Alternate formats: Guidance on the security categorization of cloud-based services (ITSP.50.103) (PDF, 124 KB)
Forward
ITSP.50.103 Guidance on Security Categorization of Cloud-Based Services is an UNCLASSIFIED publication that is issued under the authority of the Head of the Canadian Centre for Cyber Security (Cyber Centre). For more information, email or phone our Contact Centre:
Cyber Centre Contact Centre
contact@cyber.gc.ca
613-949-7048 or 1-833-CYBER-88
Effective date
This publication takes effect on (20/05/2020).
Table of contents
- 1 Introduction
- 2 Security Categorization
- 3 Step 1: Develop an Injury Assessment Table
- 4 Step 2: Inventory
- 5 Step 3: Assess Injury
- 6 Step 4: Analyze Business Domains
- 7 Select a Security Control Profile
- 8 Select Cloud Deployment and Service Models
- 9 Summary
- 10 Supporting content
List of figures
- Figure 1: Security Categorization Relationship to Departmental Risk Management
- Figure 2: Security Categorization Relationship to Information System-Level Activities
- Figure 3: Security Categorization Process: Step 1 – Develop an Injury Rubric
- Figure 4: Security Categorization Process: Step 2 – Inventory Business Processes and Information Assets
- Figure 5: Inventory of Business Processes and Information Assets
- Figure 6: Example of a Business Process and Information Asset Inventory
- Figure 7: Security Categorization Process: Step 3 – Assess Injury
- Figure 8: Injury Assessment of Security Objectives
- Figure 9: Security Categorization Process: Step 4 – Analyze Domains
- Figure 10: Security Domain Options
- Figure 11: Selection of Cloud Security Control Profile
- Figure 12: Cloud Service Models
- Figure 13: Cloud Deployment and Service Model Selection
- Figure 14: Cloud Deployment Models
List of Tables
- Table 1: Security Objectives
- Table 2: ITSG-33 Sample Injury Table
- Table 3: Example Injury Table for Private Sector Organizations
- Table 4: Example Injury Table for Non-Profit Organizations
- Table 5: Definitions and Example Qualifiers for Injury Levels
- Table 6: Example of a Completed Injury Table (Private Sector Organization)
- Table 7: Example of a Completed Injury Table (Non-Profit Organization)
- Table 8: Example of a Business Activity
- Table 9: Example of a Business Process Component
- Table 10: Failure Scenarios for Business Process Components
- Table 11: Failure Scenario – Example of Confidentiality
- Table 12: Failure Scenario – Example of Integrity Objective
- Table 13: Using an Injury Table to Select Injury Level
- Table 14: Injury Assessment – Sample Analysis of Business Activity Element
- Table 15: Sample Summary Categorization Report
- Table 16: High Water Mark of Injury Assessment
List Of Annexes
Overview
The purpose of this document is to help your organization categorize the security of cloud-based services. You can use this document to help you select a security control profile that adequately protects information and business activities. You can also use this document as a guide when selecting a cloud deployment model and a cloud service model.
Security categorization is a fundamental step in protecting against the risks associated with the use of cloud computing. Your organization can use security categorization to help determine the potential injury if business processes or information assets are compromised. This document helps your organization with the following activities:
- Categorizing the security of cloud-based services;
- Selecting an appropriate security control profile for protecting business information; and,
- Selecting a cloud deployment and service model.
To help your organization with these activities, this document includes the following content:
- Reviews security categorization terms and definitions established by ITSG-33 IT Security Risk Management: A Lifecycle Approach 1;
- Recommends a security categorization process to guide organizations in the identification of expected level of injury from threat compromise;
- Recommends an approach to inventory business process and information assets;
- Describes how to identify expected injuries and injury levels from threat compromise;
- Describes special factors impacting the level of expected injury levels;
- Describes an approach to identify business domains;
- Describes how to select a cloud security control profile based on the security category of business activity;
- Describes how to select a cloud deployment model and a cloud service model based on the security category of business activity; and
- Provides recommended security control profiles for the low and medium security categories.
This document is part of a suite of documents that the Cyber Centre has developed to help secure cloud-based services. Security categorization, the selection of a security control profile, and the selection of a cloud deployment model and a cloud service model are the first three steps of the Cloud Security Risk Management approach. This approach is defined in ITSM.50.062 Cloud Security Risk Management [2].
1 Introduction
This document can assist organizations in the security categorization of information systems, the selection of an appropriate security control profile, and the selection of a cloud deployment model and a cloud service model.
Security categorization activities play a critical role in ensuring the right level of protection for cloud solutions. These cloud solutions provide public and private organizations with agile, flexible and cost-effective information technology options. However, cloud solutions can be subject to serious threats that can have adverse effects on business activities. Compromises of cloud-based services can be expensive to fix, and threaten the availability, confidentiality, and integrity of business information.
Security controls are critical elements in the design of cloud-based services. While too much protection can lead to increased costs and wasted resources, not enough protection can put information and business processes at risk. Security categorization is fundamental; it provides the basis for selecting the appropriate cloud capabilities, security control profile, cloud deployment model, and cloud service modelFootnote 2.
For more information on determining appropriate security controls for secure architectures, refer to ITSG-33 [1].
1.1 Policy drivers
The need for security categorization is normally identified in the security policies, directives, regulations, or standards that are applicable to each organizationFootnote 3. The publications below identify the correct level of protection needed to counter cyber threats and vulnerabilities affecting cloud-based services:
- Government of Canada Cloud Adoption Strategy [4];
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) [5]; and
- Policy on Service and Digital [6].
In addition to ITSG 33 [1], you can use these publications as reference materials when your organization is creating policies and building the foundation for security categorization within your cloud security risk management practices and programs.
1.2 Applicable environments
The information provided in this document applies to both private and public sector organizations. We describe a security categorization process that your organization can apply for all business processes and associated information assets.
Government of Canada (GC) partners and other levels of government may have sensitive business processes and information assets of national interest. These sensitive assets must be considered in the security categorization process. Some national interest considerations are also presented in this document.
1.3 Relationship to cloud risk management
ITSG-33 [1] suggests two levels of IT security risk management activities: organizational-level activities (referred to as departmental level activities in ITSG-33 [1]) and information system level activities.
You should integrate organizational-level activities into your organization’s security program. Organizational-level activities can help you plan, manage, assess, and improve the management of your organization’s IT security related risks. For more information on these activities, see ITSG-33, Annex 1 [1]. Figure 1 shows that security categorization supports organizational risk management by defining the business context of security control profiles.
