Line 341: |
Line 341: |
| | | |
| <h2><span style="font-size: 1.5em;">5. Security Architecture</span></h2> | | <h2><span style="font-size: 1.5em;">5. Security Architecture</span></h2> |
− |
| |
| === Overview of the GC Enterprise Security Architecture (ESA) Program === | | === Overview of the GC Enterprise Security Architecture (ESA) Program === |
− | The GC ESA program is a government-wide initiative to provide a standardized approach to developing IT security architecture, ensuring that basic security blocks are implemented across the enterprise as the infrastructure is being renewed. The image on the right shows how the GC ESA program supports the direction the GC is taking with regards to GC IT security. | + | The GC ESA program is a government-wide initiative to provide a standardized approach to developing IT security architecture, ensuring that basic security blocks are implemented across the enterprise as the infrastructure is being renewed. The image on the right shows how the GC ESA program supports the direction the GC is taking with regards to GC IT security.The GC ESA program aims to:· Ensure more cost-effective, interoperable, resilient and secure IT solutions in support of GC enterprise objectives;· Maintain availability of GC systems and services while complying with relevant GC legislation and policy instruments;· Adopt an architecture methodology and approach to ensure common understanding, alignment, and reduce duplication of effort amongst interdepartmental stakeholders;· Ensure security of information, IT infrastructure and applications with the implementation of consistent security controls which reduces total cost of ownership; and· Keep risk at acceptable levels.The GC ESA program will serve as a guide to departments and agencies in planning, implementing, and operating their information systems by offering the necessary framework, tools, and templates to design, evaluate, and build an IT security architecture tailored to their organization, in accordance with Communications Security Establishment’s (CSE) ITSG-33 – IT Security Risk Management: A Lifecycle Approach and other security industry best practices in the area of architecture, risk management and compliance.A lot more information can be found here: · [https://www.gcpedia.gc.ca/wiki/Government_of_Canada_Enterprise_Security_Architecture_(ESA)_Program; Government of Canada Enterprise Security Architecture (ESA) Program] and here:· [https://www.gcpedia.gc.ca/gcwiki/images/a/ac/GC_ESA_Description_Document_%28ESADD%29_-_Main_Body.pdf GC ESA Description Document Main Body -- Synopsis] Additional ESA initiatives can be found by clicking on the embedded link for:• GC Cloud Reference Architecture; • [https://www.gcpedia.gc.ca/gcwiki/images/8/86/GC_Zero_Trust_Reference_Architecture.pdf DRAFT GC Zero Trust Security Reference Architecture]; • [https://www.gcpedia.gc.ca/wiki/ESA_Initiatives Many other ESA Initiatives] |
− | | |
− | The GC ESA program aims to: | |
− | | |
− | · Ensure more cost-effective, interoperable, resilient and secure IT solutions in support of GC enterprise objectives; | |
− | | |
− | · Maintain availability of GC systems and services while complying with relevant GC legislation and policy instruments; | |
− | | |
− | · Adopt an architecture methodology and approach to ensure common understanding, alignment, and reduce duplication of effort amongst interdepartmental stakeholders; | |
− | | |
− | · Ensure security of information, IT infrastructure and applications with the implementation of consistent security controls which reduces total cost of ownership; and | |
− | | |
− | · Keep risk at acceptable levels.
| |
− | | |
− | The GC ESA program will serve as a guide to departments and agencies in planning, implementing, and operating their information systems by offering the necessary framework, tools, and templates to design, evaluate, and build an IT security architecture tailored to their organization, in accordance with Communications Security Establishment’s (CSE) ITSG-33 – IT Security Risk Management: A Lifecycle Approach and other security industry best practices in the area of architecture, risk management and compliance. | |
− | | |
− | A lot more information can be found here: | |
− | | |
− | · [https://www.gcpedia.gc.ca/wiki/Government_of_Canada_Enterprise_Security_Architecture_(ESA)_Program; Government of Canada Enterprise Security Architecture (ESA) Program] and here:
| |
− | | |
− | · [https://www.gcpedia.gc.ca/gcwiki/images/a/ac/GC_ESA_Description_Document_%28ESADD%29_-_Main_Body.pdf GC ESA Description Document Main Body -- Synopsis] | |
− | | |
− | Additional ESA initiatives can be found by clicking on the embedded link for: | |
− | | |
− | • GC Cloud Reference Architecture; | |
− | | |
− | • [https://www.gcpedia.gc.ca/gcwiki/images/8/86/GC_Zero_Trust_Reference_Architecture.pdf DRAFT GC Zero Trust Security Reference Architecture]; | |
− | | |
− | • [https://www.gcpedia.gc.ca/wiki/ESA_Initiatives Many other ESA Initiatives] | |
| | | |
| {| width="100%" cellpadding="10" | | {| width="100%" cellpadding="10" |