Changes

Jump to navigation Jump to search
Line 428: Line 428:     
====== '''Guidance''' ======
 
====== '''Guidance''' ======
[[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html| Government of Canada Security Control Profile for Cloud-Based GC IT Services] ]
+
[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html| Government of Canada Security Control Profile for Cloud-Based GC IT Services]
   −
[[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html| Government of Canada Cloud Security Risk Management Approach and Procedures] ]
+
[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html| Government of Canada Cloud Security Risk Management Approach and Procedures]
   −
[[https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22| CSE ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada] ]
+
[https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22| CSE ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada]
   −
[[https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38| CSE ITSG-38 Network Security Zoning – Design Consideration for Placement of Services within Zones] ]
+
[https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38| CSE ITSG-38 Network Security Zoning – Design Consideration for Placement of Services within Zones]
   −
[[https://www.cse-cst.gc.ca/en/system/files/pdf_documents/itsp.30.031v2-eng.pdf| CSE ITSG.30.031 V2 User Authentication Guidance for Information Technology Systems] ]
+
[https://www.cse-cst.gc.ca/en/system/files/pdf_documents/itsp.30.031v2-eng.pdf| CSE ITSG.30.031 V2 User Authentication Guidance for Information Technology Systems]
   −
[[https://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062| CSE ITSG.40.062 Guidance on Securely Configuring Network Protocols] ]
+
[https://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062| CSE ITSG.40.062 Guidance on Securely Configuring Network Protocols]
    
====== '''Blog''' ======
 
====== '''Blog''' ======
213

edits

Navigation menu

GCwiki