Line 69: |
Line 69: |
| * Compute and Storage Services Security (CSS) | | * Compute and Storage Services Security (CSS) |
| For more information about the ESA program areas of focus, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Vision and Strategy] document. | | For more information about the ESA program areas of focus, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Vision and Strategy] document. |
| + | |
| + | <br> |
| + | == Benefits and Risks of the GC ESA Program == |
| + | Implementation of the GC IT security strategy, including the GC ESA program, will result in many benefits, including: |
| + | * Enhanced security posture throughout the GC; |
| + | * Better awareness of threats to GC IT infrastructure; |
| + | * Improved understanding of the motivations and techniques of adversaries; |
| + | * Increased abilities to provide rapid response to IT security incidents affecting GC systems; |
| + | * Better positioned to acquire and share cyber threat information from/with trusted partners; and |
| + | * Enhanced level of confidence with users, citizens, allies and other levels of government. |
| + | However, while the benefits are substantial, the GC IT security strategy is not without any risks, including: |
| + | * Culture shift, |
| + | * Costs, |
| + | * Achieving balanced results, |
| + | * Long-term commitment, |
| + | * Technology advancements, |
| + | * Technology limitations, and |
| + | * Insufficient resources. |
| + | For a more detailed explanation of the benefits and risks of the GC IT security strategy and ESA program, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Program Vision and Strategy] document. |
| | | |
| <br> | | <br> |