Open Government Portal

Found 10 records similar to Guidance for the Communications Security of SECRET Information (ITSB-79)

Federal

Mobile devices have spread rapidly across the Government of Canada (GC) corporate enterprise and while they boost productivity and efficiency, they significantly increase the risk of a compromise to sensitive information. To help mitigate this threat, Communications Security Establishment Security Canada (CSEC) recommends departments utilize a Mobile Device Management (MDM) solution.

Last Updated: Dec. 12, 2019
Date Published: Jul. 1, 2013
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Mobility
Federal

"This document provides general specifications, as well as technical implementation details, for the provision of a walk-in, radio-frequency-shielded (RF-shielded) enclosure constructed to contain electromagnetic radiation emanating from equipment located within the enclosure.

Application of this document to shielded cabinets, shielded rack assemblies, and/or small shielded enclosures shall be approved by Communications Security Establishment (CSEC) on a case-by-case basis."

Last Updated: Dec. 12, 2019
Date Published: Aug. 1, 1999
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  COMSEC
Federal

The purpose of this bulletin is to advise the Government of Canada (GC) that the Canadian Central Facility (CCF) now has the capability to provide foreign Secure Communications Interoperability Protocol (SCIP) Seed key in electronic form.

Last Updated: Sep. 25, 2020
Date Published: Jun. 1, 2012
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  COMSEC
Federal

This bulletin provides information on the availability of the Secure Communications Interoperability Protocol (SCIP) rekey guides.

Last Updated: Dec. 12, 2019
Date Published: Feb. 1, 2008
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  COMSEC
Federal

The Information Technology Security Guidance for Purchasing CSEC-Approved Cryptographic Equipment from the United States Government (ITSG-26) provides instructions and guidance on the purchase of Communications Security Establishment Canada (CSEC)-approved cryptographic equipment available from the United States (U.S.) via Foreign Military Sales (FMS) and Direct Sales (DS).

Last Updated: Dec. 12, 2019
Date Published: Jan. 31, 2013
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  COMSEC
Federal

This bulletin is intended for information security practitioners responsible for IT security risk management activities and is structured to be used within the framework of Information Technology Security (ITS) management activities defined within the publication: CSEC - IT Security Risk Management: A Lifecycle Approach (ITSG-33).

Last Updated: Dec. 12, 2019
Date Published: Jul. 1, 2013
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Operating Systems and Applications
Federal

The purpose of this Bulletin is to advise Government of Canada (GC) departments and agencies of the security threat posed by modern "keylogger" software with enhanced data capture capabilities which utilize "stealth" techniques to hide from anti-virus and anti-spyware scanners.

Last Updated: Dec. 12, 2019
Date Published: Mar. 1, 2008
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Operating Systems and Applications
Federal

The purpose of this Alert is to provide Government of Canada (GC) COMSEC accounts with procedures for zeroization and handling of Key Storage Devices (KSD-64).

Last Updated: Dec. 12, 2019
Date Published: Jan. 1, 2009
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  COMSEC
Federal

Government of Canada (GC) departments rely on information systems to support their business activities. These interconnected information systems are often subject to serious threats which can have adverse effects on departmental business activities by compromising the confidentiality, integrity or availability of the systems and their information technology (IT) assets. Senior management support is essential in ensuring the continued protection of business applications, information assets, and IT infrastructures. This bulletin identifies key questions to guide leadership discussions between management and their IT security team to enhance national security, protect sensitive GC information and enable the achievement of departmental mission objectives.

Last Updated: Dec. 12, 2019
Date Published: Sep. 1, 2013
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Network Security, Risk Management
Federal

This bulletin aims to describe the risks posed by, and possible mitigations for, the exposure of classified IT systems to wireless signals and mobile devices that are not authorized to connect to those systems. The intended audience for this bulletin includes those responsible for IT security risk management activities as well as information system security practitioners.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2014
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Mobility, Wireless
Date modified: