14,730 bytes added
, 08:41, 14 April 2021
<div class="center"><div style="float: right; z-index: 10; position: absolute; right: 0; top: 1;">[[File:JoinusonGCconnex.png|link=https://gcconnex.gc.ca/groups/profile/2785549/gc-enterprise-security-architecture-gc-esa]]<br />[[File:ESAcontactus.png|link=mailto:ZZTBSCYBERS@tbs-sct.gc.ca]]</div>
[[File:GOC ESA.jpg|center|link=https://www.gcpedia.gc.ca/wiki/Government_of_Canada_Enterprise_Security_Architecture_(ESA)_Program]]
<div class="center">
{| style="border: 2px solid #000000; border-image: none;" width="1000px"
|-
! style="background: #e1caf7; color: black" width="175px" scope="col" " | [[Government of Canada Enterprise Security Architecture (ESA) Program|ESA Program Overview]]
! style="background: #e1caf7; color: black" width="125px" scope="col" " | [[ESA Backgrounder (Strategy)|ESA Foundation]]
! style="background: #e1caf7; color: black" width="125px" scope="col" " | [[ESA Requirements|ESA Artifacts]]
! style="background: #e1caf7; color: black" width="125px" scope="col" " | [[ESA Initiatives|ESA Initiatives]]
! style="background: #e1caf7; color: black" width="125px" scope="col" " | [[ESA Tools and Templates]]
! style="background: #C495F0; color: black" width="125px" scope="col" " | [[GC ESA Artifact Repository|ESA Reference Materials]]
! style="background: #e1caf7; color: black" width="100px" scope="col" " | [[ESA Glossary| Glossary]]
|}
{| style="border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1000px"
|-
! style="background: #9a9af8; color: black" width="18%" scope="col" | [[GC ESA Artifact Repository|ESA Artifact Repository]]
! style="background: #c2c2fa; color: black" width="16%" scope="col" | [[GC Threat Assessments - Repository| GC Threat Assessment Repository]]
! style="background: #c2c2fa; color: black" width="12%" scope="col" | [[GC Security Assessments - Repository|GC Security Assessment Repository]]
! style="background: #c2c2fa; color: black" width="18%" scope="col" | [[Emerging Technologies]]
! style="background: #c2c2fa; color: black" width="16%" scope="col" | [[Other Resources]]
|} </div></div>
{| class=wikitable height=30 align=center
| '''A noter:''' une version française de cette page est disponible à: [http://www.gcpedia.gc.ca/wiki/AMOPS_2015-01 AMOPS 2015-01]
|}
<br>
<br>
<div style="border: 25px; border: 5px solid #047177; padding: 20px; width: 300px; height:150px; float: right">
<div style='text-align: center'>
<div align="center">[[File:Icon GCconnex.png|250px|link=https://gcconnex.gc.ca/groups/profile/20253242/spin-2015-01-follow-up-activities]]</div>
<br></div>
<div style='text-align: center;'>Join the discussion on the SPIN 2015-01 Follow-Up Activities on GCconnex.
</div>
</div>
{{TOCright}}
== SPIN 2015-01: Priority IT Security Actions ==
Following recent incidents and Information Technology (IT) audits, Treasury Board of Canada Secretariat (TBS) has published [http://publiservice.tbs-sct.gc.ca/sim-gsi/publi/spin-amps/2015/2015-01-eng.asp Security Policy Implementation Notice (SPIN) 2015-01: Priority IT Security Actions] on its Publiservice website. This SPIN re-emphasizes existing/foundational requirements from the [http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12328 Operational Security Standard: Management of Information Technology Security] that are related to the identified priority security actions, and provides guidance on these requirements.
<br />
The SPIN highlights three security management practices, based on recommendations from the Communications Security Establishment’s (CSE’s) [https://www.cse-cst.gc.ca/en/node/1297/html/25231 Top 10 IT Security Actions to Protect Government of Canada Internet-Connected Networks and Information] (CSE Top 10) list, that need reinforcing: patching of operating systems (OSs) and applications, enforcing the management of administrative privileges, and hardening of information systems. Implementing robust practices in these three areas will help to enhance departmental and enterprise IT security postures by minimizing cyber intrusions or the impacts to networks if a successful intrusion occurs. TBS has requested that departments and agencies ensure that their processes address GC requirements and reflect the strong practices that have been identified in the SPIN.
