Difference between revisions of "Secure Remote Work Technical Considerations"
Line 77: | Line 77: | ||
Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android. | Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android. | ||
+ | |||
+ | ==Criteria to consider when choosing a collaborative application== | ||
+ | When choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's publication: | ||
+ | |||
+ | *Does the application the application support end-to-end (E2E) encryption? | ||
+ | *Are strong, well-known, testable encryption standards used? | ||
+ | *Is multi-factor authentication (MFA) used to validate users’ identities? | ||
+ | *Can users see and control who connects to collaboration sessions? | ||
+ | *Does the service privacy policy allow the vendor to share data with third parties or | ||
+ | affiliates? | ||
+ | *Do users have the ability to securely delete data from the service and its repositories as | ||
+ | needed? | ||
+ | *Has the collaboration service’s source code been shared publicly (e.g. open source)? | ||
+ | *Is the service developed and/or hosted under the jurisdiction of a government with laws that | ||
+ | could jeopardize government standards and policy? | ||
== References == | == References == | ||
Line 86: | Line 101: | ||
*[https://wiki.gccollab.ca/images/4/4e/Orientation_sur_la_facilitation_de_l%E2%80%99acc%C3%A8s_aux_services_Web.pdf Orientation sur la facilitation de l’accès aux services Web - SCT] | *[https://wiki.gccollab.ca/images/4/4e/Orientation_sur_la_facilitation_de_l%E2%80%99acc%C3%A8s_aux_services_Web.pdf Orientation sur la facilitation de l’accès aux services Web - SCT] | ||
*[https://onezero.medium.com/slack-zoom-google-hangouts-are-your-remote-work-apps-spying-on-you-cf1e33809cf7 Slack, Zoom, Google Hangouts: Are Your Remote Work Apps Spying on You?] | *[https://onezero.medium.com/slack-zoom-google-hangouts-are-your-remote-work-apps-spying-on-you-cf1e33809cf7 Slack, Zoom, Google Hangouts: Are Your Remote Work Apps Spying on You?] | ||
+ | *[https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF Selecting and using collaborative tools securely - NSA] | ||
*[[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|Starter Guide for Taking Part in a Zoom Call - EN]] | *[[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|Starter Guide for Taking Part in a Zoom Call - EN]] | ||
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] |
Revision as of 11:49, 4 May 2020
Overview and User Considerations | Technical Considerations | Secure Use of Collaboration Tools | Device Considerations |
---|
What is Remote Working?As cloud technology, collaborative applications and internet connectivity increase, remote working is becoming more prevalent than ever before. Remote work is often done through the following ways:
Threats and Challenges posed by Remote WorkingBy connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information. Security issues may include:
Recommended Security MeasuresAs the employee will be connected via the internet to potentially classified data and applications it is important that measures are taken to reduce the risk of a security breach. Some helpful considerations to implement include:
Home Network HardeningOut of the box, most routers have generic passwords, are out of date, and often contain exploits that can easily be used to intercept, manipulate and store network traffic. However, there are a number of actions that you can take to mitigate these security issues at home. The following were taken from a CyberScoop report that details measures to protect home networks.
For more information, check out this CyberScoop report. Canadian ShieldThe Canadian Internet Registration Authority (CIRA) have recently launched a free protected DNS service that prevents users from connecting to malicious websites and hosts. Over 80% of cyber attacks leverage DNS servers. If attackers are able to connect your device to their compromised DNS, they can begin dropping and installing malware. DNS servers translate human readable addresses into machine readable addresses. For example, if the "wiki.gccollab.ca" address is typed in on a web browser in a human language, the DNS server will match the address to another machine readable address as a set of numbers like "52.139.83.135". Canadian Shield uses data and threat intelligence to determine which DNS address request is being sent and if it is likely to be malicious. Once Canadian Shield determines that it is in fact malicious, it blocks the your request preventing your device from being infected. Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android. Criteria to consider when choosing a collaborative applicationWhen choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's publication:
affiliates?
needed?
could jeopardize government standards and policy? References
|