Directive on Security Screening

Ensures that security screening in the Government of Canada is conducted in a way that is effective, rigorous, consistent and fair, and enables greater transferability of security screening between departments.
Date modified: 2025-01-07

Supporting tools

Directive:

Mandatory procedures:

More information

Policy:

Terminology:

Topic:

Hierarchy

Archives

This directive replaces:

View all inactive instruments
Print-friendly XML

Appendix A: Standard on Security Screening Model and Position Analysis

A.1 Effective date

  • A.1.1This standard takes effect on January 6, 2025.

A.2 Standards

  • A.2.1This standard provides details on the requirements set out in subsections 4.1.1.1 and 4.6.1 of the Directive on Security Screening.
  • A.2.2Standards are as follows:
    • A.2.2.1Grant either a status or a clearance at the level required based on:
      • A.2.2.1.1The position the individual occupies; or
      • A.2.2.1.2The contract or other arrangement through which the individual is participating.

    Security screening model for individuals

    • A.2.2.2Conduct security screening for:
      • A.2.2.2.1All positions or duties in the Government of Canada;
      • A.2.2.2.2All contracts or other arrangement where there is a need to share or provide access to sensitive information and assets, including IT systems and facilities; and
      • A.2.2.2.3In accordance with Annex A1.
    • A.2.2.3Assess:
      • A.2.2.3.1Reliability, honesty and trustworthiness as a function of eligibility to hold a status; and
      • A.2.2.3.2Reliability, honesty, trustworthiness, loyalty to Canada, and reliability as it relates to that loyalty, as a function of eligibility to hold a clearance.

    Position analysis for individuals

    • A.2.2.4Determine the level of screening required for positions based on:
      • A.2.2.4.1The duties to be performed;
      • A.2.2.4.2The level of authority or control exercised by the position;
      • A.2.2.4.3The sensitivity of information and assets, including IT systems and facilities to be accessed, including:
        • A.2.2.4.3.1The degree of injury that could result from compromise; and
        • A.2.2.4.3.2The need-to-know or need-to-access principle;
      • A.2.2.4.4At a minimum, all positions are established at Reliability status when occupied by employees or other individuals working in departments as defined in section 2 and any other agency included in Schedules IV and V of the Financial Administration Act unless excluded by specific acts, regulations or orders-in-council; and
      • A.2.2.4.5In accordance with the criteria identified within Annex A2.
    • A.2.2.5Top Secret or Enhanced Top Secret level clearances are to be granted only to employees or other individuals who have Canadian citizenship; and
    • A.2.2.6Extend security screening to an enhanced level in accordance the criteria identified within Annex A2.

    Security requirements for contracts and other arrangements

    Site access screening model for non-employees

    • A.2.2.8Conduct site access screening for:
      • A.2.2.8.1Individuals who are not employees and have a need to access protected or restricted areas or facilities; and
      • A.2.2.8.2In accordance with Annex A3.
    • A.2.2.9Assess:
      • A.2.2.9.1Reliability, honesty and trustworthiness as a function of eligibility to hold a status; and
      • A.2.2.9.2Reliability, honesty, trustworthiness, loyalty to Canada and reliability, as it relates to that loyalty, as a function of eligibility to hold a clearance.

    Position analysis for non-employees

    • A.2.2.10Determine the level of site access screening required for contracts or other arrangements based on:
      • A.2.2.10.1The sensitivity and nature of departmental programs, services and activities;
      • A.2.2.10.2The nature of the duties or services to be performed;
      • A.2.2.10.3Whether the individual will be escorted or unescorted;
      • A.2.2.10.4Whether the individual requires access to the exterior or interior of a facility;
      • A.2.2.10.5The risk of the individual inadvertently seeing or overhearing sensitive information or conversations; and
      • A.2.2.10.6In accordance with the criteria identified in Annex A4.

Annex A1: Levels of Security Screening and Associated Activities

Level Security screening activities Level Security screening activities

Reliability status
Validity: 10 years

  • Verification of identity
  • Verification of 5 years of background information
  • Verification of educational and professional credentials
  • Personal and professional reference checks
  • Financial inquiry (credit check)
  • Criminal record check

Enhanced Reliability status
Validity: 10 years

All activities for Reliability status plus:

  • Internet inquiry
  • Law enforcement records check
  • Security questionnaire or security interview

Secret clearance
Validity: 10 years

All activities for Reliability status plus:

  • Verification of 10 years of background information
  • CSIS security assessment

Enhanced Secret clearance
Validity: 10 years

All activities for Secret clearance plus:

  • Internet inquiry
  • Law enforcement records check
  • Security questionnaire or security interview

Top Secret clearance
Validity: 5 years

All activities for Secret clearance plus:

  • Internet inquiry
  • Law enforcement records check
  • Security questionnaire or security interview
  • Foreign travel, passports, assets and military service
  • Canadian Citizenship

Enhanced Top Secret clearance
Validity: 5 years

All activities for Top Secret clearance plus:

