Open Government Portal

Found 10 records similar to Network Security Zoning - Design Considerations for Placement of Services within Zones (ITSG-38)

Federal

This Guidance document is intended to outline the baseline security requirements for achieving Network Security within the Government of Canada, in accordance with the Government Security Policy (February, 2004) and the Operational Security Standard: Management of Information Technology Security (April, 2004).

Last Updated: Sep. 25, 2020
Date Published: Jun. 1, 2007
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security
Federal

SSC is refreshing its Network and Security Strategy to align with current best practices, and to be adaptable to future requirements for its network and security services.These technology trends will require SSC to rethink how it architects, provides, manages and secures its network services, and must be agile enough to integrate any technology that is deemed necessary to government operations. To develop this Network and Security Strategy, new approaches focused on automation, software-defined infrastructure (SDI) and a zero trust concept are required. The Network and Security Strategy defines the approach SSC will need to undertake to enable the government to meet the demands of today, and adapt to the demands of the future by leveraging a progressive adoption and migration overall strategy.

Last Updated: Apr. 12, 2021
Date Published: Mar. 26, 2021
Organization: Shared Services Canada
Formats: HTML
Keywords:  Network, security, strategy, SSC, Technology, Automation, Shared Services Canada, Connectivity, Service
Federal

Statistics related to designated group members and age range at the Canadian Security Intelligence Service, years 2017-2018

Last Updated: Apr. 13, 2022
Date Published: Oct. 28, 2019
Organization: Canadian Security Intelligence Service
Formats: CSV
Keywords:  age range, designated group members, statistics
Federal

The information provided in this document is intended to assist in the mitigation of threats associated with a Wireless Local Area Network (WLAN) deployment by offering security advice to be used during the high-level design phase.

Last Updated: Dec. 12, 2019
Date Published: Mar. 7, 2013
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Wireless, Network Security
Federal

A virtual private network (VPN) is a secure connection between two points, such as your laptop and your organization’s network. A VPN acts as a tunnel that you can use to send and receive secure data on an existing physical network. For example, a telework employee can use a VPN to send data that is encrypted until it reaches its destination (e.g. work server, teleworker).

Last Updated: Dec. 10, 2019
Date Published: Oct. 8, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Remote Access, Network Security, Risk Management
Federal

"The need to securely access or move information between networks with different security classifications is an ongoing operational necessity within the Government of Canada (GC). Accessing or moving data from one network to another enables business operations, information sharing and decision making. Any movement of information across networks has the potential of introducing new threats to the networks and jeopardizing the security of the information holdings. While several methods can be considered for moving information across networks (a.k.a.

Last Updated: Dec. 12, 2019
Date Published: Jan. 1, 2016
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Network Security
Federal

"Several meetings involving an ad-hoc group of federal government departments occurred in April-May 2008 around an emerging national security issue relating to the vulnerability of the supply chain for Government of Canada telecommunications equipment and services. In addition to the threat of cyber attack, there is a growing awareness of the risks posed by potentially vulnerable or shaped technologies that may be entering the Government of Canada (GC) communications networks and information technology infrastructure through the supply chain. One way to reduce these risks is to include specific security clauses in PWGSC contracts that are aimed at protecting the integrity, availability and confidentiality of Canadas data and communications. These clauses were developed based on a ""managed telecommunications services"" scenario, whereby a contractor is given responsibility for selecting, implementing, and operating and maintaining telecommunications infrastructure and services.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2010
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  CSE Archive, Supply Chain Security
Federal

The Internet is crucial to Government of Canada (GC) business, but using such technology can also make the GC’s networks vulnerable. Since many GC systems are connected to the Internet, if one department is compromised, all GC departments could be put at risk. Cyber intrusions are costly to a department’s operations, reputation and service delivery. Consequently, departments need sound IT Security programs that minimize vulnerabilities and counter threats.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2017
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Top 10
Federal

The Top 10 Information Technology (IT) Security Actions to Protect Internet-Connected Networks and Information (ITSM.10.189) is based on the Canadian Centre for Cyber Security (CCCS) analysis of cyber threat activity trends and their impact on Internet-connected networks. Organizations that implement these recommendations will address many vulnerabilities and counter most current cyber threats.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Network Security, Risk Management, Top 10
Federal

The purpose of this document is to describe CCCS’s Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Program. The objective of the CSP ITS Assessment Program is to assist Government of Canada (GC) departments and agencies in their evaluation of CSP services being procured for use by the GC. The resulting assessments will show whether the subject CSP’s security processes and controls meet the GC public cloud security requirements for information and services up to Protected B, Medium Integrity, and Medium Availability (PB/M/M) as published by the Treasury Board of Canada Secretariat

Last Updated: Dec. 12, 2019
Date Published: Oct. 15, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Risk Management
Date modified: