Important: The GCConnex decommission will not affect GCCollab or GCWiki. Thank you and happy collaborating!
Difference between revisions of "Policy"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
| Line 38: | Line 38: | ||
* [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html Risk-management for cloud-based services] - Protect cloud services by ensuring that the proper security controls are in place.  | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html Risk-management for cloud-based services] - Protect cloud services by ensuring that the proper security controls are in place.  | ||
* [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/gc-white-paper-data-sovereignty-public-cloud.html Data sovereignty in cloud environments] - Assessing the risks of foreign governments accessing Canadian data in the cloud.    | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/gc-white-paper-data-sovereignty-public-cloud.html Data sovereignty in cloud environments] - Assessing the risks of foreign governments accessing Canadian data in the cloud.    | ||
| + | |||
== Cloud Security ==  | == Cloud Security ==  | ||
| − | Learn recommendations and actions that your Department can implement to protect your networks through the [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Intiative]    | + | |
| + | ===  Policies and Standards ===  | ||
| + | ::*	Policy on Management of Information Technology  | ||
| + | ::*	Policy on Government Security  | ||
| + | ::*	Direction for Electronic Data Residency, ITPIN No: 2017-02  | ||
| + | ::*	Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN)  | ||
| + | |||
| + | === Guidance ===  | ||
| + | ::*	Government of Canada Security Control Profile for Cloud-Based GC IT Services  | ||
| + | ::*	Government of Canada Cloud Security Risk Management Approach and Procedures  | ||
| + | ::*	CCCS ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada  | ||
| + | ::*	CCCS ITSG-38 Network Security Zoning - Design Considerations for Placement of Services within Zones  | ||
| + | ::*	CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems  | ||
| + | ::*	CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols  | ||
| + | ::*	CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process  | ||
| + | ::*	Guidance on Cloud Authentication for the Government of Canada  | ||
| + | ::*	Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain  | ||
| + | ::*	GC Event Logging Strategy (Draft)  | ||
| + | ::*	Standard Operating Procedure for GC Cloud Event Management  | ||
| + | ::*	Security Playbook for Information System Solutions  | ||
| + | |||
| + | === Tools & Templates ===  | ||
| + | |||
| + | ::*	https://gccode.ssc-spc.gc.ca/GCCloudEnablement  | ||
| + | ::*     https://github.com/canada-ca/accelerators_accelerateurs-azure  | ||
| + | ::*	https://github.com/canada-ca/accelerators_accelerateurs-aws  | ||
| + | |||
| + | == Cloud Security Initiative ==  | ||
| + | Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security inititative  [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Intiative]    | ||
</big></big>  | </big></big>  | ||
{{GC Cloud Information Centre Footer}}  | {{GC Cloud Information Centre Footer}}  | ||
__FORCETOC__  | __FORCETOC__  | ||
Revision as of 13:50, 30 January 2020
Policy Instruments
The Treasury Board Secretariat (TBS) had developed a set of policy instruments that provide the necessary policy guidance to enable smooth cloud adoption across the Government of Canada.
Strategic Plan
- Digital Operations Strategic Plan: 2018-2022
 - Government of Canada Strategic Plan for Information Management and Information Technology 2017-2021
 - Government of Canada Cloud Adoption Strategy: 2018 update
 
Policy and Directive
- Policy on Service and Digital
 - Directive on Service and Digital
 - Policy on Management of Information Technology
 - Policy Framework for Information and Technology
 - Policy on Information Management
 - Directive on Automated Decision-Making
 
Standards and Guidelines
- Digital Standards
 - Standards on Application Programming Interfaces (APIs)
 - Government of Canada right cloud selection guidance
 - Government of Canada cloud security risk management approach and procedures
 - Government of Canada Security Control Profile for Cloud-based GC Services
 - Government of Canada White Paper: Data Sovereignty and Public Cloud
 - Security and identity management guidance - Directives, standards, guidelines and publications related to security
 - Secure use of cloud services - How to put in place secure cloud solutions.
 - Recommended controls for cloud-based services - How to secure, manage, and use cloud services.
 - Using electronic signatures- Guidance on using electronic signatures in support of the GC’s day-to-day business activities.
 - Secure electronic signature regulations - Getting a valid electronic signature.
 - Public key infrastructure - Guideline on creating public keys for secure identity management
 - Password management guidance - How government services should manage user passwords
 - Privacy Impact Assessment Summaries - Privacy Impact Assessments (PIAs)
 - Choosing the right cloud service - Find out which cloud deployment model is right for your organization.
 - Data residency requirements - Understand the Government of Canada’s requirements for the storage of data within Canada.
 - Secure use of cloud services - How to put in place secure cloud solutions.
 - Risk-management for cloud-based services - Protect cloud services by ensuring that the proper security controls are in place.
 - Data sovereignty in cloud environments - Assessing the risks of foreign governments accessing Canadian data in the cloud.
 
Cloud Security
Policies and Standards
- Policy on Management of Information Technology
 - Policy on Government Security
 - Direction for Electronic Data Residency, ITPIN No: 2017-02
 - Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN)
 
Guidance
- Government of Canada Security Control Profile for Cloud-Based GC IT Services
 - Government of Canada Cloud Security Risk Management Approach and Procedures
 - CCCS ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada
 - CCCS ITSG-38 Network Security Zoning - Design Considerations for Placement of Services within Zones
 - CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems
 - CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols
 - CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process
 - Guidance on Cloud Authentication for the Government of Canada
 - Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain
 - GC Event Logging Strategy (Draft)
 - Standard Operating Procedure for GC Cloud Event Management
 - Security Playbook for Information System Solutions
 
Tools & Templates
Cloud Security Initiative
Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security inititative Cloud Security Intiative





