Difference between revisions of "Policy"
Marcus.mesan (talk | contribs)   | 
				|||
| (4 intermediate revisions by 2 users not shown) | |||
| Line 1: | Line 1: | ||
| + | |||
{{Cloud Information Centre - Government of Canada}}  | {{Cloud Information Centre - Government of Canada}}  | ||
<b>  | <b>  | ||
</b>  | </b>  | ||
| + | <!-- NAV -->  | ||
<!-- Columns -->  | <!-- Columns -->  | ||
| + | |||
| + | {| width="100%" cellpadding="10"   | ||
| + | |||
| + | |width="90%" style="color: black;" align="right" |   | ||
| + | <!-- COLUMN 1 STARTS: -->   | ||
| + | [[Template: Politique|Français]]   | ||
| + | <!-- COLUMN 1 ENDS: -->   | ||
| + | |width="10%" style="color: black; align=center" |   | ||
| + | |||
| + | <!-- COLUMN 2 STARTS: -->   | ||
| + | |||
| + | <!-- COLUMN 2 ENDS: -->   | ||
| + | |||
| + | <!-- Columns -->  | ||
| + | |}  | ||
{| width="100%" cellpadding="10"    | {| width="100%" cellpadding="10"    | ||
| Line 70: | Line 87: | ||
::*	[https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols]  | ::*	[https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols]  | ||
::*	[https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process]  | ::*	[https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process]  | ||
| − | ::*	[https://  | + | ::*	[https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/guideline-cloud-authentication.html Guideline on Cloud Authentication]  | 
::*	[https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain]  | ::*	[https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain]  | ||
::*	[https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)]  | ::*	[https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)]  | ||
| Line 83: | Line 100: | ||
== Cloud Security Initiative ==  | == Cloud Security Initiative ==  | ||
| − | Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security   | + | Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security initiative  [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Initiative]    | 
</big></big>  | </big></big>  | ||
{{GC Cloud Information Centre Footer}}  | {{GC Cloud Information Centre Footer}}  | ||
__FORCETOC__  | __FORCETOC__  | ||
Latest revision as of 09:44, 11 December 2024
| 
 | 
Policy Instruments
The Treasury Board Secretariat (TBS) had developed a set of policy instruments that provide the necessary policy guidance to enable smooth cloud adoption across the Government of Canada.
Strategic Plan
- Digital Operations Strategic Plan: 2018-2022
 - Government of Canada Strategic Plan for Information Management and Information Technology 2017-2021
 - Government of Canada Cloud Adoption Strategy: 2018 update
 
Policy and Directive
- Policy on Service and Digital
 - Directive on Service and Digital
 - Policy on Management of Information Technology
 - Policy Framework for Information and Technology
 - Policy on Information Management
 - Directive on Automated Decision-Making
 
Standards and Guidelines
- Digital Standards
 - Standards on Application Programming Interfaces (APIs)
 - Government of Canada right cloud selection guidance
 - Government of Canada cloud security risk management approach and procedures
 - Government of Canada Security Control Profile for Cloud-based GC Services
 - Government of Canada White Paper: Data Sovereignty and Public Cloud
 - Security and identity management guidance - Directives, standards, guidelines and publications related to security
 - Secure use of cloud services - How to put in place secure cloud solutions.
 - Recommended controls for cloud-based services - How to secure, manage, and use cloud services.
 - Using electronic signatures- Guidance on using electronic signatures in support of the GC’s day-to-day business activities.
 - Secure electronic signature regulations - Getting a valid electronic signature.
 - Public key infrastructure - Guideline on creating public keys for secure identity management
 - Password management guidance - How government services should manage user passwords
 - Privacy Impact Assessment Summaries - Privacy Impact Assessments (PIAs)
 - Choosing the right cloud service - Find out which cloud deployment model is right for your organization.
 - Data residency requirements - Understand the Government of Canada’s requirements for the storage of data within Canada.
 - Secure use of cloud services - How to put in place secure cloud solutions.
 - Risk-management for cloud-based services - Protect cloud services by ensuring that the proper security controls are in place.
 - Data sovereignty in cloud environments - Assessing the risks of foreign governments accessing Canadian data in the cloud.
 
Cloud Security
Policies and Standards
Guidance
- Government of Canada Security Control Profile for Cloud-Based GC IT Services
 - Government of Canada Cloud Security Risk Management Approach and Procedures
 - CCCS ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada
 - CCCS ITSG-38 Network Security Zoning - Design Considerations for Placement of Services within Zones
 - CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems
 - CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols
 - CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process
 - Guideline on Cloud Authentication
 - Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain
 - GC Event Logging Strategy (Draft)
 - Standard Operating Procedure for GC Cloud Event Management
 - Security Playbook for Information System Solutions
 
Tools & Templates
Cloud Security Initiative
Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security initiative Cloud Security Initiative







