Government of Canada Cloud Guardrails
1. Introduction
1.1 Background
In August 2019, the Government of Canada (GC) established supply contracts for Protected B cloud services with Amazon Web Services Canada and Microsoft Azure. In order for the GC to use the cloud services securely and responsibly, the Chief Technology Officer of the GC deemed that an underlying operationalization framework was required. An operationalization framework was established and endorsed by the GC Enterprise Architecture Review Board in September 2019. The framework established a set of minimal cyber security controls and architecture requirements before departments use Protected B cloud services. These controls are known as the GC cloud guardrails.
1.2 Scope
The Government of Canada Cloud Guardrails:
- focus on a preliminary set of baseline cyber security controls to ensure that the cloud service environment has a minimum set of configurations
- provide a starting point for project teams and were selected to achieve the following objectives:
- comply with the:
- meet the requirements of the Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01
- address the Canadian Centre for Cyber Security’s (Cyber Centre’s) Top 10 IT security actions
- align with the Government of Canada Security Control Profile for Cloud-Based GC Services
- focus on the selection of cyber security controls to ensure that cloud services are hardened through the configuration of software components
- achieve threat protection objectives specified in Annex B Cyber Centre Medium Cloud Profile Recommendations (Excel file) and the Government of Canada Security Control Profile for Cloud-Based GC Services
2. Cloud guardrails
The Government of Canada Cloud Guardrails describe a preliminary set of baseline cyber security controls to ensure that the cloud service environment has a minimum set of configurations. Departments must implement, validate and report on compliance with the guardrails in the first 30 business days of getting access to their cloud account.
Departments are responsible for implementing the minimum configurations identified in the following tables. Validation of the guardrails will be performed by the SSC Cloud Services Directorate. The Standard Operating Procedure for GC Cloud Guardrails Validation and Escalation Oversight has been developed to support the validation.
For Government of Canada Cloud Guardrails, the following definitions will be used:
- mandatory requirements: A set of baseline security controls that departments must implement, validate and report on in the first 30 business days of getting access to their cloud account.
- additional considerations: Additional security controls that are highly recommended and should be taken into consideration. While these controls are not expected to be implemented within 30 business days of departments getting access to their cloud account, the controls include best practices that should be considered as departments establish their cloud-based environments.
2.1 Guardrail 1: protect user accounts and identities
2.1.1 Objective
Protect user accounts and identities.
2.1.2 Applicable service models
Infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS)
2.1.3 Mandatory Requirements
Activity | Validation |
---|---|
Note: user accounts and identities include:
|
|
|
|
|
|
2.1.4 Additional considerations
None
2.1.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.3
- Cyber Centre’s top 10 IT security actions, number 3
- Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain (accessible only on the Government of Canada network)
- Government of Canada Multi-Factor Authentication (MFA)Considerations andStrategy for GC Enterprise IT Services
- Directive on Service and Digital, Appendix G: Standard on Enterprise Information Technology Service Common Configurations - Account Management Configuration Requirements
- Event Logging Guidance
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104) , subsection 4.6
2.1.6 Related security controls from IT Security Risk Management: A Lifecycle Approach (ITSG-33)
AC-2, AC-2(11), AC-3, AC-5, AC-6, AC-6(5), AC-6(10), AC-19, AC-20(3), IA-2, IA-2(1), IA-2(2), IA-2(3), IA-2(11), IA-5(8), SI-4, SI-4(5), SA-4(12), CM-5
2.2 Guardrail 2: manage access
2.2.1 Objective
Establish access control policies and procedures for management of all accounts.