Figure 1: Security Categorization Relationship to Departmental Risk Management
Long description
Security Categorization Relationship to Departmental Risk Management
You should integrate information system level activities into your organization’s information system development lifecycle (SDLC). These activities include the execution of information system security engineering, threat and risk assessment, security assessment, and authorization. For more information on these activities, see Annex 2 of ITSG-33 [1].
Our cloud security risk management approach aligns with the information system level activities discussed in ITSG-33 [1]. Figure 2 shows that security categorization, cloud security control profile selection, and cloud deployment and service model selection support the first three steps of the cloud security risk management approach. Categorizing cloud-based services provides the information needed to determine the security requirements and the security controls that the cloud service provider (CSP) and cloud consumer should meet.
Figure 2: Security Categorization Relationship to Information System-Level Activities
Long description
Security Categorization Relationship to Information System-Level Activities
2 Security Categorization
This document describes the following security categorization activities for the adoption of cloud-based services:
- Develop an injury assessment table;
- Create an inventory of business activities, processes, and information assets;
- Assess injuries resulting from business process and information asset failures; and
- Analyze domains.
Security categorization is the process of identifying the potential injuries that could result from compromises to business processes, business activities, and related information. To categorize business processes and activities, you must first determine the expected injuries that could result from a compromise and the level of these expected injuries.
Through this process, the business processes and activities that will be supported by a cloud-based service are identified and categorized, and the service inherits the resulting security category. Cloud consumers then select a suitable security control profile based on a combination of the security category and their risk tolerance. The security category is also one of the factors considered in the selection of the cloud service deployment model and service model.
A security category expresses the highest levels of expected injuries from threat compromise with respect to the security objectives of confidentiality, integrity, and availability.
Table 1: Security Objectives
Security objectives | Definition |
---|---|
Confidentiality | The state of being disclosed only to authorized principals. |
Integrity | The state of being accurate, complete, authentic and intact. |
Availability | The state of being accessible and usable in a timely and reliable manner. |
Organizations should assign a business analyst to lead and facilitate the security categorization activities. The business analyst, supported by a security advisor, should conduct the security categorization process as an organization wide activity that involves information system owners, information owners, chief information officers, senior information security officers, and business ownersFootnote 4 Senior leadership and other key officials can provide the essential oversight in the security categorization process to ensure that cloud risk management activities are carried out effectively and consistently throughout the organizationFootnote 5. If security categorization activities are not performed as an organization-wide activity, the business analyst will need to repeat these activities for each project.
3 STEP 1: Develop an Injury Assessment Table
The first step of the categorization process is to develop an injury assessment table.
Figure 3: Security Categorization Process: Step 1 – Develop an Injury Rubric
Long description
Security Categorization Process: Step 1
Table 2 is a sample injury table that you can use to ensure consistency when identifying injury types (listed along the vertical axis) and levels (listed along the horizontal axis). A qualifier is shown for comparison purposes where the injury type intersects with the injury level. The nine types of injury proposed in ITSG-33 [1] describe common critical injuries that may impact an organization’s mission. However, given that each organization has a different risk tolerance profile, a single injury assessment table is not universally applicable across all organizations. Your organization should confirm that the sample injury table accurately represents the injury types that are the most likely to impact business activities and the confidentiality, integrity, or availability of information. If the sample injury table does not reflect expected injury types and risk tolerance criteria, organizations should develop their own injury assessment table.
Table 2: ITSG-33 Sample Injury Table
Injury Type | Qualifier and Level | ||||
---|---|---|---|---|---|
Very low | Low | Medium | High | Very High | |
Civil disorder or unrest | No reasonable or negligible expectation of injury | Civil disobedience, public obstructions | Riot | Sabotage affecting critical assets (e.g., critical infrastructure) | Large scale riot or sabotage requiring martial law |
Physical harm to people | No reasonable or negligible expectation of injury | Physical discomfort | Physical pain, injury, trauma, hardship, illness | Physical disability, loss of life | Widespread loss of life |
Psychological harm to people | No reasonable or negligible expectation of injury | Stress | Distress, psychological trauma | Causing a mental disorder or illness | Widespread psychological trauma |
Financial loss to individuals | No reasonable or negligible expectation of injury | Causing stress or discomfort | Affecting quality of life | Financial security compromised | N/A |
Financial loss to Canadian companies | No reasonable or negligible expectation of injury | Affecting performance | Reducing competitiveness | Viability compromised | N/A |
Financial loss to the Canadian government | No reasonable or negligible expectation of injury | Affecting program performance | Affecting program outcomes | Program viability compromised | Key programs viability compromised |
Harm to Canadian economy | N/A | N/A | Affecting performance | Reducing international competitiveness | Compromising key economic sectors |
Harm to Canada’s reputation | No reasonable or negligible expectation of injury | Loss of Canadian public confidence | Embarrassment (home or abroad) | Damage to federal-provincial relations | Damage to diplomatic or international relations |
Loss of Canadian sovereignty | N/A | N/A | Impediment to the development of major government policies | Impediments to effective law enforcement. Loss of continuity. of government | Loss of territorial sovereignty |
3.1 Injury Types
To develop an injury table, you must first identify the injury types that are the most likely to impact your organization’s critical functions or reputation. Injury types can be determined by reviewing existing impact assessments, privacy impact assessments, business risk assessments, and threat and risk assessments. Regulatory instruments such as laws, policies, and regulations may also be helpful as non-compliance to regulatory requirements could lead to penalties, sanctions, and increased injuryFootnote 6.
If such documents are not available, organizations can develop the injury types from business goals, objectives, and performance statements found in business plans and performance reports.
Some examples of injury types include the following:
- Loss of reputation;
- Loss of privacy (data under your organization’s responsibility);
- Regulatory fines (government regulations);
- Contractual penalties (non-compliance with existing contracts);
- Harm to customer satisfaction;
- Loss of intellectual property;
- Loss of revenue;
- Loss of business;
- Increased operating cost;
- Increase in personnel requirements;
- Loss of critical capability;
- Loss of competitive edge;
- Loss of stockholder confidence;
- Increase in legal cost;
- Loss of life; and
- Harm to health.
After reviewing existing business impact assessments, privacy impact assessments, and other business risks reports, organizations can identify the injury types that are applicable to them. Tables 3 and 4 depict the injury types that apply to a private sector or non-profit organization respectively. The applicable injury types are captured in an injury table that will be more representative of the potential injuries that could result from compromises for each of these organizational types.
