Open Government Portal

Found 10 records similar to Baseline Cyber Security Controls for Small and Medium Organizations

Federal

This document is part of a suite of documents developed by the Cyber Centre to help secure cloud-based services and supports the cloud security risk management approach defined in ITSM.50.062 Cloud Security Risk Management.

Last Updated: Nov. 2, 2022
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cloud Security, Network Security, Risk Management
Federal

"This cyber security playbook guides elections authorities on anticipating, mitigating, and responding to threats that are specific to Canada’s democratic processes. This playbook introduces baseline cyber security measures and best practices that you can implement to improve your organization’s security profile. This playbook also provides a set of standards to reference as elections authorities continue to improve current systems and implement new ones. The guidance in this document is based on information gathered from various sources and is only intended to provide a set of recommendations that you can implement in addition to your organizational policies and practices.

Last Updated: Nov. 2, 2022
Date Published: Aug. 26, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cloud Security, Network Security, Risk Management, Top 10, elections
Federal

This document is part of a suite of documents that the Cyber Centre has developed to help secure cloud-based services. Security categorization, the selection of a security control profile, and the selection of a cloud deployment model and a cloud service model are the first three steps of the Cloud Security Risk Management approach. This approach is defined in ITSM.50.062 Cloud Security Risk Management.

Last Updated: Jan. 25, 2021
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cloud Security, Risk Management
Federal

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location.

Last Updated: Nov. 2, 2022
Date Published: Apr. 17, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Remote Access, Network Security, Risk Management
Federal

This document is part of a suite of documents that focus on each of the top 10 IT security actions recommended in ITSM.10.189 Top 10 IT Security Actions to Protect Internet Connected Networks and Information [1]. While implementing all 10 of the recommended security actions can reduce your organization’s vulnerability to cyber threats, you should review your current cyber security activities to determine whether additional actions are required.

Last Updated: Nov. 2, 2022
Date Published: Feb. 20, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Learning, Risk Management, Top 10
Federal

Organizations and individuals can benefit from using multi-factor authentication (MFA) to secure devices and accounts. With MFA enabled, two or more different authentication factors are needed to unlock a device or sign in to an account. Whether accessing email, cloud storage, or online banking services, MFA provides an extra layer of security from cyber attacks like credential stuffing. In credential stuffing, hackers use previously stolen credentials from one website, hoping that you have reused these credentials.

Last Updated: Nov. 2, 2022
Date Published: Jun. 25, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility
Federal

"This document is intended for elections authorities. It introduces common threats to Canada’s electoral processes and provides guidance on protecting the systems and the people involved in these processes. The guidance in this document is based on information gathered from various sources and is only intended to provide a set of recommendations that you can implement in addition to your organizational policies and practices. Note that this document does not provide exhaustive guidance on the measures you should take to protect your organization against cyber threats.

Last Updated: Dec. 23, 2020
Date Published: Aug. 26, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Risk Management, Top 10, elections
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable and self-service IT services. To benefit from cloud computing, your organization must ensure that security risks are properly managed, cloud specific security considerations are addressed, and security controls of cloud-based services are properly assessed before authorized.

You organization can use the guidance in this document to assist with its security assessment and authorization of cloud-based services. "

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this potential, it is imperative that we address the security and privacy dimensions of cloud computing. Cryptography is one of the main pillars enabling security and privacy in cloud computing. It plays an essential role in enabling cloud services such as authentication, secure access to cloud workloads, secure data storage, and secure data exchange.

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cryptography, Cyber Defence, Network Security, Risk Management
Federal

A VDC must address the threats, inherent vulnerabilities, and characteristic risks to data centres, as well as those specific to complex virtualized environments. Fortunately, VDCs can be made secure by using several safeguards and best practices. These safeguards and best practices involve addressing each layer of the virtual environment as well as addressing interactions between the various layers. This report provides an overview of a VDC, presents the inherent vulnerabilities in a VDC, and provides recommendations on how to design a secure VDC.

Last Updated: Nov. 2, 2022
Date Published: Mar. 29, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Network Security, Risk Management
Date modified: