Difference between revisions of "GC Enterprise Architecture/Framework"
m |
m |
||
Line 80: | Line 80: | ||
* <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i></u> | * <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i></u> | ||
* Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols</I></u> and <I><u>legislation such as</I></u> the Privacy Act | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols</I></u> and <I><u>legislation such as</I></u> the Privacy Act | ||
− | * <I><u>Retain data | + | * <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules |
* Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | * Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | ||
Line 159: | Line 159: | ||
* Apply a defense in depth approach to reduce exposure to threats and minimize the degree of compromise. | * Apply a defense in depth approach to reduce exposure to threats and minimize the degree of compromise. | ||
* Design services that: | * Design services that: | ||
− | + | ** Prioritize ease of use in security design to make security simple for users; | |
− | + | ** Protected from common security vulnerabilities; | |
− | + | ** Expose and secure only the interfaces necessary to operate the service; | |
− | + | ** Are resilient and can be rebuilt quickly to a known clean state in the event that a compromise is detected; and | |
− | + | ** Fail secure even if the system encounters an error or crashes. | |
* Integrate and automate security testing to validate code and address vulnerabilities prior to deployment | * Integrate and automate security testing to validate code and address vulnerabilities prior to deployment | ||
* Reduce human intervention and maximize automation of security tasks and processes. | * Reduce human intervention and maximize automation of security tasks and processes. |
Revision as of 16:00, 31 July 2019
Home | EA standards | EARB Endorsements | EA Artifacts | Working Groups | GC EARB | Other References |
This is a draft copy of the proposed updates to the GC EA standards
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
1. Business Architecture
Design for Users First and Deliver with Multidisciplinary Teams
Design Systems to be Measurable and Accountable
|
Data Collection
Data Management
Data Storage
Data Sharing
|
Use Open Standards and Solutions by Default
Maximize Reuse
Enable Interoperability
Develop with Security in mind
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Design for Security and Privacy
Ensure Secure Access to Systems and Services
Maintain Secure Operations
Privacy by Design
|
Need help? Contact us.
|