cycle Support
B-13.2.1B-13.2.2
SA-04 Acquisitions
B-13.2.3B-13.4.1
SA-05 Information System Documentation
B-13.2.2
SA-06 Software Usage Restrictions
B-13.2.2
SA-07 User Installed Software
B-13.2.2B-13.3.2
SA-08 Security Engineering Principles
B-13.2.2B-13.3.2
SA-09 External Information System Services
B-13.4.1B-13.4.2
SA-10 Developer Configuration Management
B-13.2.3B-13.3.2
SA-11 Developer Security Testing
B-13.3.2B-13.3.5
SA-21 Developer Screening
B-13.4.1
SA-23 Specialization
B-13.2.2

SC System and Communications Protection

Control Name OSFI B-13 References
SC-01 System And Communications Protection Policy And Procedures
B-13.1.3B-13.3.2
SC-02 Application Partitioning
B-13.2.2B-13.3.2
SC-03 Security Function Isolation
B-13.2.2B-13.3.2
SC-04 Information Remnance
B-13.3.2
SC-05 Denial Of Service Protection
B-13.2.6B-13.3.2
SC-06 Resource Priority
B-13.2.6
SC-07 Boundary Protection
B-13.3.2
SC-08 Transmission Integrity
B-13.3.2
SC-09 Transmission Confidentiality
B-13.3.2
SC-10 Network Disconnect
B-13.3.2
SC-11 Trusted Path
B-13.3.2
SC-12 Cryptographic Key Establishment And Management
B-13.3.2
SC-13 Use Of Cryptography
B-13.3.2
SC-14 Public Access Protections
B-13.3.2
SC-15 Collaborative Computing
B-13.3.2
SC-16 Transmission Of Security Parameters
B-13.3.2
SC-17 Public Key Infrastructure Certificates
B-13.3.2
SC-18 Mobile Code
B-13.3.2
SC-19 Voice Over Internet Protocol
B-13.3.2
SC-20 Secure Name / Address Resolution Service (Authoritative Source)
B-13.3.2
SC-21 Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
B-13.3.2
SC-22 Architecture And Provisioning For Name / Address Resolution Service
B-13.2.2B-13.3.2
SC-23 Session Authenticity
B-13.3.2
SC-24 Fail in Known State
B-13.2.6
SC-41 Port and I/O Device Access
B-13.3.2
SC-42 Sensor Capability and Data
B-13.3.3
SC-44 Detonation Chambers
B-13.3.2
SC-45 System Time Synchronization
B-13.3.3

SI System and Information Integrity

Control Name OSFI B-13 References
SI-01 System And Information Integrity Policy And Procedures
B-13.1.3B-13.2.4
SI-02 Flaw Remediation
B-13.2.4
SI-03 Malicious Code Protection
B-13.3.2B-13.3.3
SI-04 Information System Monitoring Tools And Techniques
B-13.3.3
SI-05 Security Alerts And Advisories
B-13.2.4B-13.3.3
SI-06 Security Functionality Verification
B-13.3.3B-13.3.5
SI-07 Software And Information Integrity
B-13.3.2B-13.3.3
SI-08 Spam Protection
B-13.3.2B-13.3.3
SI-09 Information Input Restrictions
B-13.3.2
SI-10 Information Accuracy, Completeness, Validity, And Authenticity
B-13.3.2
SI-11 Error Handling
B-13.3.2
SI-12 Information Output Handling And Retention
B-13.3.2
SI-16 Memory Protection
B-13.3.2
SI-17 Fail-safe Procedures
B-13.2.6

SR Supply Chain Risk Management

Control Name OSFI B-13 References
SR-01 Policy and Procedures
B-13.4.1
SR-02 Supply Chain Risk Management Plan
B-13.4.1
SR-03 Supply Chain Controls and Processes
B-13.4.1
SR-04 Provenance
B-13.4.1
SR-05 Acquisition Strategies, Tools, and Methods
B-13.4.1
SR-06 Supplier Assessments and Reviews
B-13.4.1
SR-07 Supply Chain Operations Security
B-13.4.1
SR-08 Notification Agreements
B-13.4.1
SR-09 Tamper Resistance and Detection
B-13.4.1
SR-10 Inspection of Systems or Components
B-13.4.1
SR-11 Component Authenticity
B-13.4.1
SR-12 Component Disposal
B-13.4.1