Changes

Jump to navigation Jump to search
no edit summary
Line 174: Line 174:  
<span style="font-size: 1.5em;">[[GC_Security_and_Privacy_Enterprise_Architecture | 5. Security Architecture and Privacy]]</span> <br><br>
 
<span style="font-size: 1.5em;">[[GC_Security_and_Privacy_Enterprise_Architecture | 5. Security Architecture and Privacy]]</span> <br><br>
   −
<b>Design for Security and Privacy</b>
   
<I><u>
 
<I><u>
* Perform security categorization to identify and categorize information based on the degree of injury that could be expected to result from a compromise of its confidentiality, integrity and availability.
+
<b>Build Security into the Full System Life Cycle, Across All Architectural Layers</b>
* Build in security from the outset of design, development, and throughout the system life cycle, across all architectural layers.
+
* Identify and classify risks associated to the service’s business objectives, goals, and strategy
* Implement appropriate and cost-effective security measures and privacy protections, proportionate to user and business needs. Apply graduated safeguards that are commensurate with the security category of the information and assets.
+
* Design security measures according to business and user needs, risks identified, and security categorization of the information and assets; integrate security across all architectural layers (BIAT).  
* Protect data while in transit, in use and at rest using appropriate encryption and protocols. (Duplicate D3)
+
** Maintain focus on users’ ease of use through selection of context-appropriate controls
* Apply a defense in depth approach to reduce exposure to threats and minimize the degree of compromise.  
+
** Apply an information-centric approach to reduce resources’ exposure to threats, and minimize the opportunity for compromise.  
* Design services that:
+
** Protect data while in transit, in use and at rest using appropriate encryption and protocols. Ensure effective disposition of data per retention schedules, following service sunset.
** Prioritize ease of use in security design to make security simple for users;
+
* Design systems that: are not susceptible to common security vulnerabilities; are resilient and can be rebuilt quickly in the event of compromise; and fail secure if the system encounters an error or crashes.  
** Protected from common security vulnerabilities;  
  −
** Expose and secure only the interfaces necessary to operate the service;
  −
** Are resilient and can be rebuilt quickly to a known clean state in the event that a compromise is detected; and  
  −
** Fail secure even if the system encounters an error or crashes.  
  −
* Integrate and automate security testing to validate code and address vulnerabilities prior to deployment
   
* Reduce human intervention and maximize automation of security tasks and processes.
 
* Reduce human intervention and maximize automation of security tasks and processes.
 +
** Integrate and automate security testing to validate code and address vulnerabilities prior to deployments
   −
<b> Ensure Secure Access to Systems and Services </b>
+
<b>Ensure Secure Access to Systems and Services</b>
* User access to service interfaces should be constrained to authorised individuals, with clearly defined roles.
+
* Identify and authenticate users and devices to an appropriate level of assurance before granting access to information and services.
* Identify and authenticate individuals, processes, and/or devices to an appropriate level of assurance before being granted access to information and services.
+
* Separate and compartmentalize user responsibilities and privileges; assign the least set of privileges necessary to complete the job.
* Separate and compartmentalise user responsibilities and privileges. Assign the least set of privileges necessary to complete the job.
+
* Constrain service interfaces to authorized entities (users and devices), with clearly defined roles, and only expose the interfaces necessary to operate the service
* Use GC-approved multi-factor authentication where possible to protect against unauthorized access.
+
* Make use of modern credential guidance, and use GC-approved multi-factor authentication where required to stop unauthorized access.
 
  −
<b> Maintain Secure Operations </b>
  −
* Design processes to operate and manage services securely in order to impede, detect or prevent attacks.
  −
* Collect all relevant security events and logs at infrastructure and application levels to support root-cause analysis. Use a trusted time source and protect audit logs from manipulation.
  −
* Continuously monitor system events and performance, and include a security audit log function in all information systems.
  −
* Promptly apply security-related patches and updates to reduce exposure to vulnerabilities. Apply a risk-based mitigations when patches can’t be applied.
  −
* Establish appropriate mechanisms to respond effectively to security incidents. Monitor security advisories and patches.
      +
<b>Maintain Secure Operations</b>
 +
* Integrate SA&A activities into security architecture lifecycle processes, to ensure reference artefacts remain relevant and valid.
 +
* Continuously monitor system events and performance in order to detect, prevent, and respond to attacks.
 +
* Design processes to operate services securely, and establish processes and mechanisms to respond effectively to security events.
 +
* Collect transaction logs at infrastructure and application levels to support automated root-cause analysis and performance tuning.
 +
* Include an audit function in information systems. Use a trusted time source and protect audit logs from manipulation.
 +
* Establish processes to monitor security advisories, and apply security-related patches and updates. Apply appropriate risk-based mitigations when patches can’t be applied.
 +
<br>
 
<b> Privacy by Design </b>
 
<b> Privacy by Design </b>
 
* Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved
 
* Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved
 
* Implement security measures to assure the protection of personal information
 
* Implement security measures to assure the protection of personal information
 
* Take into consideration the <b>[https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/ 7 Foundational Privacy Design Principles] </b> when designing services.
 
* Take into consideration the <b>[https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/ 7 Foundational Privacy Design Principles] </b> when designing services.
</I>
+
</u></I>
 
|}
 
|}
  
263

edits

Navigation menu

GCwiki