Table 3: Example Injury Table for Private Sector Organizations
Injury Type | Injury Level | ||
---|---|---|---|
Low | Medium | High | |
Financial Harm | |||
Regulatory Violence | |||
Harm to reputation | |||
Loss of privacy | |||
Harm to intellectual property |
Table 4: Example Injury Table for a Non-Profit Organization
Injury Type | Injury Level | ||
---|---|---|---|
Low | Medium | High | |
Loss of privacy | |||
Financial harm | |||
Harm to reputation | |||
Harm to beneficiaries | |||
Regulatory violation |
3.2 Injury Levels and Qualifiers
To develop an injury table, you also need to identify the qualifiers for each injury level. Qualifiers describe injury level selection criteria for each injury level across all injury types. To define the qualifiers, it is important to understand the definition for each injury level. Table 5 provides definitions and examples for each injury level.
Table 5: Definitions and Example Qualifiers for Injury Levels
Injury Level | |||
---|---|---|---|
Low | Medium | High | |
Definition | The potential injury is LOW if unauthorized disclosure, modification or loss of access to the information or services used by the business activity could reasonably be expected to cause no or limited injury to individuals or the organization. | The potential injury is MEDIUM if unauthorized disclosure, modification or loss of access to the information or services used by the business activity could reasonably be expected to cause serious injury to an individual, organization or limited injury to a group of individuals. | The potential injury is HIGH if unauthorized disclosure, modification or loss of access to the information or services used by the business activity could reasonably be expected to cause extremely grave injury to an individual, organization or serious injury to a group of individuals. |
Example qualifiers |
|
|
|
Based on the examples provided in tables 3 and 4, a private sector and a non-profit organization identified qualifiers for each injury level. Each type of organization can use the completed injury tables 6 and 7 to support their respective security categorization activities. This will ensure consistency in the selection of injury level.
Table 6: Example of a Completed Injury Table (Private Sector Organization)
Injury Type | Injury Level | ||
---|---|---|---|
Low | Medium | High | |
Financial harm |
|
|
|
Regulatory violation |
|
|
|
Harm to reputation |
|
|
|
Loss of privacy |
|
|
|
Harm to intellectual property |
|
|
|
Table 7: Example of a Completed Injury Table (Non-Profit Organization)
Injury Type | Injury Level | ||
---|---|---|---|
Low | Medium | High | |
Loss of privacy |
|
|
|
Financial harm |
|
|
|
Harm to reputation |
|
|
|
Harm to beneficiaries |
|
|
|
Regulatory violence |
|
|
|
4 Step 2: Inventory
The second step of the security categorization process is for the cloud consumer to create an inventory of the business processes and the information assets that are relevant to the business activity supported by the cloud-based service.
Figure 4: Security Categorization Process: Step 2 – Inventory Business Processes and Information Assets
Long description
Security Categorization Process: Step 2 – Inventory Business Processes and Information Assets
Creating an inventory of business processes and information assets is the most important step in identifying how organizations are affected by compromises to the cloud-based services. To perform the inventory, security advisors must engage the business analyst community within the organization. The security advisor’s task is to organize focus groups where possible, describe the task to be completed, emphasize the importance of contribution, and record and disseminate the results for validation.
Creating an inventory takes varying levels of preparation. If business activities are poorly documented, several focus groups may be required to obtain a coherent, valid picture of business activities. In large organizations with multiple programs, the inventory process may only be possible by dividing it up by program. If business activities are well documented and understood, focus groups may not be required. In some cases, business processes and information assets may be well documented, current, validated, and easily reported. In other cases, business processes and information assets must be inferred based on limited existing documentation.
Good sources to identify and describe business processes and related information assets include the following examples:
- Business cases;
- Concepts of operations;
- Business functional specifications;
- Enterprise architecture documentation which typically describes an organization’s business;
- Processes and related information assets in some detail;
- Discussions or interviews with business analysts and other individuals within related business; and
- Communities.
Government of Canada departments can also look to sources such as:
- Report on plans and priorities (RPP);
- Program alignment architecture (PAA); and
- Public Accounts of Canada.
Figure 5: Inventory of Business Processes and Information Assets
Long description
Inventory of Business Processes and Information Assets
4.1 Level of Detail
Determining an inventory’s level of detail is one complication associated with the inventory process. ITSG-33 [1] defines business activity in a generic way to give each organization the flexibility to express their business activities in the most useful way. Organizations typically determine the detail of the business process and information assets based on common factors such as the size of the organization, its range of activities, and the risk level of its business activities.
Both general and highly detailed inventory levels can provide useful insight into security categorization. While a detailed inventory might be useful in focusing security investments to the most critical business process component, it is also more sensitive to change in those business processes. A general level inventory helps identify security requirements at the program or sub program level, without necessarily being affected by changes to business process.
In very large organizations with multiple programs, creating an inventory of business processes and components may only be feasible by dividing it up by program, sub program, and sub sub program. This provides large organizations with the required level of detail to identify security requirements at both the business process component and program levels.
Figure 6 provides an example of an inventory that is based on an organization’s mission, mandate, and documented business initiatives.
Figure 6: Example of a Business Process and Information Asset Inventory
Long description
Example of a Business Process and Information Asset Inventory
4.2 Elements to Include
Regardless of the level of detail at which the business processes and information assets are inventoried, each process and information asset is characterized by the following elements:
- Business process name or description (or even a number);
- Business process component;
- Component description;
- Type; and
- Notes.
A business activity can be a process or a grouping of processes that supports the objectives of the business. In Table 8, for example, three business processes are identified in the Case Management sub sub program:
- Open new case;
- Case review; and
- Payment.
Table 8: Example of a business activity
Inventory of business processes and information assets | ||
---|---|---|
Sub-Sub Program | Business Process | Business Process Component |
Case Management | Open new case | Receive request and open new case file |
Case review | Emergency payment approval | |
Payment | See Payments Services |
Business processes and information assets are described in one or more components. These components are described and given a type. In Table 9, Requester personal information is a component that is an information type. Receive request and open new case file is a process component. Your organization should define other types of business activity components to include in the inventory, as required.
Business analysts should use the notes column to capture assumptions, sources of inventory data, and any other information that provides context for each inventory item.
