Changes

Jump to navigation Jump to search
no edit summary
Line 88: Line 88:  
* Insufficient resources.
 
* Insufficient resources.
 
For a more detailed explanation of the benefits and risks of the GC IT security strategy and ESA program, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Program Vision and Strategy] document.   
 
For a more detailed explanation of the benefits and risks of the GC IT security strategy and ESA program, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Program Vision and Strategy] document.   
 +
 +
<br>
 +
== Key Stakeholders and Governance Structure of the GC ESA Program ==
 +
[[File:ESA Program Key Stakeholders.PNG|left|thumb|461x461px|ESA Program Key Stakeholders]]
 +
 +
=== ''Key Stakeholders'' ===
 +
While the ESA program encompasses the entire GC, there are three key stakeholders that who play a large role in designing and implementing the program. The image on the left shows the three key stakeholders, the Treasury Board of Canada Secretariat, Shared Services Canada, and Communications Security Establishment, and it briefly describes the role each of them play in carrying out the GC ESA program:
 +
 +
'''Treasury Board Secretariat:''' Develops the long-term vision and establishes the priorities for the ESA program. It also leads the development of enterprise strategies and designs.
 +
 +
'''Shared Services Canada:''' Implements designs for consolidated IT infrastructure and provides service delivery.
 +
 +
'''Communications Security Establishment:''' Provides specialized technical expertise for enterprise designs and contributes design support and review for critical components.
 +
 +
These three stakeholders formed the IT Security Tripartite to develop and maintain a consistent and cohesive enterprise IT security architecture vision, strategy and designs under the ESA program.
 +
 +
Also included in the image on the left are the many other departments that are participating in the development of designs for the IT security architectures and identifying business requirements for IT security.
 +
 +
=== ''Relationship of the GC ESA Program Governance to GC IT Security Governance'' ===
 +
The image below depicts the relationship of the IT Security Tripartite with the current GC Security Governance Structure. The scope of the GC Security Structure is much broader than IT. The IT Security Tripartite consists of members from ADM Security and Identity Committee (ADM SIDC) and the Lead Security Agency Steering Committee (LSA SC). The IT Security Tripartite aligns through the LSA SC and ADM SIDC. Communication is required to both the Departmental Security Officer and IT Security Coordinator communities, as well as to the Chief Information Officer Council (CIOC), which is the GC CIO's advisory body.
 +
 +
For more information about the ESA program key stakeholders and the relationship of the ESA program governance to the GC security governance, please read the [http://www.gcpedia.gc.ca/gcwiki/images/8/81/GC_ESA_Program_Charter.pdf GC ESA Program Charter] or its [[ESA Program Charter|synopsis]].
 +
[[File:ESA Governance Structure.PNG|centre|thumb|616x616px|ESA Program Governance and GC security governance]]
    
<br>
 
<br>

Navigation menu

GCwiki