Open Government Portal

Found 10 records similar to Cloud Security for the Government of Canada (ITSE.50.060)

Federal

This document introduces the benefits and the risks of using cloud-based services, which deliver computer processing capabilities as a service rather than as a product. Cloud service providers (CSPs) provide on-demand and scalable computing environments. Overall, cloud-based services offer your organization more flexibility than on-premises IT solutions. Cloud-based services can also provide your organization with a richer set of capabilities and free up your organization’s IT resources.

Last Updated: Dec. 23, 2020
Date Published: Mar. 5, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security
Federal

To enable the adoption of cloud computing, the Government of Canada (GC) developed an integrated risk management approach to establish cloud-based services. ITSM.50.062 outlines this approach which can be applied to all cloud based services independently of the cloud service and deployment models.

Last Updated: Dec. 12, 2019
Date Published: Mar. 20, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cyber Defence, Risk Management
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable and self-service IT services. To benefit from cloud computing, your organization must ensure that security risks are properly managed, cloud specific security considerations are addressed, and security controls of cloud-based services are properly assessed before authorized.

You organization can use the guidance in this document to assist with its security assessment and authorization of cloud-based services. "

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this potential, it is imperative that we address the security and privacy dimensions of cloud computing. Cryptography is one of the main pillars enabling security and privacy in cloud computing. It plays an essential role in enabling cloud services such as authentication, secure access to cloud workloads, secure data storage, and secure data exchange.

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cryptography, Cyber Defence, Network Security, Risk Management
Federal

The purpose of this document is to describe CCCS’s Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Program. The objective of the CSP ITS Assessment Program is to assist Government of Canada (GC) departments and agencies in their evaluation of CSP services being procured for use by the GC. The resulting assessments will show whether the subject CSP’s security processes and controls meet the GC public cloud security requirements for information and services up to Protected B, Medium Integrity, and Medium Availability (PB/M/M) as published by the Treasury Board of Canada Secretariat

Last Updated: Dec. 12, 2019
Date Published: Oct. 15, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Risk Management
Federal

Cloud Service Providers (CSPs) offer three service models and four deployment models. The service models provide customers with the ability to use a provider’s cloud services. The deployment models offer customers different ways of using cloud services.

Last Updated: Dec. 12, 2019
Date Published: Nov. 30, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security
Federal

This document is part of a suite of documents that the Cyber Centre has developed to help secure cloud-based services. Security categorization, the selection of a security control profile, and the selection of a cloud deployment model and a cloud service model are the first three steps of the Cloud Security Risk Management approach. This approach is defined in ITSM.50.062 Cloud Security Risk Management.

Last Updated: Jan. 25, 2021
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cloud Security, Risk Management
Federal

This document is part of a suite of documents developed by the Cyber Centre to help secure cloud-based services and supports the cloud security risk management approach defined in ITSM.50.062 Cloud Security Risk Management.

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management
Federal

"Lately, everyone is talking about The Cloud. Have you moved to The Cloud? Where, exactly, is this mystical place called The Cloud? Is that where Cloud Computing happens?

Last Updated: Dec. 12, 2019
Date Published: Nov. 30, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security
Federal

The Television Sector provides a glimpse into various aspects of television broadcasting in Canada. This section presents information related to conventional television stations, discretionary and on-demand services, Internet-based video services in Canada and availability of television and video services.

Last Updated: Dec. 10, 2021
Date Published: Dec. 10, 2021
Organization: Canadian Radio-television and Telecommunications Commission
Formats: XLSX DOCX CSV
Keywords:  CRTC, Communications monitoring report, CMR, Broadcasting, Reports, Television, Statistics, Audiences, Viewing hours
Date modified: