How to Use This

Click each item you can honestly say is done — not "in progress," not "we've talked about it," not "it's on the roadmap." Done. Documented. Owned by a named person. Your score updates live.

If you're being generous with yourself, you're only hurting yourself. OSFI won't grade on effort.

The Ten-Point E-21 Self-Assessment

0/10
Select items below
1
You have a finalized, board-approved list of critical operations.

Not a draft. Not a working document someone started in Q4. A list of operations that, if disrupted, would threaten your institution's viability or harm the broader financial system — reviewed, challenged, and approved by senior management. Each one has a named owner with authority, not just accountability. The rationale for what made the list, and what didn't, is documented.

If you're still debating what counts as "critical," you're significantly behind.
2
Each critical operation has end-to-end dependency mapping.

E-21 requires "holistic, end-to-end mapping" — internal systems, third-party providers, technology infrastructure, people, and the interconnections between all of them. If your mapping stops at "we use vendor X for payments," you've named the dependency without mapping it. What does vendor X depend on? What's the chain underneath?

Partial credit if mapping is complete for your top 2-3 operations. No credit if it's in spreadsheets that haven't been validated.
3
Disruption tolerances are set — and they're not just recycled RTOs.

A disruption tolerance is the maximum level of disruption you can absorb while still delivering the critical operation. It's primarily time-based but should include complementary metrics: transaction volume, geographic scope, customer segments affected. If you took your old RTOs, relabeled them "disruption tolerances," and moved on — that doesn't meet the standard. The UK's FCA flagged firms specifically for this.

If your tolerance document doesn't include rationale for why each number was chosen, it will not withstand scrutiny.
4
Your operational risk appetite is defined, documented, and monitored.

E-21 requires an explicit operational risk appetite statement integrated into your enterprise risk framework. This isn't aspirational language — it's specific limits and thresholds: how much operational loss is acceptable, what risk concentrations are tolerable, what categories of risk require escalation. Key risk indicators should be in place and regularly reported to senior management.

This should have been done by September 2025 per E-21's immediate adherence requirements.
5
You have a governance structure with clear accountability for operational resilience.

A cross-discipline committee — not just risk, but IT, business continuity, operations, and business lines — with a clear mandate, regular meeting cadence, and escalation paths to the board. Someone senior owns operational resilience as a program, not as a side project. Independent risk and compliance functions provide oversight. Internal audit has a role.

If this is in place and functioning, give yourself the point. If the committee exists but hasn't met since it was formed, that's a zero.
6
Third-party dependencies are mapped and assessed for each critical operation.

E-21 works alongside Guideline B-10 (Third-Party Risk Management) for a reason. If your critical payment service depends on a single telecom carrier, and that carrier goes down, your operation goes down — Canada learned this the hard way in 2022. Third-party mapping must go beyond tier-one vendors. What do your critical third parties depend on? Where are the concentration risks?

If your third-party risk assessment is a questionnaire and not a dependency chain analysis, you have a gap.
7
Your scenario testing methodology is documented and ready to execute.

Full scenario testing isn't due until September 2027, but the methodology must be in place by September 2026. That means: what scenarios you'll test, what "severe but plausible" means for your institution, how you'll assess whether you stayed within disruption tolerances, and how results feed back into remediation. If you've run at least one pilot test against a critical operation, you're ahead.

The methodology is due by September. Running actual tests is 2027. But institutions with no methodology drafted are in trouble.
8
Business continuity plans reflect your current infrastructure — not last year's.

E-21 doesn't accept BCP documents that were accurate when they were written and have drifted since. If your infrastructure has changed — new services, new vendors, cloud migrations, architecture updates — and the BCP hasn't been updated to reflect those changes, you have a documentation gap that creates false confidence. Static plans are a liability, not a compliance artifact.

When was your BCP last updated? If the answer involves checking, that's your answer.
9
Change management processes include operational resilience impact assessment.

When a significant change happens — new system deployment, vendor migration, architecture modification — does the process include an assessment of impact on critical operations and their dependency maps? E-21 requires change management activities to cover significant changes, with the expectation that resilience considerations are embedded in the process, not bolted on after.

If your change management gate already includes resilience signoff, give yourself the point. Most institutions don't have this yet.
10
You have a crisis management plan that's been tested in the last 12 months.

Crisis management is a required supporting discipline under E-21. It's not enough to have a plan — it needs to have been exercised. Does your team know who makes the call, who communicates externally, how critical operations are prioritized during a real disruption? If your crisis management plan was last tested before E-21 was published, it predates the requirements it's supposed to meet.

A tabletop exercise counts. A plan sitting in a drawer does not.

Your Result

Select items above to see your score

8 – 10
On track
5 – 7
Behind but recoverable
0 – 4
Significant gap

One More Thing

This self-assessment covers the ten most visible requirements. It doesn't cover data risk management, technology and cyber risk alignment with B-13, or the depth of your operational resilience modeling capability. Those matter too. But if you can't score well on these ten, the deeper requirements aren't where your attention should be right now.

September 1 is the date when OSFI expects your program to be operational. Not perfect. Not complete in every detail. But operational — meaning the structures exist, the critical operations are identified and mapped, the tolerances are set and defensible, and the testing methodology is ready to execute.

Five months is enough time to get there. But only if you know where you're starting from.