Line 428: |
Line 428: |
| | | |
| ====== '''Guidance''' ====== | | ====== '''Guidance''' ====== |
− | [[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html| Government of Canada Security Control Profile for Cloud-Based GC IT Services] ]
| + | [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html| Government of Canada Security Control Profile for Cloud-Based GC IT Services] |
| | | |
− | [[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html| Government of Canada Cloud Security Risk Management Approach and Procedures] ]
| + | [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html| Government of Canada Cloud Security Risk Management Approach and Procedures] |
| | | |
− | [[https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22| CSE ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada] ]
| + | [https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22| CSE ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada] |
| | | |
− | [[https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38| CSE ITSG-38 Network Security Zoning – Design Consideration for Placement of Services within Zones] ]
| + | [https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38| CSE ITSG-38 Network Security Zoning – Design Consideration for Placement of Services within Zones] |
| | | |
− | [[https://www.cse-cst.gc.ca/en/system/files/pdf_documents/itsp.30.031v2-eng.pdf| CSE ITSG.30.031 V2 User Authentication Guidance for Information Technology Systems] ]
| + | [https://www.cse-cst.gc.ca/en/system/files/pdf_documents/itsp.30.031v2-eng.pdf| CSE ITSG.30.031 V2 User Authentication Guidance for Information Technology Systems] |
| | | |
− | [[https://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062| CSE ITSG.40.062 Guidance on Securely Configuring Network Protocols] ]
| + | [https://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062| CSE ITSG.40.062 Guidance on Securely Configuring Network Protocols] |
| | | |
| ====== '''Blog''' ====== | | ====== '''Blog''' ====== |