| Line 452: | 
Line 452: | 
|   | ====== '''Guidance''' ======  |   | ====== '''Guidance''' ======  | 
|   |  |   |  | 
| − | [https://canada-ca.github.io/digital-playbook-guide-numerique/en/overview.html| Government of Canada Digital Playbook (draft)]  | + | [https://canada-ca.github.io/digital-playbook-guide-numerique/en/overview.html Government of Canada Digital Playbook (draft)]  | 
|   |  |   |  | 
| − | [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html| Government of Canada Security Control Profile for Cloud-Based GC IT Services]  | + | [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/government-canada-security-control-profile-cloud-based-it-services.html Government of Canada Security Control Profile for Cloud-Based GC IT Services]  | 
|   |  |   |  | 
| − | [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html| Government of Canada Cloud Security Risk Management Approach and Procedures]  | + | [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/cloud-security-risk-management-approach-procedures.html Government of Canada Cloud Security Risk Management Approach and Procedures]  | 
|   |  |   |  | 
| − | [https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22| CSE ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada]  | + | [https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22 CSE ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada]  | 
|   |  |   |  | 
| − | [https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38| CSE ITSG-38 Network Security Zoning – Design Consideration for Placement of Services within Zones]  | + | [https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38 CSE ITSG-38 Network Security Zoning – Design Consideration for Placement of Services within Zones]  | 
|   |  |   |  | 
| − | [https://www.cse-cst.gc.ca/en/system/files/pdf_documents/itsp.30.031v2-eng.pdf| CSE ITSG.30.031 V2 User Authentication Guidance for Information Technology Systems]  | + | [https://www.cse-cst.gc.ca/en/system/files/pdf_documents/itsp.30.031v2-eng.pdf CSE ITSG.30.031 V2 User Authentication Guidance for Information Technology Systems]  | 
|   |  |   |  | 
| − | [https://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062| CSE ITSG.40.062 Guidance on Securely Configuring Network Protocols]  | + | [https://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062 CSE ITSG.40.062 Guidance on Securely Configuring Network Protocols]  | 
|   |  |   |  | 
|   | ====== '''Blog''' ======  |   | ====== '''Blog''' ======  |