| Line 38: | 
Line 38: | 
|   | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html Risk-management for cloud-based services] - Protect cloud services by ensuring that the proper security controls are in place.  |   | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html Risk-management for cloud-based services] - Protect cloud services by ensuring that the proper security controls are in place.  | 
|   | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/gc-white-paper-data-sovereignty-public-cloud.html Data sovereignty in cloud environments] - Assessing the risks of foreign governments accessing Canadian data in the cloud.    |   | * [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/gc-white-paper-data-sovereignty-public-cloud.html Data sovereignty in cloud environments] - Assessing the risks of foreign governments accessing Canadian data in the cloud.    | 
|   | + |  | 
|   | == Cloud Security ==  |   | == Cloud Security ==  | 
| − | Learn recommendations and actions that your Department can implement to protect your networks through the [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Intiative]    | + |    | 
|   | + | ===  Policies and Standards ===  | 
|   | + | ::*	Policy on Management of Information Technology  | 
|   | + | ::*	Policy on Government Security  | 
|   | + | ::*	Direction for Electronic Data Residency, ITPIN No: 2017-02  | 
|   | + | ::*	Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN)  | 
|   | + |    | 
|   | + | === Guidance ===  | 
|   | + | ::*	Government of Canada Security Control Profile for Cloud-Based GC IT Services  | 
|   | + | ::*	Government of Canada Cloud Security Risk Management Approach and Procedures  | 
|   | + | ::*	CCCS ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada  | 
|   | + | ::*	CCCS ITSG-38 Network Security Zoning - Design Considerations for Placement of Services within Zones  | 
|   | + | ::*	CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems  | 
|   | + | ::*	CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols  | 
|   | + | ::*	CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process  | 
|   | + | ::*	Guidance on Cloud Authentication for the Government of Canada  | 
|   | + | ::*	Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain  | 
|   | + | ::*	GC Event Logging Strategy (Draft)  | 
|   | + | ::*	Standard Operating Procedure for GC Cloud Event Management  | 
|   | + | ::*	Security Playbook for Information System Solutions  | 
|   | + |    | 
|   | + | === Tools & Templates ===  | 
|   | + |    | 
|   | + | ::*	https://gccode.ssc-spc.gc.ca/GCCloudEnablement  | 
|   | + | ::*     https://github.com/canada-ca/accelerators_accelerateurs-azure  | 
|   | + | ::*	https://github.com/canada-ca/accelerators_accelerateurs-aws  | 
|   | + |    | 
|   | + | == Cloud Security Initiative ==  | 
|   | + | Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security inititative  [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Intiative]    | 
|   | </big></big>  |   | </big></big>  | 
|   | {{GC Cloud Information Centre Footer}}  |   | {{GC Cloud Information Centre Footer}}  | 
|   | __FORCETOC__  |   | __FORCETOC__  |