  • Polygraph examination

Annex A2: Criteria for Determining Level of Security Screening

Level Criteria for determining level Access permissions
Reliability Status
  • Conduct screening of individuals to the level of Reliability:
    • When positions require:
      • Unsupervised access to Government of Canada information and assets;
      • Unescorted access to physical security zones in facilities, where Government of Canada protected information is processed; or
      • User-level access to IT systems categorized as Protected A or B.
    • As the minimum screening for all positions.
  • Access to information, assets, or IT systems categorized as Protected A or B
Secret clearance
  • Conduct screening of individuals to the level of Secret:
    • Building on screening criteria for a Reliability status and when positions require:
      • Unsupervised access to Government of Canada information and assets categorized as Secret;
      • Unescorted access to Physical security zones in government facilities where Secret information is processed; or
      • User-level access to IT systems categorized as Secret.
  • Access to information, assets or IT systems categorized as Protected A, B, Confidential and Secret
  • Access to IT systems categorized as Protected A, B, Confidential and Secret
  • Enhanced privileges (or administrator access) to IT systems
Top Secret clearance
  • Conduct screening of individuals to the level of Top Secret:
    • Building on screening criteria for a Secret clearance and when positions require:
      • Unsupervised access to Government of Canada information and assets categorized as Top Secret;
      • Unescorted access to Physical security zones in government facilities, where Top Secret information is processed; or
      • User-level access to IT systems categorized as Top Secret.
  • Access to information, assets or IT systems categorized as Protected A, B or C or classified at any level
  • Restricted access to specific Top Secret networks or systems
Enhanced Reliability status
  • Conduct screening of individuals to the level of Enhanced Reliability:
    • Building on screening criteria for Reliability status and when positions require:
      • Individuals to perform security and intelligence functions, including:
        • Uncontrolled access to criminal or law enforcement intelligence information or assets, including IT systems or unescorted access to physical security zones within facilities where this information is processed or stored; or
        • Duties that support those functions.
  • Access to information and assets, including IT systems categorized as Protected A, B or C
Enhanced Secret clearance
  • Conduct screening of individuals to the level of Enhanced Secret:
    • Building on screening criteria for a Secret clearance and when positions require:
      • Individuals to perform security and intelligence functions, including:
        • Uncontrolled access to criminal or law enforcement intelligence information or assets classified as Secret, including IT systems or unescorted access to physical security zones within facilities where this information is processed or stored; or
        • Duties that support those functions and that:
          • Require unsupervised access to Secret law enforcement information or assets.
  • Access to information, IT systems, and assets categorized as Protected A, B, C, Confidential and Secret
  • Enhanced privileges (or administrator access) to IT systems
Enhanced Top Secret clearance
  • Conduct screening of individuals to the level of Enhanced Top Secret:
    • Building on screening criteria for a Top Secret clearance and when positions require:
      • Individuals to perform defence, security and intelligence functions, including:
        • Uncontrolled access to criminal or law enforcement intelligence information or assets categorized as Top Secret, including IT systems; or
        • Unsupervised access to methods, sources, analytical processes, plans and techniques related to the collection of sensitive intelligence or counter-intelligence information; or
        • Unescorted access to physical security zones within facilities where criminal or law enforcement intelligence is processed or stored;
        • Duties that support those functions and that:
          • Require uncontrolled access to Top Secret assets; or
          • Unescorted access to physical security zones within facilities where this information is processed or stored.
  • Access to government information, assets or IT systems categorized as protected or classified at any level

Annex A3: Levels of Site Access Screening and Associated Activities

Level Activities

Site Access status
Validity: 10 years

  • Verification of identity
  • Verification of 5 years of background information
  • Criminal record check

Site Access clearance
Validity: 10 years

All activities for Site Access status plus:

  • CSIS security assessment

Additional activities may be used in accordance with subsection A.2.2.10, “Position analysis for non-employees.”

All activities for Site Access clearance plus:

  • Personal and professional reference checks
  • Internet inquiry
  • Law enforcement records check
  • Security questionnaire or security interview
  • Polygraph examination

Annex A4: Criteria for Determining Level of Site Access Screening

Level Criteria for determining level Access permissions
Site Access status
  • Conduct screening of individuals to the level of Site Access status:
    • As the minimum level of Site Access screening and there is a requirement to:
      • Enter areas where protected information and assets are present whether being processed or stored; or
      • As required, access areas that form part of the controlled hierarchy of physical security zones;
    • When access to sensitive government information is not required; and
    • The individual is not an employee.
  • Unescorted access to federal government facilities and restricted access areas within those facilities
  • No access to information
Site Access clearance
  • Conduct Site Access clearance screening of individuals:
    • Building on screening criteria for a Site Access status and there is a requirement to:
      • Enter areas where classified information and assets are present, whether being processed or stored;
      • Enter restricted access areas of law enforcement facilities; or
      • As required, access areas that form part of the controlled hierarchy of physical security zones;
    • When access to sensitive government information is not required; and
    • The individual is not an employee.
  • Unescorted access to federal government facilities and restricted access areas within those facilities
  • Unescorted access to law enforcement facilities
  • No access to information
Date modified: