Important: The GCConnex decommission will not affect GCCollab or GCWiki. Thank you and happy collaborating!
Difference between revisions of "Policy"
Jump to navigation
Jump to search
Marcus.mesan (talk | contribs) |
Marcus.mesan (talk | contribs) |
||
Line 87: | Line 87: | ||
::* [https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols] | ::* [https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols] | ||
::* [https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process] | ::* [https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process] | ||
− | ::* [https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/guideline-cloud-authentication.html | + | ::* [https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/guideline-cloud-authentication.html Guideline on Cloud Authentication] |
::* [https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain] | ::* [https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain] | ||
::* [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)] | ::* [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)] |
Latest revision as of 09:44, 11 December 2024
|
Policy Instruments
The Treasury Board Secretariat (TBS) had developed a set of policy instruments that provide the necessary policy guidance to enable smooth cloud adoption across the Government of Canada.
Strategic Plan
- Digital Operations Strategic Plan: 2018-2022
- Government of Canada Strategic Plan for Information Management and Information Technology 2017-2021
- Government of Canada Cloud Adoption Strategy: 2018 update
Policy and Directive
- Policy on Service and Digital
- Directive on Service and Digital
- Policy on Management of Information Technology
- Policy Framework for Information and Technology
- Policy on Information Management
- Directive on Automated Decision-Making
Standards and Guidelines
- Digital Standards
- Standards on Application Programming Interfaces (APIs)
- Government of Canada right cloud selection guidance
- Government of Canada cloud security risk management approach and procedures
- Government of Canada Security Control Profile for Cloud-based GC Services
- Government of Canada White Paper: Data Sovereignty and Public Cloud
- Security and identity management guidance - Directives, standards, guidelines and publications related to security
- Secure use of cloud services - How to put in place secure cloud solutions.
- Recommended controls for cloud-based services - How to secure, manage, and use cloud services.
- Using electronic signatures- Guidance on using electronic signatures in support of the GC’s day-to-day business activities.
- Secure electronic signature regulations - Getting a valid electronic signature.
- Public key infrastructure - Guideline on creating public keys for secure identity management
- Password management guidance - How government services should manage user passwords
- Privacy Impact Assessment Summaries - Privacy Impact Assessments (PIAs)
- Choosing the right cloud service - Find out which cloud deployment model is right for your organization.
- Data residency requirements - Understand the Government of Canada’s requirements for the storage of data within Canada.
- Secure use of cloud services - How to put in place secure cloud solutions.
- Risk-management for cloud-based services - Protect cloud services by ensuring that the proper security controls are in place.
- Data sovereignty in cloud environments - Assessing the risks of foreign governments accessing Canadian data in the cloud.
Cloud Security
Policies and Standards
Guidance
- Government of Canada Security Control Profile for Cloud-Based GC IT Services
- Government of Canada Cloud Security Risk Management Approach and Procedures
- CCCS ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada
- CCCS ITSG-38 Network Security Zoning - Design Considerations for Placement of Services within Zones
- CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems
- CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols
- CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process
- Guideline on Cloud Authentication
- Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain
- GC Event Logging Strategy (Draft)
- Standard Operating Procedure for GC Cloud Event Management
- Security Playbook for Information System Solutions
Tools & Templates
Cloud Security Initiative
Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security initiative Cloud Security Initiative