Table 9: Example of a business process component
Inventory of Business Processes and Information Assets | |||||
---|---|---|---|---|---|
Sub-Sub Program | Business Process | Business Process Component | Component Description | Type | Notes |
Case Management | Open New Case | Receive request and open new case file | The process of receiving a request for emergency funds, creating a case file, and collecting requester information | Process | |
Open New Case | Requester personal information | Name, address, phone numbers, information about family members affected, nature of emergency, social insurance number, bank account information (for direct deposit) | Information |
5 Step 3: Assess Injury
The third step of the security categorization process is to assess injury. In this step, your organization determines the expected injuries that could result from a compromise that affects each business process and information asset that you identified in the second step (inventory).
Figure 7: Security Categorization Process: Step 3 – Assess Injury
Long description
Security Categorization Process: Step 3 – Assess Injury
The injury assessment process should use multi-disciplinary teams that include representatives from business, legal, access to information, security, and privacy areas. You should include the business owner, or an official designate, the authorizer (if different from the business owner), the business representatives, and the analysts from each program or business line. In this document, we have given the group the collective name of assessment committee.
5.1 Definition of Injury
We define injury in terms of the scope and scale of possible damages that result from a compromise to your organization’s IT assets. Injury relates to the damages to national interests (e.g. security, political, social, economic stability) and non-national interests (e.g. safety, health, well-being, financial outcomes of Canadians and Canadian organizations). For example, in the GC, departments and agencies categorize and classify information based on the damage that could result from a compromise, which is reflected in classification and protection labels such as UNCLASSIFIED, CONFIDENTIAL, SECRET, TOP SECRET and PROTECTED A, PROTECTED B, PROTECTED C. In the private sector, injury is generally associated with profit and reputation, and information may be labelled as confidential or proprietary to reflect its level of sensitivity. Additionally, government and private industry organizations can benefit from the use of the Traffic Light Protocol (TLP) to help with information sharing. Although not defined as a level of injury, TLP is a set of colour labels (red, amber, green, and white) that are used to designate how and with whom information can be shared.
Figure 8 shows how injury is assessed with respect to the confidentiality, integrity and availability of each business activity component. See section 2.3 for definitions of each injury level (low, medium, and high) Footnote 7.
Figure 8: Injury Assessment of Security Objectives
Long description
Injury Assessment of Security Objectives
5.2 Elements of an Injury Assessment
An injury assessment includes the following steps:
- Failure scenario: Identify one or more situations in which an injury could result from a failed business process or component;
- Injury type and level: Select an injury type and level from the injury table;
- Special factors: Modify injury level, as required, to reflect impact of special factors; and
- Analysis: Provide additional notes, analysis, and justification for the selected type and level.
NOTE: The four injury assessment steps are performed for each of the three security objectives (i.e. confidentiality, integrity and availability). |
5.2.1 Identify Failure Scenarios
The first step you need to take when assessing injury is to document the possible failure scenarios for each business activity component. The objective of identifying these failure scenarios is to consider the possible ways in which a component can fail and cause injury. You may have more than one failure scenario for each business activity component.
You need to assess injuries for each security objective (i.e. confidentiality, integrity, and availability), but identifying the failure scenario for confidentiality does not generally apply for components that are identified as process types. In this case, the assessment committee should identify the failure scenario as not applicable (see Table 10). Note that there are exceptions if the existence of a process or its specific steps are confidential (e.g. a proprietary recipe).
Table 10: Failure Scenarios for Business Process Components
Inventory of Business Processes and Information Assets | |||||
---|---|---|---|---|---|
Business Process | Business Process Component | Component Description | Type | Notes | Failure Scenario (in context) |
Open New Case | Receive request and open new case file | The process of receiving a request for emergency funds, creating a case file, and collecting requester information. | Process | Not Applicable | |
Open New Case | Requester personal information | Name, address, phone numbers, information about family members affected, nature of emergency, social insurance number, bank account information (for direct deposit). | Information |
Table 11 describes one of the most common failure scenarios: the unauthorized disclosure of information to a person with malicious intent.
Table 11: Failure Scenario – Example of Confidentiality
Inventory of Business Processes and Information Assets | |||||
---|---|---|---|---|---|
Business Process | Business Process Component | Component Description | Type | Notes | Failure Scenario (in context) |
Open New Case | Receive request and open new case file | The process of receiving a request for emergency funds, creating a case file, and collecting requester information. | Process | Not Applicable | |
Open New Case | Requester personal information | Name, address, phone numbers, information about family members affected, nature of emergency, social insurance number, bank account information (for direct deposit). | Information | Disclosure of personal information (including SINs) to unauthorized individual with malicious intent |
The assessment committee repeats this process until the failure scenarios have been identified for all business activity components and security objectives. Table 12 provides an example of failure scenario involving the integrity of a business process component.
Table 12: Failure Scenario – Example of Integrity Objective
Inventory of Business Processes and Information Assets | |||||
---|---|---|---|---|---|
Business Process | Business Process Component | Component Description | Type | Notes | Failure Scenario (in context) |
Open New Case | Receive request and open new case file | The process of receiving a request for emergency funds, creating a case file, and collecting requester information. | Process | Error or omission in collecting and processing information | |
Open New Case | Requester personal information | Name, address, phone numbers, information about family members affected, nature of emergency, social insurance number, bank account information (for direct deposit). | Information |
5.2.2 Identification of Injury Type and Level
The assessment committee should use an injury table to determine the possible level of injury to business activity components. Section 2 of this publication describes a process that the assessment committee can follow to develop an injury table that is representative of the organization’s tolerance for injuries. That table can be used to ensure consistency when identifying injury levels. As shown in Table 13, the injury level for a business activity component is determined by the following actions:
- Selecting the injury type related to the failure scenario (vertical axis of the injury table);
- Selecting the qualifier on the horizontal axis that most closely represents the assessment of what could occur given the failure scenario; and
- Selecting the injury level related to the chosen qualifier in the injury table.
You should record the resulting injury type, level, and qualifier in the inventory. Use these results to determine the overall security category of the cloud service that supports the business processes.
