Difference between revisions of "GC Enterprise Architecture/Framework"
Line 84: | Line 84: | ||
* Contribute all improvements back to the communities | * Contribute all improvements back to the communities | ||
* Register Open Source software to the Open Resource Exchange | * Register Open Source software to the Open Resource Exchange | ||
+ | <br> | ||
<b>Use SaaS hosted in the Cloud</b> | <b>Use SaaS hosted in the Cloud</b> | ||
Line 89: | Line 90: | ||
* Align with SaaS capabilities; extend as Open Source modules | * Align with SaaS capabilities; extend as Open Source modules | ||
* Configuration over customization | * Configuration over customization | ||
+ | <br> | ||
<b>Design for [https://www.gcpedia.gc.ca/wiki/En/GCinterop Interoperability]</b> | <b>Design for [https://www.gcpedia.gc.ca/wiki/En/GCinterop Interoperability]</b> | ||
Line 94: | Line 96: | ||
* Use micro services scoped to a single purpose and API-led connectivity | * Use micro services scoped to a single purpose and API-led connectivity | ||
* Expose functionality as services, make services available through APIs and make the APIs discoverable | * Expose functionality as services, make services available through APIs and make the APIs discoverable | ||
+ | <br> | ||
<b>Use DevOps / Continuous Integration to ensure maintainability and AB Testing</b> | <b>Use DevOps / Continuous Integration to ensure maintainability and AB Testing</b> | ||
Line 113: | Line 116: | ||
* Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions | * Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions | ||
* Design for cloud mobility and develop an exit strategy to avoid vendor lock-in | * Design for cloud mobility and develop an exit strategy to avoid vendor lock-in | ||
+ | <br> | ||
<b>Design for Performance, Availability, and Scalability</b> | <b>Design for Performance, Availability, and Scalability</b> | ||
− | |||
* Ensure response times meet user needs, and critical services are highly available | * Ensure response times meet user needs, and critical services are highly available | ||
* Support zero-downtime deployments for planned and unplanned maintenance | * Support zero-downtime deployments for planned and unplanned maintenance | ||
Line 133: | Line 136: | ||
<b>Build Security into the Full System Life Cycle, Across All Architectural Layers</b> | <b>Build Security into the Full System Life Cycle, Across All Architectural Layers</b> | ||
* Identify and classify risks associated to the service’s business objectives, goals, and strategy | * Identify and classify risks associated to the service’s business objectives, goals, and strategy | ||
− | * Design security measures according to business and user needs, risks identified, and security categorization of the information and assets; integrate security across all architectural layers (BIAT) | + | * Design security measures according to business and user needs, risks identified, and security categorization of the information and assets; integrate security across all architectural layers (BIAT) |
− | + | * Design systems to not be susceptible to common security vulnerabilities; resilient and can be rebuilt quickly in the event of compromise; and fail secure if the system encounters an error or crashes | |
− | + | * Ensure that data received from external parties is profiled and validated prior to its use | |
− | + | <br> | |
− | * Design systems | ||
− | * | ||
− | |||
<b>Ensure Secure Access to Systems and Services</b> | <b>Ensure Secure Access to Systems and Services</b> | ||
− | * Identify and authenticate | + | * Identify and authenticate individuals, processes and/or devices to an appropriate level of assurance before granting access to information and services |
− | + | * Constrain service interfaces to authorized entities (users and devices), with clearly defined roles | |
− | * Constrain service interfaces to authorized entities (users and devices), with clearly defined roles | + | * Make use of modern password guidance, and prioritizing length over complexity, eliminating expiry, and blacklisting common passwords |
− | * Make use of modern | + | <br> |
<b>Maintain Secure Operations</b> | <b>Maintain Secure Operations</b> | ||
− | * Integrate | + | * Integrate aggregate outputs from security assessment and authorization activities into security architecture lifecycle processes, to ensure reference artefacts remain relevant and valid |
− | * | + | * Design processes to operate and manage services securely, and continuously monitor system events and performance in order to detect, prevent, and respond to attacks |
− | + | * Establish processes to monitor security advisories, and apply security-related patches and updates to reduce exposure to vulnerabilities. Apply appropriate risk-based mitigations when patches can’t be applied | |
− | |||
− | |||
− | * Establish processes to monitor security advisories, and apply security-related patches and updates. Apply appropriate risk-based mitigations when patches can’t be applied | ||
<br> | <br> | ||
+ | |||
<b> Privacy by Design </b> | <b> Privacy by Design </b> | ||
* Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved | * Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved |
Revision as of 08:55, 23 December 2019
This is a DRAFT COPY of the proposed updates to the GC EA standards
Changes from the previous version are marked as underlined and new additions are marked as italic and underlined
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
To view more detailed info on each point listed below, you can click on the top title for each of the Architecture layer, OR any of the blue link below.
Fulfill the Government of Canada stakeholder's needs
Promote Horizontal Enablement of the Enterprise
|
Data Collection
Ensure that Data is Managed Responsibly and in a manner that Maximize Use, Reuse and Availability of Data
Data Sharing
|
Use Open Source Solutions hosted in the Cloud
Use SaaS hosted in the Cloud
Design for Interoperability
Use DevOps / Continuous Integration to ensure maintainability and AB Testing
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Build Security into the Full System Life Cycle, Across All Architectural Layers
Ensure Secure Access to Systems and Services
Maintain Secure Operations
Privacy by Design
|
Need help? Contact us.
|