Line 84: |
Line 84: |
| ** [https://intranet.canada.ca/wg-tg/rtua-rafu-fra.asp Recommandations pour l'authentification à deux facteurs des utilisateurs dans le domaine opérationnel du gouvernement du Canada] | | ** [https://intranet.canada.ca/wg-tg/rtua-rafu-fra.asp Recommandations pour l'authentification à deux facteurs des utilisateurs dans le domaine opérationnel du gouvernement du Canada] |
| ** [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management] | | ** [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management] |
| + | |
| * [https://github.com/canada-ca/cloud-guardrails Mesures de protection du GC] | | * [https://github.com/canada-ca/cloud-guardrails Mesures de protection du GC] |
| ** GC EARB Guardrails Endorsement (September 19th) | | ** GC EARB Guardrails Endorsement (September 19th) |
Line 89: |
Line 90: |
| ** [https://github.com/canada-ca/cloud-guardrails-aws/tree/master/tools/prowler GC Cloud Guardrails Prowler Checks for AWS] | | ** [https://github.com/canada-ca/cloud-guardrails-aws/tree/master/tools/prowler GC Cloud Guardrails Prowler Checks for AWS] |
| ** [https://github.com/canada-ca/cloud-guardrails-O365 GC Guardrails for MS Office 365] | | ** [https://github.com/canada-ca/cloud-guardrails-O365 GC Guardrails for MS Office 365] |
− | * Canadian Centre for Cyber Security Guidance | + | * Centre canadien pour la cybersécurité Guidance |
− | ** [https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22 CCCS ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada] | + | ** [https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22 CCCS Exigences de base en matière de sécurité pour les zones de sécurité de réseau au sein du gouvernement du Canada ITSG-22] |
− | ** [https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38 CCCS ITSG-38 Network Security Zoning - Design Considerations for Placement of Services within Zones] | + | ** [https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38 CCCS Considérations de conception relatives au positionnement des services dans les zones ITSG-38] |
− | ** [https://cyber.gc.ca/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3 CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems] | + | ** [https://cyber.gc.ca/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3 CCCS Guide sur l'authentification des utilisateurs dans les systèmes de technologie de l'information ITSP.30.031 v3] |
− | ** [https://www.cse-cst.gc.ca/en/node/1830/html/26507 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols] | + | ** [https://cyber.gc.ca/fr/orientation/conseils-sur-la-configuration-securisee-des-protocoles-reseau-itsp40062 CCCS Conseils sur la configuration sécurisée des protocoles réseau ITSP.40.062] |
− | ** [https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process] | + | ** [https://cyber.gc.ca/fr/orientation/processus-devaluation-de-la-securite-des-technologies-de-linformation-sappliquant-aux CCCS Processus d'évaluation de la sécurité des technologies de l'information s'appliquant aux fournisseurs de services infonuagiques ITSM.50.100] |
| |} | | |} |
| | | |
Line 107: |
Line 108: |
| Tools and guides to help departments operate their cloud services.<br> | | Tools and guides to help departments operate their cloud services.<br> |
| * [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Guidance] | | * [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Guidance] |
− | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/security-playbook-information-system-solutions-cloud.html Security Playbook for Information System Solutions] | + | * [https://www.canada.ca/fr/gouvernement/systeme/gouvernement-numerique/technologiques-modernes-nouveaux/services-informatique-nuage/guide-securite-solutions-systeme-information-nuage.html Guide de sécurité pour les solutions de système d’information] |
| * [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management] | | * [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management] |
| * Naming and Tagging Guidance (SSC) | | * Naming and Tagging Guidance (SSC) |
Line 132: |
Line 133: |
| <span style="font-size: 1.5em;">Acquisition</span><br> | | <span style="font-size: 1.5em;">Acquisition</span><br> |
| Links to help teams acquire cloud services. <br> | | Links to help teams acquire cloud services. <br> |
− | * [https://cloud-broker.canada.ca/s/?language=en_CA GC Cloud Brokering site] | + | * [https://cloud-broker.canada.ca/s/?language=fr Service de courtage infonuagique GC] |
| |} | | |} |
| | | |