Line 18: |
Line 18: |
| <th>[[Tendances_Technologiques|Tendances Technologiques]]</th> | | <th>[[Tendances_Technologiques|Tendances Technologiques]]</th> |
| <th> / </th> | | <th> / </th> |
− | <th>[[Tendances_Technologiques/Plateforme_de_Gestion_Infonuagique|Plateforme de Gestion Infonuagique]]</th> | + | <th>Platforme de Gestion d'Infonuagique<!--[[Tendances_Technologiques/Plateforme_de_Gestion_Infonuagique|Plateforme de Gestion Infonuagique]]--></th> |
| </tr> | | </tr> |
| </table> | | </table> |
Line 26: |
Line 26: |
| <tr> | | <tr> |
| <th>Status</th> | | <th>Status</th> |
− | <td>Published</td> | + | <td>Translation</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 34: |
Line 34: |
| <tr> | | <tr> |
| <th>Latest version</th> | | <th>Latest version</th> |
− | <td>February 3, 2020</td> | + | <td>February 14, 2020</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 173: |
Line 173: |
| <p class="expand mw-collapsible-content">Security management of Cloud Services should be managed in accordance with GC policies. SSC provides and enables secured connectivity, encryption/ tokenization, and identity credential and access management (ICAM). Creation of consistent governance procedures across cloud environments to improve security, compliance, and adherence to best-practices is a major consideration.</p> | | <p class="expand mw-collapsible-content">Security management of Cloud Services should be managed in accordance with GC policies. SSC provides and enables secured connectivity, encryption/ tokenization, and identity credential and access management (ICAM). Creation of consistent governance procedures across cloud environments to improve security, compliance, and adherence to best-practices is a major consideration.</p> |
| | | |
− | <p class="expand mw-collapsible-content">SSC must ensure an appropriate CMP strategy is founded on industry and public standards, within a solid CMP framework, drawing from such foundational best practices, including: Object Management Group’s – Cloud Working Group Practical Guide to Cloud Management Platforms (Cloud Standards Customer Council, 2017); the GC Cloud Computing Security Risk Management Approach and Procedures; the GC Right Cloud Selection Guidance; the GC Cloud Computing Adoption Strategy<ref>Government of Canada. (2019, June 17). <i>[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-cloud-adoption-strategy.html Government of Canada Cloud Adoption Strategy: 2018 update]</i>. Retrieved from canada.ca</ref>; the ITSG-33 – IT Security Risk Management: A Lifecycle Approach<ref>Canadian Centre for Cyber Security. (2018, November 5).<i>[https://cyber.gc.ca/en/guidance/it-security-risk-management-lifecycle-approach-itsg-33 IT Security Risk Management: A Lifecycle Approach (ITSG-33)]</i>. Retrieved from cyber.gc.ca</ref>; and the Shared Services Canada – Cloud Service Broker Concept of Operations (ConOps) – October 3, 2017<ref>Tremblay, D. (2017, April 21). <i>[http://cradpdf.drdc-rddc.gc.ca/PDFS/unc280/p805540_A1b.pdf System Concept of Operations (CONOPS)]</i>. Retrieved from cradpdf.drdc-rddc.gc.ca</ref></p> | + | <p class="expand mw-collapsible-content">SSC must ensure an appropriate CMP strategy is founded on industry and public standards, within a solid CMP framework, drawing from such foundational best practices, including: Object Management Group’s – Cloud Working Group Practical Guide to Cloud Management Platforms (Cloud Standards Customer Council, 2017); the GC Cloud Computing Security Risk Management Approach and Procedures; the GC Right Cloud Selection Guidance; the GC Cloud Computing Adoption Strategy<ref>Government of Canada. (2019, June 17). <i>[https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-cloud-adoption-strategy.html Government of Canada Cloud Adoption Strategy: 2018 update]</i>. Retrieved from canada.ca</ref>; the ITSG-33 – IT Security Risk Management: A Lifecycle Approach<ref>Canadian Centre for Cyber Security. (2018, November 5).<i>[https://cyber.gc.ca/en/guidance/it-security-risk-management-lifecycle-approach-itsg-33 IT Security Risk Management: A Lifecycle Approach (ITSG-33)]</i>. Retrieved from cyber.gc.ca</ref>; and the Shared Services Canada – Cloud Service Broker Concept of Operations (ConOps) – October 3, 2017.<ref>Tremblay, D. (2017, April 21). <i>[http://cradpdf.drdc-rddc.gc.ca/PDFS/unc280/p805540_A1b.pdf System Concept of Operations (CONOPS)]</i>. Retrieved from cradpdf.drdc-rddc.gc.ca</ref></p> |
| | | |
| <p>SSC will require a diverse skill set to deal with the array of tools across multiple functional categories and many cloud platforms to effectively leverage CMPs capabilities in functional categories and cross-platform consistency. CMPs are change enablers, where unique skills and expertise are required in order to effectively and efficiently audit, consume and Broker Cloud Services. Plans need to be carefully developed and coordinated, including skills training, processes, workflows and culture, so that incremental sustained progress can be made to successfully manage and realize the benefits from Cloud computing.</p> | | <p>SSC will require a diverse skill set to deal with the array of tools across multiple functional categories and many cloud platforms to effectively leverage CMPs capabilities in functional categories and cross-platform consistency. CMPs are change enablers, where unique skills and expertise are required in order to effectively and efficiently audit, consume and Broker Cloud Services. Plans need to be carefully developed and coordinated, including skills training, processes, workflows and culture, so that incremental sustained progress can be made to successfully manage and realize the benefits from Cloud computing.</p> |