Line 1: |
Line 1: |
| + | |
| {{Cloud Information Centre - Government of Canada}} | | {{Cloud Information Centre - Government of Canada}} |
| <b> | | <b> |
| </b> | | </b> |
| + | <!-- NAV --> |
| <!-- Columns --> | | <!-- Columns --> |
| + | |
| + | {| width="100%" cellpadding="10" |
| + | |
| + | |width="90%" style="color: black;" align="right" | |
| + | <!-- COLUMN 1 STARTS: --> |
| + | [[Template: Politique|Français]] |
| + | <!-- COLUMN 1 ENDS: --> |
| + | |width="10%" style="color: black; align=center" | |
| + | |
| + | <!-- COLUMN 2 STARTS: --> |
| + | |
| + | <!-- COLUMN 2 ENDS: --> |
| + | |
| + | <!-- Columns --> |
| + | |} |
| | | |
| {| width="100%" cellpadding="10" | | {| width="100%" cellpadding="10" |
Line 70: |
Line 87: |
| ::* [https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols] | | ::* [https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols] |
| ::* [https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process] | | ::* [https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process] |
− | ::* [https://intranet.canada.ca/wg-tg/cagc-angc-eng.asp Guidance on Cloud Authentication for the Government of Canada] | + | ::* [https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/guideline-cloud-authentication.html Guideline on Cloud Authentication] |
| ::* [https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain] | | ::* [https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain] |
| ::* [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)] | | ::* [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)] |