Table 13: Using an Injury Table to Select Injury Level
Injury Type | Qualifier and Level | ||||
---|---|---|---|---|---|
Very low | Low | Medium 3 | High | Very High | |
Civil disorder or unrest | No reasonable or negligible expectation of injury | Civil disobedience, public obstructions | Riot | Sabotage affecting critical assets (e.g., critical infrastructure) | Large scale riot or sabotage requiring martial law |
Physical harm to people | No reasonable or negligible expectation of injury | Physical discomfort | Physical pain, injury, trauma, hardship, illness | Physical disability, loss of life | Widespread loss of life |
Psychological harm to people 1 | No reasonable or negligible expectation of injury | Stress | Distress, psychological trauma 2 | Causing a mental disorder or illness | Widespread psychological trauma |
Financial loss to individuals | No reasonable or negligible expectation of injury | Causing stress or discomfort | Affecting quality of life | Financial security compromised | N/A |
Financial loss to Canadian companies | No reasonable or negligible expectation of injury | Affecting performance | Reducing competitiveness | Viability compromised | N/A |
Financial loss to the Canadian government | No reasonable or negligible expectation of injury | Affecting program performance | Affecting program outcomes | Program viability compromised | Key programs viability compromised |
Harm to Canadian economy | N/A | N/A | Affecting performance | Reducing international competitiveness | Compromising key economic sectors |
Harm to Canada’s reputation | No reasonable or negligible expectation of injury | Loss of Canadian public confidence | Embarrassment (home or abroad) | Damage to federal-provincial relations | Damage to diplomatic or international relations |
Loss of Canadian sovereignty | N/A | N/A | Impediment to the development of major government policies | Impediments to effective law enforcement. Loss of continuity of government | Loss of territorial sovereignty |
5.2.3 Special Factors
The next element of injury assessment involves considering special factors that may require your organization’s assessment committee to adjust the injury level identified in the previous step. Some examples of these factors include aggregation, inference, and interdependency.
5.2.3.1 Aggregation
You can assign separate injury levels to individual business processes and related information assets. However, the injury that could result from a compromise of aggregate processes and information (considered as a whole) may be greater than the injury level assigned to any of the individual parts.
Aggregation refers to the situation where a collection of assets may be categorized at a higher level of sensitivity than its component parts due to the increased injury that could result from a compromise of the aggregate. In other words, aggregation is where the business impact of a compromise of a set of assets is greater than the impact of a compromise of an individual asset. Aggregation generally applies to confidentiality, but there are also circumstances in which it applies to availability and integrity.
For example, unauthorized disclosure of a single personnel file could be expected to cause some embarrassment to the individual and generate public anxiety about an organization’s ability to protect personal information. However, if all human resource records for a major organization were released inappropriately, the adverse effects could be significantly worse.
From a confidentiality perspective, aggregation has two dimensions:
- The sensitivity of a record tends to increase as more data elements are added to it; and
- The sensitivity of the repository (file or database) tends to increase as more records are collected.
The confidentiality value of the whole may be greater than that of the individual parts, based upon the increased injury expected in the event of unauthorized disclosure.
Aggregation applies equally to availability and integrity values. For example, the destruction of one asset, such as a single server, might have clearly defined consequences, whereas the loss of an entire fleet would be much more serious. Unauthorized modification of a single record versus complete corruption of a large data base would be the integrity equivalent.
When dealing with aggregate information, organizations should reconsider each dimension of security with respect to any new injuries that might result from an aggregation. Organizations should reconsider each dimension of confidentiality, integrity, and availability with respect to the possible injury to national interests, people, and organizations.
Keep in mind that damage to national interests for an aggregate set of business components may not be obvious and should be assessed using strategic input from lead agencies.
5.2.3.2 Inference
There are cases in which a threat actor could analyze information that is at one level of sensitivity and then make inferences to compromise more sensitive information. For example, personnel records categorized as Medium for privacy reasons might contain information that provides some indication of the individual’s role. In this example, a threat actor may be able to learn and infer about the operational mission or capability of the parent organization, which could then be used to compromise organizational interests.
Organizations should try to consider the sensitivity of the categorized information and also other associated information that could be used by a threat actor.
5.2.3.3 Interdependency
Due to interdependencies, the loss or degradation of one business process and its associated information may impact other processes and related information. The purpose of analyzing interdependencies is to determine if there is a likelihood of a high cascading effect resulting from the compromise of a business process or information on other processes and information. The injury that would result from the cascading loss of one element may be greater than the injury level assigned to any of the independent elements (similar to the problem of aggregation). Types of interdependencies include physical (e.g. material output of one infrastructure used by another), geographic (e.g. common corridor), and logical (e.g. dependency through financial markets).
5.2.4 Analysis
Once the injury level has been assessed, the security practitioner should capture as much essential dialogue as possible. This helps third parties to understand the rationale behind an injury type and level selection.
For example, in its analysis, the security practitioner could include a justification, document special factors that led to the identified injury level, whether any important time sensitive considerations exist, or if it is dictated by specific regulations or policies./p>
Table 14 provides an example of documenting the analysis activity for a business activity element.
Table 14: Injury Assessment – Sample Analysis of Business Activity Element
Loss of Availability | |||
---|---|---|---|
What type of injury could reasonably be expected from a loss of availability? | How significant is the expected injury? | Example of injuries at that level (representative) | Analysis |
Psychological harm to people | Low | Stress | Processing emergency payment requests efficiently and without delay is core to meeting the program’s outcome. However, basic needs should be taken care of by other disaster relief efforts |
5.3 Security Categorization Report
After completing the injury assessment, the assessment committee can choose to produce a complete or summary categorization report to communicate the results.
The assessment committee should document and formally accept the results of the security categorization activity. The results can be combined in a security categorization report as follows:
- A short description of the related business processes and information assets;
- A description of the expected injuries from threat compromise;
- The levels of expected injury as they relate to confidentiality, integrity and availability;
- The rationale for attributing the levels of injury;
- The security category of each business activity;
- The security category of a specific offering from a cloud-based service; and
- An explicit statement of acceptance of the security category from the cloud based service owner.
Table 15 provides an example of a summary categorization report.
Table 15: Sample Summary Categorization Report
Business Domain | Security Category | ||||
---|---|---|---|---|---|
Confidentiality | Integrity | Availability | |||
Emergency Disaster Relief Program | Medium | Low | Low | ||
Breakdown of Component | Type | ||||
1 | Receive request and open new case | Process | Low | Low | |
2 | Requester personal information | Information | Medium | Low | Low |
6 Step 4: Analyze Business Domains
The fourth step of security categorization is to analyze and identify business domains. A business domain is an operational environment where an organization performs business activities supporting common organizational objectives. A business domain security control profile is developed for a specific business domain as opposed to an organization as a whole. Depending on how the assessment committee has chosen to perform categorization, they may end up with several categorization reports.
Figure 9: Security Categorization Process: Step 4 – Analyze Domains
Long description
Security Categorization Process: Step 4 – Analyze Domains
At the end of the categorization process, the assessment committee will have one or more tables of business processes and information assets. Each process or information component will have an injury assessment with respect to confidentiality, integrity, and availability.
