Changes

Line 355: Line 355:  
A lot more information can be found here:   
 
A lot more information can be found here:   
 
* [https://www.gcpedia.gc.ca/wiki/Government_of_Canada_Enterprise_Security_Architecture_(ESA)_Program; Government of Canada Enterprise Security Architecture (ESA) Program and here:]
 
* [https://www.gcpedia.gc.ca/wiki/Government_of_Canada_Enterprise_Security_Architecture_(ESA)_Program; Government of Canada Enterprise Security Architecture (ESA) Program and here:]
* [https://www.gcpedia.gc.ca/gcwiki/images/a/ac/GC_ESA_Description_Document_%28ESADD%29_-_Main_Body.pdf GC ESA Description Document Main Body -- Synopsis]<br><br>
+
* [https://www.gcpedia.gc.ca/gcwiki/images/a/ac/GC_ESA_Description_Document_%28ESADD%29_-_Main_Body.pdf GC ESA Description Document Main Body -- Synopsis]<br><br><!-- FOOTER -->
<h4><b>Build Security into the Full System Life Cycle, Across All Architectural Layers</b></h4>
+
{| width="100%" cellpadding="10"  
* Identify and classify risks associated to the service’s business objectives, goals, and strategy
  −
* Design security measures according to business and user needs, risks identified, and security categorization of the information and assets; integrate security across all architectural layers (BIAT)
  −
** Maintain focus on users’ ease of use through selection of context-appropriate controls
  −
** Apply an information-centric approach to reduce resources’ exposure to threats, and minimize the opportunity for compromise.
  −
** Protect data while in transit, in use and at rest using appropriate encryption and protocols. Ensure effective disposition of data per retention schedules, following service sunset.
  −
 
  −
* Design systems to not be susceptible to common security vulnerabilities; resilient and can be rebuilt quickly in the event of compromise; and fail secure if the system encounters an error or crashes
  −
* Reduce human intervention and maximize automation of security tasks and processes
  −
** Integrate and automate security testing to validate code and address vulnerabilities prior to deployments
  −
<br>
  −
 
  −
<h4><b>Ensure Secure Access to Systems and Services</b></h4>
  −
* Identify and authenticate individuals, processes and/or devices to an appropriate level of assurance before granting access to information and services
  −
* Separate and compartmentalize user responsibilities and privileges; assign the least set of privileges necessary to complete the job
  −
* Constrain service interfaces to authorized entities (users and devices), with clearly defined roles, and only expose the interfaces necessary to operate the service
  −
* Make use of modern password guidance, and use GC-approved multi-factor authentication where required to stop unauthorized access
  −
(prioritize length over complexity, eliminating expiry, and blacklisting common passwords)
  −
<br><br>
  −
 
  −
<h4><b>Maintain Secure Operations</b></h4>
  −
* Integrate aggregate outputs from security assessment and authorization activities into security architecture lifecycle processes, to ensure reference artefacts remain relevant and valid
  −
* Continuously monitor system events and performance in order to detect, prevent, and respond to attacks
  −
* Design processes to operate and manage services securely, and establish processes and mechanisms to respond effectively to security events
  −
** Collect transaction logs at infrastructure and application levels to support automated root-cause analysis and performance tuning
  −
** Include an audit function in information systems. Use a trusted time source and protect audit logs from manipulation
  −
* Establish processes to monitor security advisories, and apply security-related patches and updates to reduce exposure to vulnerabilities. Apply appropriate risk-based mitigations when patches can’t be applied
  −
<br>
  −
 
  −
<h4><b> Privacy by Design </b></h4>
  −
* Perform a privacy impact assessment (PIA) to support risk mitigation activities when personal information is involved
  −
* Perform [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/responsible-use-ai/algorithmic-impact-assessment.html Algorithmic Impact Assessment (AIA)] to support risk mitigation activities when deploying an automated decision system
  −
* Implement security measures to assure the protection of personal information
  −
* Take into consideration the <b>[https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/ 7 Foundational Privacy Design Principles] </b> when designing services
  −
 
  −
<!-- FOOTER -->{| width="100%" cellpadding="10"  
      
|- valign="top"
 
|- valign="top"