Difference between revisions of "GC Enterprise Architecture/Standards"
Jump to navigation
Jump to search
(Add GC Accelerators) |
m (* added links to the accelerators) |
||
Line 123: | Line 123: | ||
<b>Use Cloud first</b> | <b>Use Cloud first</b> | ||
− | * Adopt the Use of the GC Accelerators to ensure proper Security and Access Controls | + | * Adopt the Use of the GC Accelerators to ensure proper Security and Access Controls - [https://github.com/canada-ca/accelerators_accelerateurs-azure Azure], [https://github.com/canada-ca/accelerators_accelerateurs-aws AWS] |
* Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | ||
* Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions | * Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions |
Revision as of 12:48, 7 August 2019
Home | EA standards | EARB Endorsements | EA Artifacts | Working Groups | GC EARB | Other References |
This page is a work in progress. We welcome your feedback. Please use the discussion page for suggestions and comments. When the page is approved and finalized, we will send it for translation. |
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
1. Business Architecture
Design for Users First and Deliver with Multidisciplinary Teams
Design Systems to be Measurable and Accountable
|
Data Collection
Data Management
Data Storage
Data Sharing
|
Use Open Standards and Solutions by Default
Maximize Reuse
Enable Interoperability
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Design for Security and Privacy
|
Need help? Contact us.
|