Definition
GRC stands for Governance, Risk, and Compliance. In a corporate context, it is the work of running an organisation's policies (governance), identifying and treating risk (risk), and demonstrating to auditors, regulators, and customers that controls are in place and operating effectively (compliance).
GRC for MSPs is a particular flavour of this work. Unlike a SaaS company chasing a single SOC 2 audit for its own boundary, an MSP plays two roles simultaneously. First, the MSP is itself an organisation with controls and an audit boundary — typically pursuing SOC 2 Type 2, ISO 27001, or both. Second, the MSP is a service provider operating inside many client tenants, each with its own framework expectations (CMMC 2.0 for US DoD contractors, CPCSC for Government of Canada contractors, HIPAA for US healthcare, PIPEDA / BC HIA / Alberta HIA for Canadian privacy and health, PCI DSS for merchants, NIST CSF for cyber-insurance assessors, NERC CIP for North American power utilities, IIROC for Canadian securities firms, Australian Essential Eight for Australian government contractors, and so on).
GRC for MSPs is therefore inherently *multi-tenant*. The MSP needs a way to push a standard control profile to each client tenant, collect continuous evidence from that tenant's endpoints and cloud services, and produce co-branded posture reports the client can show to its auditor, insurer, or board.
Core components
- Governance. Policies, standards, and procedures that define how the organisation runs — acceptable use, access management, incident response, change control, vendor management, risk management. The MSP authors policies for itself and helps clients adopt or tailor policy templates.
- Risk. Risk identification, assessment, and treatment. For MSPs this includes both the MSP's own risk register and per-client risk registers covering each tenant's threat landscape, business criticality, and regulatory exposure.
- Compliance. Mapping technical and process controls to one or more frameworks (CMMC 2.0, NIST CSF, CIS, SOC 2, ISO 27001, HIPAA, PCI DSS, PIPEDA, etc.) and collecting continuous evidence that those controls are in place and operating effectively.
- Continuous evidence collection. The day-to-day work of pulling configuration state, log entries, MFA enforcement records, patch status, access reviews, and incident artefacts from endpoints and cloud tenants — and storing them so an auditor can sample at any time.
- System Security Plan (SSP). A document describing the system boundary, the controls implemented, and how each control is implemented. Required for CMMC 2.0 / NIST 800-171 and useful for almost any compliance framework.
- Plan of Action and Milestones (POA&M). A document tracking known control gaps, the planned remediation, and the milestone dates. Required for CMMC 2.0; typical practice for any framework where 100% control coverage is not yet in place.
Why it matters
Cyber-insurance assessments and client procurement processes increasingly demand specific framework coverage. An MSP that cannot demonstrate CMMC 2.0 readiness for a DoD-supply-chain client, NIST CSF posture for a cyber-insurance scan, or HIPAA Security Rule coverage for a healthcare practice will lose deals it would have won five years ago.
Beyond client-facing compliance, GRC has become a defensive moat for MSPs themselves. A managed-service provider that breaches will face supply-chain liability claims from every affected client. Demonstrable adherence to a recognised control framework (SOC 2, ISO 27001, or both) is increasingly the price of admission for serious clients.
For Canadian MSPs particularly, the regulatory landscape has matured rapidly. PIPEDA, Quebec Law 25, BC PIPA, Alberta PIPA, BC HIA, Alberta HIA, IIROC, NERC CIP, and the new CPCSC programme each have their own evidence expectations. Without a multi-tenant GRC platform, manually maintaining control evidence across these frameworks is a full-time job.
How Lavawall® helps with GRC for MSPs
Lavawall® is a multi-tenant GRC platform built specifically for MSPs. It maps to 15+ frameworks (CMMC 2.0, CPCSC, NIST CSF 2.0, NIST SP 800-171, CIS Controls v8, ISO 27001, SOC 2, PCI DSS, HIPAA, BC HIA, Alberta HIA, Canadian privacy bundle, NERC CIP, IIROC, CPA Canada, Australian Essential Eight) and collects continuous evidence from Windows, macOS, and Linux endpoints and from M365, Entra ID, Azure, and Google Workspace tenants.
Because the same agent that performs patching, configuration assessment, and breach detection is also producing the compliance evidence, your control coverage updates in real time as your fleet changes. A new endpoint inherits the standard control profile when it onboards; a tenant that loses MFA on an admin account shows up immediately in the relevant control panes.
Co-branded SSP, POA&M, and posture-report generation lets the MSP deliver client-facing deliverables without manual Word-document work each quarter. Built and used internally by ThreeShield — an audit firm with CISSP and CISA staff — Lavawall® reflects what assessors actually look for.
Frequently asked
- Is GRC the same as cybersecurity?
- No. Cybersecurity is the work of preventing, detecting, and responding to attacks. GRC is the work of demonstrating that the cybersecurity programme exists and operates effectively, mapped to a recognised framework. Most MSPs need both — and Lavawall® delivers both in one platform.
- Do I need a separate GRC tool if I have a SOC 2 audit?
- A SOC 2 audit covers a specific period in time. A GRC tool delivers continuous evidence collection between audits, supports the next audit's evidence sampling, and helps you cover frameworks beyond SOC 2 (CMMC 2.0, NIST CSF, HIPAA, PIPEDA, etc.) without re-doing the work.
- How is MSP GRC different from enterprise GRC?
- Enterprise GRC is single-tenant — one organisation, one boundary, one control library. MSP GRC is multi-tenant — many client orgs, each with its own framework needs, all delivered from one console with co-branded reporting and per-client billing.
- How quickly can I add a tenant to a GRC platform?
- With Lavawall®, a new tenant can be onboarded in minutes — agents deploy via the existing RMM, the M365 / Entra / Google Workspace connectors are one-click per tenant, and the standard control profile applies automatically. Without a multi-tenant platform, tenant onboarding typically takes hours to days.