<br />
The SPIN and its supporting material are intended to help departments and agencies focus their efforts and prioritize the implementation of security controls to protect GC networks and information systems.
<br />
This page provides links to material that can help departments when implementing activities in support of SPIN 2015-01. For each action area identified in the SPIN, this page identifies relevant:
<br />
::'''Published GC Guidance''' – Formally approved guidance documents by TBS or other lead security agencies (LSA). Guidance documents in this section will typically be found on the LSA’s website.
::'''Draft Guidance and Best Practices''' – Guidance that may not yet be officially approved but which are ready for departmental review or comment; as well as best practices shared by departments.
::'''External/Third-Party Best Practices''' – Links to best practices or tools that are made available by external organizations and could be adopted by departments (e.g. CIS, NIST, and ISF).
<br />
Published GC guidance is generally available in both official languages. Draft guidance and best practices are frequently available in one official language; however, translation may be planned or pending. For ease of reference, links are provided to external/third-party best practices, but availability in both official languages is neither assumed nor assured.
<br />
Departments and agencies are encouraged to use this material to enhance their processes and practices. The sharing of departmental best practices is also encouraged.
<br />
This page will be updated as new material becomes available.
<!--**** Start of content **** -->
<br />
== Patch Management ==
=== Published GC Guidance ===
:* [CSE] ITSB-96, [https://www.cse-cst.gc.ca/en/node/241/html/24611 Security Vulnerabilities and Patches Explained], provides guidance on assessing known vulnerabilities and patches in order to determine the risk posed to an organization, the relative priority for patch deployment, as well as guidelines on how to deploy patches.
=== Draft GC Guidance and Best Practices ===
:* None available at this time.
=== External/Third-Party Best Practices ===
:* US National Institute of Standards and Technology (NIST) 800-40 Revision 3, [http://dx.doi.org/10.6028/NIST.SP.800-40r3 Guide to Enterprise Patch Management Technologies].
::* From the document abstract: “This publication is designed to assist organizations in understanding the basics of enterprise patch management technologies. It explains the importance of patch management and examines the challenges inherent in performing patch management. This publication also provides an overview of enterprise patch management technologies and briefly discusses metrics for measuring the technologies’ effectiveness and for comparing the relative importance of patches.”
:* Microsoft [https://technet.microsoft.com/en-us/library/cc700845.aspx Update Management Process] (Updated: June 1, 2007).
::* This module provides an introduction to update management and explains why update management is essential for enterprise systems. It will introduce security terminology, together with descriptions of common vulnerabilities and types of threat. This module also describes the processes used within Microsoft to develop and release software updates, and shows how these relate to the steps you should take for proactive security update management. Finally, the four-phase approach update management process that Microsoft recommends is introduced, with more details presented in the following modules.
::* The purpose of this module is to introduce the key issues for update management in a Microsoft Windows operating system—based environment, and to describe the main tools, technologies, and processes that Microsoft recommends to support this task.
== Privileged Account Management ==
=== Published GC Guidance ===
:*[CSE] ITSB-94, [https://cse-cst.gc.ca/en/node/243/html/24929 Managing and Controlling Administrative Privileges Explained], provides high-level guidance on what constitutes managing and controlling administrative privileges as well as how to apply account management effectively.
=== Draft GC Guidance and Best Practices ===
:* [TBS] [[Media:GC ESA ConOps - ANNEX D Secure Enterprise Systems Administration v0.8.pdf|GC ESA ConOps Annex D: Secure Enterprise Systems Administration]]
:** The Secure Enterprise Systems Administration System Concept identifies security issues with the current inconsistent approaches for performing system administration, and recommends improvements to mitigate the identified security concerns as the level of inter-connectivity increases and the GC moves towards a consolidated IT/IS infrastructure. These include improvements to operational processes and technical capabilities. Use of Privileged Access Management (PAM) technologies and separation of management and production interfaces are particularly important technical aspects of improving security.
=== External/Third-Party Best Practices ===
:* Australian Signals Directorate (ASD), [http://asd.gov.au/publications/protect/secure-administration.htm Secure Administration]
::* This document discusses the importance of secure administration and suggests one method of implementing a secure administration environment.
