Difference between revisions of "GC Enterprise Architecture/Framework"
m |
(Add GC Accelerators to Cloud First Tech Architecture) |
||
Line 22: | Line 22: | ||
<!-- NAV end --> | <!-- NAV end --> | ||
− | |||
<i><h3> This is a draft copy of the proposed updates to the GC EA standards </h3></i> | <i><h3> This is a draft copy of the proposed updates to the GC EA standards </h3></i> | ||
Line 78: | Line 77: | ||
<b>Data Storage</b> | <b>Data Storage</b> | ||
− | * <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i | + | * <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i> |
− | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols</I | + | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols</I> and <I><u>legislation such as</I> the Privacy Act |
* <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules | * <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules | ||
* Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | * Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | ||
<b>Data Sharing</b> | <b>Data Sharing</b> | ||
− | * Data should be shared openly by default as per the Directive on Open Government <I><u>while taking into consideration existing laws and regulations the safeguarding of security and the privacy of data, while permitting free and open access</I | + | * Data should be shared openly by default as per the Directive on Open Government <I><u>while taking into consideration existing laws and regulations the safeguarding of security and the privacy of data, while permitting free and open access</I> |
* Ensure government-held data can be combined with data from other sources enabling interoperability and interpretability through for internal and external use | * Ensure government-held data can be combined with data from other sources enabling interoperability and interpretability through for internal and external use | ||
* Reduce existing data where possible | * Reduce existing data where possible | ||
* Encourage data sharing and collaboration | * Encourage data sharing and collaboration | ||
− | * <I><u>Validate or transform all external input before processing</I | + | * <I><u>Validate or transform all external input before processing</I> |
|} | |} | ||
Line 133: | Line 132: | ||
<b>Use Cloud first</b> | <b>Use Cloud first</b> | ||
+ | * Adopt the Use of the GC Accelerators to ensure proper Security and Access Controls - [https://github.com/canada-ca/accelerators_accelerateurs-azure Azure], [https://github.com/canada-ca/accelerators_accelerateurs-aws AWS] | ||
* Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | ||
* Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions | * Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions | ||
Line 184: | Line 184: | ||
* Implement security measures to assure the protection of personal information | * Implement security measures to assure the protection of personal information | ||
* Take into consideration the 7 foundational privacy design principles when designing services. | * Take into consideration the 7 foundational privacy design principles when designing services. | ||
− | </ | + | </I> |
|} | |} | ||
Revision as of 12:49, 7 August 2019
Home | EA standards | EARB Endorsements | EA Artifacts | Working Groups | GC EARB | Other References |
This is a draft copy of the proposed updates to the GC EA standards
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
1. Business Architecture
Design for Users First and Deliver with Multidisciplinary Teams
Design Systems to be Measurable and Accountable
|
Data Collection
Data Management
Data Storage
Data Sharing
|
Use Open Standards and Solutions by Default
Maximize Reuse
Enable Interoperability
Develop with Security in mind
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Design for Security and Privacy
Ensure Secure Access to Systems and Services
Maintain Secure Operations
Privacy by Design
|
Need help? Contact us.
|