If all activities are to be supported by a single information system in a single domain, then the overall categorization is the high water markFootnote 8 (the highest level of injury in each injury column as shown in Table 16).
Table 16: High Water Mark of Injury Assessment
Loss of Confidentiality | ||||
---|---|---|---|---|
Failure Scenario | Reasonable Injury From Loss of Confidentiality | Expected Level of Injury | Injury Example | Analysis |
Release of personal information (including SIN) to unauthorized individuals with malicious intent | Psychological harm to people | Medium | Distress, psychological trauma | Could lead to distress and important financial losses |
Release of information to unauthorized individuals with malicious intent | Psychological harm to people | Low | Stress | Release may include some personal information but not SIN and banking details |
Loss of Integrity | ||||
Failure Scenario | Reasonable Injury From Loss of Integrity | Expected Level of Injury | Injury Example | Analysis |
Error or omission in collecting and processing information | Psychological harm to people | Medium | Distress, psychological trauma |
Payment could be delayed as a result and lead or contribute to distress. Could also cause or increase pain and suffering |
The information collected is inaccurate or incomplete | Psychological harm to people | Medium | Distress, psychological trauma | See above |
Loss of Availability | ||||
Failure Scenario | Reasonable Injury From Loss of Availability | Expected Level of Injury | Injury Example | Analysis |
Unable to or delay in processing initial request. | Psychological harm to people | Low | Stress | Processing emergency payment requests efficiently and without delay is core to success of business activity |
Loss or destruction of information | Psychological harm to people | Medium | Distress, psychological trauma | See Above |
A business domain can have only one security category assigned to it. The controls in a business domain security control profile are chosen to respond to a single categorization (e.g. {M, M, M}, {M, L, L}). Therefore, if organizations have several categorization reports for business activities within a domain, they will need to carefully analyze the implications of merging them.
6.1 Identification of Business Domains
In general, choosing the high-water mark within a business domain is a reasonable approach to merging different categorization reports. However, choosing the high-water mark as the categorization levels implies the need to apply more security controls, which translates into higher costs. As depicted in Figure 10, activities with unusually high categorizations can be dealt with as follows:
- Option A: Assuming the same threat context, develop a specific security control profile for the exception and support the business activities using a tailored information system; or
- Option B: Assuming the same threat context, develop a security control profile for the higher categorization and implement all other business activities on the same information system.
Figure 10: Security Domain Options
Long description
Security Domain Options
6.2 Enterprise Services
An enterprise architecture may identify applications to be used by multiple organizations (e.g. email, HR, supply ).
Service providers may also offer multiple organizations or domains for the same services (e.g. Platform as a Service [PaaS], Software as a Service [SaaS]). Providers can use either the push or pull approach with respect to security categorization.
6.2.1 The Pull Approach
When using the pull approach, the service provider seeks out security categorization information from each potential client and develops a profile to address the highest level of expected injury. Collecting security categorization information from multiple organizations requires time and careful planning. This effort should be carried out as part of project initiation to determine the following aspects:
- Feasibility;
- Scope; and
- Schedule and funding envelopes.
If using the pull approach, your organization should consider the following:
- Ensuring that all organizations use the same categorization template;
- Ensuring that all organizations assess injury in a consistent way; and
- Achieving the overall categorization may not be possible given the budget or schedule. Significant changes in proposed scope may be required (e.g. off-boarding organizations, securing additional funding).
6.2.2 The Push Approach
When using the push approach, the service provider sets the categorization of the application or service and develops a profile to address the highest level of expected injury. The application or service is categorized as a business decision. For non-essential applications or services, organizations can compare their needs against the offering and on-board as appropriate. For essential applications or services (e.g. corporate driven initiatives), organizations must compare their needs against the service offering and address areas of risk.
If using the push approach, your organization should consider the following:
- That providers must supply all security assurance artefacts or client organizations cannot determine areas of residual risk.
- That for essential applications or services, it is important that the security category be established based on a comprehensive understanding of the business domain (this may be achieved by exercising a pull approach).
7 Select a Security Control Profile
Security control profiles have been developed for the cloud-based services that were derived from the baseline profiles in Annex 4 of ITSG-33 [1]. The cloud security control profiles identify the recommended security controls that the CSPs and cloud consumers should jointly implement for the assessed security category of each respective business domain. The selected cloud control profile also serves as the basis for assessment of the security controls.
You organization should select one of the cloud security control profiles that the Cyber Centre has developed. These control profiles are included in Annex A and Annex B of this publication. When selecting a cloud security control profile, your organization’s project authorities, with the support of security practitioners, should perform the following four tasksFootnote 9:
- Validate the applicability of the business context;
- Validate the applicability of the technical context;
- Validate the applicability of the threat context; and
- Tailor the security controls within their scope of responsibility according to their needs.
The business context documented for each cloud security control profile identifies security category that can be supported by the profile. After completing the security categorization of the business activities, the cloud consumers select the security control profile that matches the security category of the applicable business domain.
Figure 11: Selection of Cloud Security Control Profile
Long description
Selection of Cloud Security Control Profile
7.1 Business Context
Two cloud control profiles are included that you can use if you are implementing cloud-based services to support business activities that you have categorized as Low and Medium. If you have business activities that you have categorized with a high security category, contact the Cyber Centre for the recommended cloud security control profile.
7.2 Technical Context
The appendices include technical context for the cloud control profiles, which are defined by the cloud deployment and service models, the CSP offerings, and the organizational cloud-based services.
The technical context is dictated largely by the CSP cloud service offerings. There are no limits to what that context may be. The cloud control profiles neither recommend nor exclude any particular technologies, and it should generally be suitable for any technical context provided by CSPs in their cloud service offerings. Footnote 10
7.3 Threat Context
Currently, there are few public CSPs that provide information security services with sufficient assurance to defend consistently against threats higher than Td4 deliberate threat actors, Ta3 accidental and natural threats as defined in ITSG-33 [1]. Briefly, Td4 represents risk-adverse threat actors such as sophisticated hackers who have the knowledge, abilities, and experience required to customize and use available tools to exploit system weaknesses, find unknown vulnerabilities, or develop limited exploits for organizational exposures. Ta3 accidental threats and natural hazards include incidents such as significant disruption of telecommunication services, long-term power failures, localized flooding, and facility damage from earthquakes.
If your organization needs to protect business activities against threat actors categorized as higher than Td4 and Ta3, you should take one of the following actions.
- Apply additional tailoring to the control profiles included in the annexes;
- Accept higher levels of residual risk; or
- Select a different control profile.
