Difference between revisions of "GC Enterprise Architecture/Framework"
m |
|||
Line 174: | Line 174: | ||
<span style="font-size: 1.5em;">[[GC_Security_and_Privacy_Enterprise_Architecture | 5. Security Architecture and Privacy]]</span> <br><br> | <span style="font-size: 1.5em;">[[GC_Security_and_Privacy_Enterprise_Architecture | 5. Security Architecture and Privacy]]</span> <br><br> | ||
− | |||
<I><u> | <I><u> | ||
− | * | + | <b>Build Security into the Full System Life Cycle, Across All Architectural Layers</b> |
− | * | + | * Identify and classify risks associated to the service’s business objectives, goals, and strategy |
− | * | + | * Design security measures according to business and user needs, risks identified, and security categorization of the information and assets; integrate security across all architectural layers (BIAT). |
− | * Protect data while in transit, in use and at rest using appropriate encryption and protocols. | + | ** Maintain focus on users’ ease of use through selection of context-appropriate controls |
− | + | ** Apply an information-centric approach to reduce resources’ exposure to threats, and minimize the opportunity for compromise. | |
− | * Design | + | ** Protect data while in transit, in use and at rest using appropriate encryption and protocols. Ensure effective disposition of data per retention schedules, following service sunset. |
− | + | * Design systems that: are not susceptible to common security vulnerabilities; are resilient and can be rebuilt quickly in the event of compromise; and fail secure if the system encounters an error or crashes. | |
− | |||
− | |||
− | |||
− | |||
− | |||
* Reduce human intervention and maximize automation of security tasks and processes. | * Reduce human intervention and maximize automation of security tasks and processes. | ||
+ | ** Integrate and automate security testing to validate code and address vulnerabilities prior to deployments | ||
− | <b> Ensure Secure Access to Systems and Services </b> | + | <b>Ensure Secure Access to Systems and Services</b> |
− | + | * Identify and authenticate users and devices to an appropriate level of assurance before granting access to information and services. | |
− | * Identify and authenticate | + | * Separate and compartmentalize user responsibilities and privileges; assign the least set of privileges necessary to complete the job. |
− | * Separate and | + | * Constrain service interfaces to authorized entities (users and devices), with clearly defined roles, and only expose the interfaces necessary to operate the service |
− | * | + | * Make use of modern credential guidance, and use GC-approved multi-factor authentication where required to stop unauthorized access. |
− | |||
− | |||
− | |||
− | |||
− | * | ||
− | |||
− | |||
+ | <b>Maintain Secure Operations</b> | ||
+ | * Integrate SA&A activities into security architecture lifecycle processes, to ensure reference artefacts remain relevant and valid. | ||
+ | * Continuously monitor system events and performance in order to detect, prevent, and respond to attacks. | ||
+ | * Design processes to operate services securely, and establish processes and mechanisms to respond effectively to security events. | ||
+ | * Collect transaction logs at infrastructure and application levels to support automated root-cause analysis and performance tuning. | ||
+ | * Include an audit function in information systems. Use a trusted time source and protect audit logs from manipulation. | ||
+ | * Establish processes to monitor security advisories, and apply security-related patches and updates. Apply appropriate risk-based mitigations when patches can’t be applied. | ||
+ | <br> | ||
<b> Privacy by Design </b> | <b> Privacy by Design </b> | ||
* Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved | * Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved | ||
* Implement security measures to assure the protection of personal information | * Implement security measures to assure the protection of personal information | ||
* Take into consideration the <b>[https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/ 7 Foundational Privacy Design Principles] </b> when designing services. | * Take into consideration the <b>[https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/ 7 Foundational Privacy Design Principles] </b> when designing services. | ||
− | </I> | + | </u></I> |
|} | |} | ||
Revision as of 11:08, 6 December 2019
This is a DRAFT COPY of the proposed updates to the GC EA standards
Changes from the previous version are marked as underlined and new additions are marked as italic and underlined
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
Fulfillment to the needs of the stakeholders to the Government of Canada
|
Data Collection
Ensure that Data is Managed Responsibly and in a manner that Maximize Use, Reuse and Availability of Data
Data Sharing
|
Use Open Standards and Solutions by Default
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Build Security into the Full System Life Cycle, Across All Architectural Layers
Ensure Secure Access to Systems and Services
Maintain Secure Operations
|
Need help? Contact us.
|