5. Security Architecture and Privacy
Build Security into the Full System Life Cycle, Across All Architectural Layers
- Identify and classify risks associated to the service’s business objectives, goals, and strategy
- Design security measures according to business and user needs, risks identified, and security categorization of the information and assets; integrate security across all architectural layers (BIAT).
- Maintain focus on users’ ease of use through selection of context-appropriate controls
- Apply an information-centric approach to reduce resources’ exposure to threats, and minimize the opportunity for compromise.
- Protect data while in transit, in use and at rest using appropriate encryption and protocols. Ensure effective disposition of data per retention schedules, following service sunset.
- Design systems that: are not susceptible to common security vulnerabilities; are resilient and can be rebuilt quickly in the event of compromise; and fail secure if the system encounters an error or crashes.
- Reduce human intervention and maximize automation of security tasks and processes.
- Integrate and automate security testing to validate code and address vulnerabilities prior to deployments
Ensure Secure Access to Systems and Services
- Identify and authenticate users and devices to an appropriate level of assurance before granting access to information and services.
- Separate and compartmentalize user responsibilities and privileges; assign the least set of privileges necessary to complete the job.
- Constrain service interfaces to authorized entities (users and devices), with clearly defined roles, and only expose the interfaces necessary to operate the service
- Make use of modern credential guidance, and use GC-approved multi-factor authentication where required to stop unauthorized access.
Maintain Secure Operations
- Integrate SA&A activities into security architecture lifecycle processes, to ensure reference artefacts remain relevant and valid.
- Continuously monitor system events and performance in order to detect, prevent, and respond to attacks.
- Design processes to operate services securely, and establish processes and mechanisms to respond effectively to security events.
- Collect transaction logs at infrastructure and application levels to support automated root-cause analysis and performance tuning.
- Include an audit function in information systems. Use a trusted time source and protect audit logs from manipulation.
- Establish processes to monitor security advisories, and apply security-related patches and updates. Apply appropriate risk-based mitigations when patches can’t be applied.
Privacy by Design
- Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved
- Implement security measures to assure the protection of personal information
- Take into consideration the 7 Foundational Privacy Design Principles when designing services.
|