Changes

Jump to navigation Jump to search
no edit summary
Line 84: Line 84:  
** [https://intranet.canada.ca/wg-tg/rtua-rafu-fra.asp Recommandations pour l'authentification à deux facteurs des utilisateurs dans le domaine opérationnel du gouvernement du Canada]
 
** [https://intranet.canada.ca/wg-tg/rtua-rafu-fra.asp Recommandations pour l'authentification à deux facteurs des utilisateurs dans le domaine opérationnel du gouvernement du Canada]
 
** [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management]
 
** [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management]
 +
 
* [https://github.com/canada-ca/cloud-guardrails Mesures de protection du GC]
 
* [https://github.com/canada-ca/cloud-guardrails Mesures de protection du GC]
 
** GC EARB Guardrails Endorsement (September 19th)
 
** GC EARB Guardrails Endorsement (September 19th)
Line 89: Line 90:  
** [https://github.com/canada-ca/cloud-guardrails-aws/tree/master/tools/prowler GC Cloud Guardrails Prowler Checks for AWS]
 
** [https://github.com/canada-ca/cloud-guardrails-aws/tree/master/tools/prowler GC Cloud Guardrails Prowler Checks for AWS]
 
** [https://github.com/canada-ca/cloud-guardrails-O365 GC Guardrails for MS Office 365]
 
** [https://github.com/canada-ca/cloud-guardrails-O365 GC Guardrails for MS Office 365]
* Canadian Centre for Cyber Security Guidance
+
* Centre canadien pour la cybersécurité Guidance
** [https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22 CCCS ITSG-22 Baseline Security Requirements for Network Security Zones in the Government of Canada]
+
** [https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-government-canada-itsg-22 CCCS Exigences de base en matière de sécurité pour les zones de sécurité de réseau au sein du gouvernement du Canada ITSG-22]
** [https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38 CCCS ITSG-38 Network Security Zoning - Design Considerations for Placement of Services within Zones]
+
** [https://cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38 CCCS Considérations de conception relatives au positionnement des services dans les zones ITSG-38]
** [https://cyber.gc.ca/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3 CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems]
+
** [https://cyber.gc.ca/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3 CCCS Guide sur l'authentification des utilisateurs dans les systèmes de technologie de l'information ITSP.30.031 v3]
** [https://www.cse-cst.gc.ca/en/node/1830/html/26507 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols]
+
** [https://cyber.gc.ca/fr/orientation/conseils-sur-la-configuration-securisee-des-protocoles-reseau-itsp40062 CCCS Conseils sur la configuration sécurisée des protocoles réseau ITSP.40.062]
** [https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process]
+
** [https://cyber.gc.ca/fr/orientation/processus-devaluation-de-la-securite-des-technologies-de-linformation-sappliquant-aux CCCS Processus d'évaluation de la sécurité des technologies de l'information s'appliquant aux fournisseurs de services infonuagiques ITSM.50.100]
 
|}
 
|}
   Line 107: Line 108:  
Tools and guides to help departments operate their cloud services.<br>
 
Tools and guides to help departments operate their cloud services.<br>
 
* [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Guidance]
 
* [https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Guidance]
* [https://www.canada.ca/en/government/system/digital-government/modern-emerging-technologies/cloud-services/security-playbook-information-system-solutions-cloud.html Security Playbook for Information System Solutions]
+
* [https://www.canada.ca/fr/gouvernement/systeme/gouvernement-numerique/technologiques-modernes-nouveaux/services-informatique-nuage/guide-securite-solutions-systeme-information-nuage.html Guide de sécurité pour les solutions de système d’information]
 
* [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management]
 
* [https://www.gcpedia.gc.ca/gcwiki/images/5/5f/GC_Cloud_Event_Management_Standard_Operating_Procedure.pdf Standard Operating Procedure for GC Cloud Event Management]
 
* Naming and Tagging Guidance (SSC)
 
* Naming and Tagging Guidance (SSC)
Line 132: Line 133:  
<span style="font-size: 1.5em;">Acquisition</span><br>
 
<span style="font-size: 1.5em;">Acquisition</span><br>
 
Links to help teams acquire cloud services. <br>
 
Links to help teams acquire cloud services. <br>
* [https://cloud-broker.canada.ca/s/?language=en_CA GC Cloud Brokering site]
+
* [https://cloud-broker.canada.ca/s/?language=fr Service de courtage infonuagique GC]
 
|}
 
|}
  

Navigation menu

GCwiki