:* Microsoft’s [https://www.microsoft.com/en-ca/download/details.aspx?id=38785 Best Practices for Securing Active Directory]
::* Contains recommendations to enhance the security of Active Directory installations, discusses common attacks against Active Directory and countermeasures to reduce the attack surface, and offers recommendations for recovery.
== System Hardening ==
=== Published GC Guidance ===
:* [CSE] ITSB-110, [https://www.cse-cst.gc.ca/en/node/1298/html/24213 Microsoft Windows 7 Enterprise Edition Hardening Configuration Guidance], provides guidance for deploying Microsoft Windows 7 Enterprise Edition operating system (OS) (i.e., Windows 7) in a manner that will best prevent compromise of GC IT assets and infrastructures in a generic internet-facing Protected B environment.
:* [Public Safety – CCIRC] CCIRC Technical Report TR15-501, [http://www.gcpedia.gc.ca/gcwiki/images/5/54/CCIRC_Technical_Report_TR15-501_Using_Microsoft_Software_Restriction_Policies_to_Prevent_Malware_Execution.pdf Using Microsoft Software Restriction Policies to Prevent Malware Execution].
::* In collaboration with, and leveraging the knowledge and experience of, its international CSIRT peers, the Canadian Cyber Incident Response Centre developed and shared TR15-501 with its federal, provincial, territorial, municipal and critical infrastructure partners in order to provide practical and effective mitigation advice with a view to reducing the cyber risk faced by Canada and Canadians.
=== Draft GC Guidance and Best Practices ===
:* None available at this time
=== External/Third-Party Best Practices ===
:* US National Institute of Standards and Technology (NIST) [https://web.nvd.nist.gov/view/ncp/repository National Checklist Program Repository]
::* The National Checklist Program (NCP), defined by the NIST [http://csrc.nist.gov/publications/nistpubs/800-70-rev2/SP800-70-rev2.pdf SP 800-70 Rev. 2], is the U.S. government repository of publicly available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems and applications.
::* This repository provides a searchable / filterable list of guidance available from multiple sources.
::* Searches can be based on: “tier” (degree of automation / Security Content Automation Protocol [SCAP] support); “target product” (application, OS, device/firmware, etc.); “category” (general type of application purpose; e.g. email server, office suite, operating system”); “authority” (issuer: vendors, CIS, DISA, MITRE, NIST, etc.); and “keyword” (searches for specified words across the name, and summary).
::* You might choose to use this resource to identify available resources for hardening that are applicable to your specific environment.
:* Center for Internet Security (CIS) [http://benchmarks.cisecurity.org/downloads/benchmarks/index.cfm Security Configuration Benchmarks]
:* US Defense Information Systems Agency (DISA) [http://iase.disa.mil/stigs/Pages/index.aspx Security Technical Implementation Guides] (STIGs)
:* NIST [http://csrc.nist.gov/groups/SNS/checklists/ Security Configuration Checklists]
:* US National Security Agency (NSA) [https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/index.shtml Security Configuration Guides]
::* NSA develops and distributes configuration guidance for a wide variety of software, both open source and proprietary. Guidance is available for:
:::* [https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/applications.shtml Applications]
:::* [https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/ics.shtml Industrial Control Systems] (ICS)
:::* [https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml Operating Systems]
:::* [https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/networks.shtml Networks]
:* Vendors or system / component originators also provide guidance and tools to support their products
::* [https://support.microsoft.com/en-us/kb/885409 Microsoft Security Configuration Guidance Support] (last reviewed: 10/14/2010) briefly identifies and describes some of the sources above (i.e. CIS, NIST, DISA and NSA) as well as potential issues to be aware of with practices described in their hardening guidance;
::* [https://technet.microsoft.com/en-us/library/cc677002.aspx Microsoft Security Compliance Manager] (SCM) is a free tool from Microsoft that “enables you to quickly configure and manage the computers in your environment and your private cloud using Group Policy and Microsoft System Center Configuration Manager”.
<!--End of SPIN-specific content-->
== Additional Information ==
Email your questions to TBS Cyber Security at [mailto:ZZTBSCYBERS@tbs-sct.gc.ca ZZTBSCYBERS@tbs-sct.gc.ca].
<br />
{| class=wikitable height=30 align=center
| '''A noter:''' une version française de cette page est disponible à: [http://www.gcpedia.gc.ca/wiki/AMOPS_2015-01 AMOPS 2015-01]
|}
[[fr:AMOPS 2015-01]]