Open Government Portal

Found 10 records similar to Baseline Security Requirements for Network Security Zones in the Government of Canada (ITSG-22)

Federal

This guideline is intended to assist network architects and security practitioners with the appropriate placement of services (for example, domain name service, email service, and web proxy service) into network security zones.

Last Updated: Dec. 12, 2019
Date Published: May 1, 2009
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security
Federal

The Baseline Cyber Security Controls for Small and Medium Organizations is an UNCLASSIFIED publication intended for small and medium organizations in Canada that want recommendations to improve their resiliency via cyber security investments. This document is for the public and as such has the Traffic Light Protocol (TLP) marking [1]Footnote 1 of TLP:WHITE.

Last Updated: Sep. 25, 2020
Date Published: Sep. 13, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cyber Defence, Identity and Passwords, Learning, Media Sanitization, Mobility, Network Security, Risk Management
Federal

"The COMSEC Installation Planning – Guidance and Criteria (ITSG-11) has been superseded by Emission Security (EMSEC) Guidance (ITSG-11A) February 2016 which is a Protected publication, issued under the authority of the Chief, Communications Security Establishment (CSE).

To access, or obtain, a copy of the publication, please visit the COMSEC User Portal (CUP) at: https://comsecportal.cse-cst.gc.ca, or contact your departmental COMSEC Custodian."

Last Updated: Dec. 12, 2019
Date Published: Aug. 8, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Wireless
Federal

"With today’s dynamic threat environment and Government of Canada (GC) fiscal constraints, information technology (IT) security can no longer be an afterthought, but rather needs to be a vital component in both departmental and IT project plans.

IT security risks can result in exposure of sensitive government information, a loss in productivity, an inability to meet organizational objectives, or damage to the GC’s reputation, all of which can be costly to the GC.

IT security risk management is the process by which organizations manage IT security risks and is achieved through the management and application of security controls, solutions, tools, and techniques to protect IT assets against compromises.

CSE’s IT security risk management framework can help outline a risk strategy that will align with GC priorities and resource allocation so that departmental objectives can be met."

Last Updated: Dec. 12, 2019
Date Published: Jul. 1, 2016
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Risk Management
Federal

With today’s dynamic threat environment and Government of Canada (GC) fiscal constraints, information technology (IT) security can no longer be an afterthought, but rather needs to be a vital component in both your departmental and IT project plans. With that in mind, the ITSG-33 publication has been developed to help government departments ensure security is considered right from the start. By following the principles within this publication, you not only help ensure predictability and cost-effectiveness, you also help ensure that there are no hidden surprises preventing you from obtaining authority to operate and maintaining continued authorization.

Last Updated: Dec. 12, 2019
Date Published: Nov. 1, 2012
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Risk Management
Federal

The Information Technology Security Guidance for Purchasing CSEC-Approved Cryptographic Equipment from the United States Government (ITSG-26) provides instructions and guidance on the purchase of Communications Security Establishment Canada (CSEC)-approved cryptographic equipment available from the United States (U.S.) via Foreign Military Sales (FMS) and Direct Sales (DS).

Last Updated: Dec. 12, 2019
Date Published: Jan. 31, 2013
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  COMSEC
Federal

"The need to securely access or move information between networks with different security classifications is an ongoing operational necessity within the Government of Canada (GC). Accessing or moving data from one network to another enables business operations, information sharing and decision making. Any movement of information across networks has the potential of introducing new threats to the networks and jeopardizing the security of the information holdings. While several methods can be considered for moving information across networks (a.k.a.

Last Updated: Dec. 12, 2019
Date Published: Jan. 1, 2016
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Network Security
Federal

"Patching operating systems and applications is one of the Top 10 Security Actions in CSE’s Top 10 IT Security Actions to Protect Government of Canada Internet-Connected Networks and Information (ITSB-89 Version 3). Implementing the Top 10 security actions as a package would prevent the vast majority of intrusions to which CSE currently responds.

Applying patches to operating systems, applications and devices is a critical activity in ensuring the security of systems. This document provides guidance on assessing known vulnerabilities and patches in order to determine the risk posed to an organization, the relative priority for patch deployment, as well as guidelines on how to deploy patches."

Last Updated: Dec. 12, 2019
Date Published: Mar. 1, 2015
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Operating Systems and Applications
Federal

The following content was created prior to the creation of the Canadian Centre for Cyber Security by one of the entities that became part of the Cyber Centre. This content remains relevant to current discussions about cyber security.

Last Updated: Dec. 12, 2019
Date Published: Sep. 25, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  CSE Archive, Infographics, Mobility, Wireless, Voice and Telephony, Social Media
Federal

The information provided in this document is intended to assist in the mitigation of threats associated with a Wireless Local Area Network (WLAN) deployment by offering security advice to be used during the high-level design phase.

Last Updated: Dec. 12, 2019
Date Published: Mar. 7, 2013
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Wireless, Network Security
Date modified: