Changes

no edit summary
Line 32: Line 32:  
As workloads are migrated to the Cloud, the GC perimeter shifts outside of the on-premise environment, and measures must be put in place to monitor and protect these Cloud-based environments, and respond to cyber threats quickly. The establishment of private, dedicated connections to GC approved Cloud Service Providers (CSP) will enable a hybrid IT environment, and ensure that the GC can continue to have secure access to information systems and solutions hosted in the Cloud.
 
As workloads are migrated to the Cloud, the GC perimeter shifts outside of the on-premise environment, and measures must be put in place to monitor and protect these Cloud-based environments, and respond to cyber threats quickly. The establishment of private, dedicated connections to GC approved Cloud Service Providers (CSP) will enable a hybrid IT environment, and ensure that the GC can continue to have secure access to information systems and solutions hosted in the Cloud.
   −
Secure connectivity from Cloud to Ground is being implemented for applications and platforms that handle Protected B data. This connectivity is Secure Cloud Enablement and Defence (SCED), also called Express Route.
+
Secure connectivity from Cloud to Ground is being implemented for applications and platforms that handle Protected B data. This connectivity is Secure Cloud Enablement and Defence (SCED), also called Express Route. SCED was delivered to TC by SSC in June 2020 as a pilot project for two applications: Enterprise BI and Data Analytics (eBIDA) and Policy on Government Security (PGS). SCED is currently being implemented for these two applications.
 
  −
SCED was delivered to TC by SSC in June 2020 as a pilot project for two applications: Enterprise BI and Data Analytics (eBIDA) and Policy on Government Security (PGS). SCED is currently being implemented for these two applications.
      
== Cloud Service Operation Model (CSOM) ==
 
== Cloud Service Operation Model (CSOM) ==
510

edits