For further guidance, contact the Cyber Centre.
7.4 Tailoring
The cloud security control profiles included in this publication represent baseline security controls for protecting your organization’s business activities. You should tailor the cloud security control profile to address unique threats, technical limitations, business requirements, legislation, regulations, or policies that apply to your business context.
Your organization should consider filling in CSP security control gaps with your own controls or by choosing a different CSP. Your ability to fill the gaps with your own controls is very high for Infrastructure as a Service (IaaS) and less so for Software as a Service (SaaS). Footnote 11 For the PaaS model, the security control gap is similar to IaaS.
You should tailor the security control profile to address unique threats, requirements, and gaps. This is done by incorporating compensating controls, control enhancements or organization specific control parameters. You should document the rationale for all tailoring activities and associated tailoring decisions.
The cloud security control profiles included in annexes A and B contain control allocations. The allocations indicate who is responsible (either CSP or consumer) for the security requirements of the control profile. Control allocations by service model are also provided.
7.5 Control Allocations
Annexes A and B, an"X" in columns K, L, M, or N of the spreadsheets indicates whether the CSP or your organization is responsible for the security requirements described in the selected security control.
With IaaS and PaaS service models, your organization is responsible for the security requirements of organizationally configured and managed systems in the cloud, and all customer information systems used to access, manage, protect, or defend the associated cloud services. With a SaaS service model, you are responsible for the security requirements for all your organization’s information systems that are used to access and manage the associated cloud services.
CSP responsibilities for each service model also include the security requirements for the supporting services. For example, the CSP’s responsibilities for its SaaS also include the security requirements for the IaaS and PaaS systems that support that SaaS. However, it is likely that other, existing assessments of the supporting services can be re-used when determining if the CSP has met their IT security responsibilities for the supported service.
8 Select a Cloud Deployment Model and a Cloud Service Model
When moving to the cloud, you need to determine the appropriate cloud deployment model and cloud service model for your organization’s IT services. Cloud deployment models describe the relationship between you and the CSP. There are four cloud deployment models identified by NIST: public, private, community, and hybrid. There are three cloud service models defined by NIST: Infrastructure as a Service, Platform as a Service, and Software as a Service. Figure 12 outlines the three cloud service models. Special Publication 800-145 NIST Definition of Cloud Computing [10] defines the cloud deployment models and cloud service models.
Figure 12: Cloud Service Models
Long description
Cloud Service Models
Your selection of a cloud deployment model and a service model will depend on the nature of the services you require, the amount of control you want to retain, and the level of expertise and maturity the consumer has in operating and maintaining cloud based information system environments.
The information aggregated during the security categorization step helps the cloud consumer select the cloud deployment model and the cloud service model that best match its internal expertise and required assurance levels. Your organization should select models that have been assessed to meet your required security category requirements.
Your organization should select a deployment model and a service model that require the least amount of control tailoring and compensating controls to address shortcomings in the CSP security control implementation. As identified in section 6.1, your ability to address CSP security control gaps with your organization’s controls is very high for IaaS and less so for SaaS.
As shown in Figure 13, you should select or confirm which a deployment model and a service model that best suits your organization based on the following considerations:
- The consumer organization’s information system strategies;
- The CSP cloud services capabilities and security control gaps;
- The security category of the business process to be supported by the cloud service;
- The selected security control profile requirements; and
- Other aspects of the information system workloads.
Figure 13: Cloud Deployment and Service Model Selection
Long description
Cloud Deployment and Service Model Selection
8.1 Cloud Deployment Models
When selecting a cloud deployment model, you should consider a number of factors, including: flexibility, security, scalability, cost, automation, level of control over the infrastructure, locality, and service levels offered by each deployment modelFootnote 12. In figure 14, on premises refers to the software and technology located within the physical confines of your organization. Off premises refers to the software and technology located outside the physical confines of your organization.
The following sections provide definitions, advantages and disadvantages for each deployment model. A summary of advantages and disadvantages for each deployment model is provided in Annex C.
Figure 14: Cloud Deployment Models
Long description
Figure 14: Cloud Deployment Models
8.1.1 Public Deployment Model
In the public cloud deployment model, the cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider.
The scalability (scale up) and elasticity (scale out) capabilities offered by public deployment provides the most flexibility to meet organizations sudden peak in demands and will translate into increased reliability upon hardware failures.
In this deployment model, CSPs have well defined, standardized cloud services, security capability offerings and service level agreements. While the standardized nature of these services allows CSPs to provide the services at a lower cost, organizations are not likely to find very much flexibility in negotiating the customization of services, operational processes, or service level agreements. If your organization has very strict security, operational, or governance requirements, you may need to implement compensatory controls to address gaps in the CSP’s offerings. You should consider other deployment models if possible.
The public cloud deployment model offers a multi-tenant environment. Multi-tenancy does not allow for your organization to audit the security posture of the CSP environment. Instead, you must rely on third party assessments when considering the use of public clouds.
The services offered by public cloud providers can change very rapidly. These new services may be assessed by third party assessors only in the next assessment cycle. Before using these new services, you should ensure that the security of the new services being offered by the CSPs have been assessed by third party assessors.
8.1.2 Private Deployment Model
In the private cloud deployment model, the cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g. business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.
In this deployment model, organizations will find more flexibility in negotiating services, operational processes, service level agreements, security, and governance requirements. This flexibility usually comes at a higher cost and organizations may be restricted to what was negotiated in the contract.
Organizations requiring very high scalability, elasticity, or advanced features too costly to implement on premises may want to consider the public deployment model.
8.1.3 Hybrid Deployment Model
NIST describes the hybrid model as an environment composed of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability. The combination of on premises IT infrastructure with one or more of public, private or community cloud is sometimes referred to as hybrid cloud.
Hybrid clouds provide some of the benefits of both public and private clouds and are often used by organizations as the first step in their migration to the cloud. It allows organizations to deploy workloads with more stringent security requirements on premises while deploying workloads requiring significant IT resources processing, scalability and elasticity on public cloud.
The hybrid cloud model comes with added complexity. For example, organizations will have to perform a security assessment of multiple CSPs, determine which security features to use from each cloud, how to manage resources from different CSPs, determine location of resources, and how to interconnect the different cloud environments securely.
8.1.4 Community Deployment Model
A community cloud is provisioned for the exclusive use of a specific community of consumers from organizations that have shared concerns (e.g. mission, security requirements, policy, or compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. The costs are spread over fewer users than a public cloud but more than would be for a private cloud, so only some of the potential cost savings of cloud computing are achieved.
