Important: The GCConnex decommission will not affect GCCollab or GCWiki. Thank you and happy collaborating!
Difference between revisions of "Policy"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
| Line 26: | Line 26: | ||
* [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/gc-white-paper-data-sovereignty-public-cloud.html Government of Canada White Paper: Data Sovereignty and Public Cloud]  | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/gc-white-paper-data-sovereignty-public-cloud.html Government of Canada White Paper: Data Sovereignty and Public Cloud]  | ||
* Secu[https://www.canada.ca/en/treasury-board-secretariat/services/access-information-privacy/security-identity-management.html rity and identity management guidance - Directives, standards, guidelines and publications related to security]    | * Secu[https://www.canada.ca/en/treasury-board-secretariat/services/access-information-privacy/security-identity-management.html rity and identity management guidance - Directives, standards, guidelines and publications related to security]    | ||
| − | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/direction-secure-use-commercial-cloud-services-spin.html Secure use of cloud services - How to put in place secure cloud solutions.  | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/direction-secure-use-commercial-cloud-services-spin.html Secure use of cloud services] - How to put in place secure cloud solutions.    | 
| − | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html Recommended controls for cloud-based services - How to secure, manage, and use cloud services.  | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html Recommended controls for cloud-based services] - How to secure, manage, and use cloud services.    | 
| − | * Using electronic signatures - Guidance on using electronic signatures in support of the GC’s day-to-day business activities.  | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html Using electronic signatures]- Guidance on using electronic signatures in support of the GC’s day-to-day business activities.  | 
| − | * Secure electronic signature regulations - Getting a valid electronic signature.  | + | * [https://www.canada.ca/en/government/system/digital-government/online-security-privacy/government-canada-guidance-using-electronic-signatures.html Secure electronic signature regulations] - Getting a valid electronic signature.  | 
| − | * Public key infrastructure - Guideline on creating public keys for secure identity management    | + | * [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=20008 Public key infrastructure ] - Guideline on creating public keys for secure identity management    | 
| − | * Password management guidance - How government services should manage user passwords  | + | * [https://www.canada.ca/en/government/system/digital-government/password-guidance.html Password management guidance ] - How government services should manage user passwords  | 
| − | * Privacy Impact Assessment Summaries - Privacy Impact Assessments (PIAs)  | + | * [https://www.canada.ca/en/revenue-agency/services/about-canada-revenue-agency-cra/protecting-your-privacy/privacy-impact-assessment.html Privacy Impact Assessment Summaries] - Privacy Impact Assessments (PIAs)  | 
| − | * Choosing the right cloud service - Find out which cloud deployment model is right for your organization.  | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-right-cloud-selection-guidance.html Choosing the right cloud service] - Find out which cloud deployment model is right for your organization.  | 
| − | * Data residency requirements - Understand the Government of Canada’s requirements for the storage of data within Canada.  | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/direction-electronic-data-residency.html Data residency requirements] - Understand the Government of Canada’s requirements for the storage of data within Canada.  | 
| − | * Secure use of cloud services - How to put in place secure cloud solutions.    | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/direction-secure-use-commercial-cloud-services-spin.html Secure use of cloud services] - How to put in place secure cloud solutions.    | 
| − | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html Risk-management for cloud-based services] - Protect cloud services by ensuring that the proper security controls are in place.  | |
| − | * Risk-management for cloud-based services  | + | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/gc-white-paper-data-sovereignty-public-cloud.html Data sovereignty in cloud environments] - Assessing the risks of foreign governments accessing Canadian data in the cloud.    | 
| − | |||
| − | * Data sovereignty in cloud environments - Assessing the risks of foreign governments accessing Canadian data in the cloud.    | ||
</big></big><multilang>  | </big></big><multilang>  | ||
@en|__NOTOC__  | @en|__NOTOC__  | ||
Revision as of 14:59, 28 January 2020
Policy Instruments
The Treasury Board Secretariat (TBS) had developed a set of policy instruments that provide the necessary policy guidance to enable smooth cloud adoption across the Government of Canada.
Strategic Plan
- Digital Operations Strategic Plan: 2018-2022
 - Government of Canada Strategic Plan for Information Management and Information Technology 2017-2021
 - Government of Canada Cloud Adoption Strategy: 2018 update
 
Policy and Directive
- Policy on Service and Digital
 - Directive on Service and Digital
 - Policy on Management of Information Technology
 - Policy Framework for Information and Technology
 - Policy on Information Management
 - Directive on Automated Decision-Making
 
Standards and Guidelines
- Digital Standards
 - Standards on Application Programming Interfaces (APIs)
 - Government of Canada right cloud selection guidance
 - Government of Canada cloud security risk management approach and procedures
 - Government of Canada Security Control Profile for Cloud-based GC Services
 - Government of Canada White Paper: Data Sovereignty and Public Cloud
 - Security and identity management guidance - Directives, standards, guidelines and publications related to security
 - Secure use of cloud services - How to put in place secure cloud solutions.
 - Recommended controls for cloud-based services - How to secure, manage, and use cloud services.
 - Using electronic signatures- Guidance on using electronic signatures in support of the GC’s day-to-day business activities.
 - Secure electronic signature regulations - Getting a valid electronic signature.
 - Public key infrastructure - Guideline on creating public keys for secure identity management
 - Password management guidance - How government services should manage user passwords
 - Privacy Impact Assessment Summaries - Privacy Impact Assessments (PIAs)
 - Choosing the right cloud service - Find out which cloud deployment model is right for your organization.
 - Data residency requirements - Understand the Government of Canada’s requirements for the storage of data within Canada.
 - Secure use of cloud services - How to put in place secure cloud solutions.
 - Risk-management for cloud-based services - Protect cloud services by ensuring that the proper security controls are in place.
 - Data sovereignty in cloud environments - Assessing the risks of foreign governments accessing Canadian data in the cloud.
 