Despite not offering the same savings as the public deployment model, community clouds can provide considerable economies of scale advantages and some of the flexibility found in private clouds.
If your organization is considering a community cloud, you should determine how, and by who, availability and service outages will be managed. You should also consider the implications of having your organization’s data spread across multiple organizations and, possibly, different locations.
8.2 Cloud Service Models
Your selection of a cloud deployment and service model may be motivated by the following considerations:
- The nature of the service;
- The amount of control your organization wants to retain; and
- The level of expertise and maturity of the consumer organization has in operating and maintaining cloud-based information system environments.
NIST defines the following three service models:
- SaaS provides the consumer with the capability to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g. web-based email), or a program interface.
- PaaS provides the consumer with the capability to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming, libraries, services, and tools supported by the provider.
- IaaS provides the consumer with the capability to provision processing, storage, networks, and other fundamental computing resources where the consumer can deploy and run arbitrary software, which can include operating systems and applications.
In the IaaS model, cloud consumers carry more responsibilities then in the PaaS and SaaS models. Also, the ability for organizations to tailor, implement and manage their own security controls is very high for IaaS, and lower for PaaS and SaaS. Footnote 13
9 Summary
Your organization is required to perform security categorization of your business processes and information assets. By categorizing your business processes and information assets, you can better select a security control profile and cloud deployment and service models.
This document outlines the required security categorization activities that you need to perform when adopting cloud services. This publication also recommends security control profiles to support Low and Medium security category business domains.
9.1 Contacts and Assistance
If your organizations needs more guidance on cloud services, please contact us:
Cyber Centre Contact Centre
contact@cyber.gc.ca
613-949-7048 or 1-833-CYBER-88
10 Supporting Content
10.1 List of Abbreviations
- Term
- Definition
- Cyber Centre
- Canadian Centre for Cyber Security
- CSE
- Communications Security Establishment
- CSP
- Cloud Service Provider
- GC
- Government of Canada
- IaaS
- Infrastructure as a Service
- IT
- Information Technology
- ITSP
- Information Technology Security Practitioner
- PAA
- Program Alignment Architecture
- PaaS
- Platform as a Service
- RPP
- Report on Plans and Priorities
- SaaS
- Software as a Service
- SDLC
- System Development Lifecycle
- SLA
- Service level agreement
- SPIN
- Security Policy Implementation Notice
10.2 Glossary
- Term
- Definition
- Assessment committee
- Multidisciplinary team that includes representatives from business, legal, access to information, security, and privacy areas. It should include the business owner or her/his official designate; the authorizer (if different from the business owner); business representatives and analysts from each program or business line.
- Availability
- The state of being accessible and usable in a timely and reliable manner.
- Business domain
- A business domain is an operational environment where a department performs business activities supporting common organizational objectives.
- Business domain security control profile
- A business domain security control profile is developed for a specific business domain as opposed to an organization as a whole.
- Cloud consumer organization
- Any organization that wishes to acquire cloud based services through a CSP.
- Cloud service provider
- Any commercial provider of cloud services that wishes to offer its services to consumers.
- Compromise
- The intentional or unintentional disclosure of information, which adversely impacts its confidentiality, integrity, or availability.
- Confidentiality
- The state of being disclosed only to authorized principals.
- Impact
- A term that is generally taken to imply both injury and consequence. Business impact and mission impact are often used in this sense.
- Injury
- The damage to the national interests and non-national interests that business activities serve resulting from the compromise of IT assets.
- Integrity
- The ability to protect information from being modified or deleted unintentionally or when it is not supposed to be. Integrity helps determine that information is what it claims to be. Integrity also applies to business processes, software application logic, hardware, and personnel.
- National interest
- The damage affects the security and the social, political, and economic stability of Canada.
- On premises
- Refers to the software and technology located within the physical confines of your organization.
- Off premises
- Refers to the software and technology located outside the physical confines of your organization.
- Non-National Interest
- The damage affects the safety, health, and well-being of individuals, and the financial position and reputation of individuals and Canadian companies.
- Security advisor
- An individual or team possessing the broad knowledge and experience required to make and elaborate risk management recommendations to a departmental authorizer.
- Security categorization
- Process of identifying the potential injuries that could result from compromises of business processes and related information assets.
10.3 References
- Number
- Reference
- 1
- Canadian Centre for Cyber Security. ITSG-33 IT Security Risk Management: A Lifecycle Approach. December 2014.
- 2
- Canadian Centre for Cyber Security. ITSM.50.062 Cloud Security Risk Management. March 2019.
- 3
- Treasury Board of Canada Secretariat. Government of Canada Cloud Security Risk Management Approach and Procedures. 25 June 2018.
- 4
- Treasury Board of Canada Secretariat. Government of Canada Cloud Adoption Strategy. n. d.
- 5
- Treasury Board of Canada Secretariat. Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) . 1 November 2017.
- 6
- Treasury Board of Canada Secretariat. Policy on Service and Digital. 1 April 2020.
- 7
- Personal Information Protection and Electronic Documents Act. S.C. 2000, c.5.
- 8
- National Institute of Standards and Technology. Special Publication 800-60 Guide for Mapping Types of Information and Information Systems to Security Categories. Vol 1, Rev 1. August 2008.
- 9
- Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing v4.0. 2017.
- 10
- National Institute of Standards and Technology. Special Publication 800-145 The NIST Definition of Cloud Computing. September 2011.
- 11
- Cloud Standard Customer Council. Practical Guide to Hybrid Computing. February 2016.
- 12
- National Institute of Standards and Technology. Special Publication 800-146 Cloud Computing Synopsis and Recommendations. May 2012.
Annex A Cloud Control Profile – Low
For more information, please see Annex A Cyber Centre LOW Cloud Profile Recommendations.
Annex B Cloud Control Profile – Medium
For more information, please see Excel file, Annex B Cyber Centre MEDIUM Cloud Profile Recommendations.
Annex C Summary of Considerations for Cloud Deployment Model SelectionFootnote 14
Public | Private (on-premises) | Hybrid | Community (on-premises) | |
---|---|---|---|---|
Location |
|
|
|
|
Upfront Investment |
|
|
|
|
Complexity |
|
|
|
|
Contract and service level agreement (SLA) |
|
|
|
|
Required IT skills |
|
|
|
|
Risks from multi-tenancy |
|
|
|
|
Security from external threats |
|
|
|
|
Visibility and control |
|
|
|
|
Elasticity |
|
|
|
|