2.2.2 Applicable service models
IaaS, PaaS, SaaS
2.2.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
2.2.4 Additional considerations
Activity | Validation |
---|---|
|
|
|
|
|
|
|
|
2.2.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice, (SPIN) 2017-01, subsection 6.2.3
- Cyber Centre’s top 10 IT security actions, number 3
- User Authentication Guidance for Information Technology Systems (ITSP.30.031 v3)
- Guidance on Cloud Authentication for the Government of Canada (accessible only on the Government of Canada network)
- Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain (accessible only on the Government of Canada network)
- Directive on Service and Digital,Appendix G: Standard on Enterprise Information Technology Service Common Configurations
- Account Management Configuration Requirements
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104), subsection 4.6
- Password Guidance
2.2.6 Related security controls from ITSG-33
AC‑2, AC‑2(1), AC‑2(7) AC‑3, AC‑3(7), AC‑3, AC‑4 AC‑5, AC‑6, AC‑6(5), IA‑2, IA‑2(1), IA‑2(8), IA‑2(11), IA‑4, IA‑5, IA‑5(1), IA‑5(6)
2.3 Guardrail 3: secure endpoints
2.3.1 Objective
Implement increased levels of protection for management interfaces.
2.3.2 Applicable service models
IaaS, PaaS, SaaS
2.3.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
2.3.4 Additional considerations
Activity | Validation |
---|---|
|
|
2.3.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.3
- Cyber Centre’s top 10 IT security actions, number 2
- Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain (accessible only on the Government of Canada network)
- Directive on Service and Digital, Appendix G: Standard on Enterprise Information Technology Service Common Configurations
- Endpoint Management Configuration Requirements
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104) , subsection 4.9
2.3.6 Related security controls from ITSG-33
AC3, AC-3(7), AC-4, AC-5, AC-6, AC6(5), AC-6(10), AC-19, AC-20(3), IA-2, IA-2(1), IA-2(11), IA-4, IA-5, IA-5(1), SI-4, AU-6, AU-12
2.4 Guardrail 4: enterprise monitoring accounts
2.4.1 Objective
Create role-based accounts to enable enterprise monitoring and visibility.
2.4.2 Applicable service models
IaaS, PaaS, SaaS
2.4.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
2.4.4 Additional considerations
None
2.4.5 References
2.4.6 Related security controls from ITSG-33
AC-3(7), AC-6(5), IA-2(1)
2.5 Guardrail 5: data location
2.5.1 Objective
Establish policies to restrict sensitive GC workloads to approved geographic locations.
2.5.2 Applicable service models
IaaS, PaaS, SaaS
2.5.3 Mandatory Requirements
Activity | Validation |
---|---|
“Ensuring computing facilities located within the geographic boundaries of Canada or within the premises of a Government of Canada department located abroad, such as a diplomatic or consular mission, be identified and evaluated as a principal delivery option for all sensitive electronic information and data under government control that has been categorized as Protected B, Protected C or is Classified.” |
|
2.5.4 Additional considerations
None
2.5.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice, SPIN 2017-01, subsection 6.2.3
- Directive on Service and Digital, subsection 4.4.3.14
2.5.6 Related security controls from ITSG-33
SA-9(5)
2.6 Guardrail 6: protection of data at rest
2.6.1 Objective
Protect data at rest by default (for example, storage) for cloud-based workloads.
2.6.2 Applicable service models
IaaS, PaaS, SaaS
2.6.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
2.6.4 Additional considerations
Activity | Validation |
---|---|
|
|
|
|
2.6.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.4
- cryptography guidance in Cryptographic Algorithms for Unclassified, Protected A and Protected B Information (ITSP.40.111) and Guidance on Securely Configuring Network Protocols (ITSP.40.062)
- Guidance on Cloud Service Cryptography (ITSP.50.106)
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104), subsection 4.5
2.6.6 Related security controls from ITSG-33
IA-7, SC-12, SC-13, SC-28, SC-28(1)
2.7 Guardrail 7: protection of data in transit
2.7.1 Objective
Protect data transiting networks through the use of appropriate encryption and network safeguards.
2.7.2 Applicable service models
IaaS, PaaS, SaaS
2.7.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
|
|
2.7.4 Additional considerations
None
2.7.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.4
- Directive on Service and Digital, Appendix G: Standard on Enterprise Information Technology Service Common Configurations
- Web Sites and Services Management Configuration Requirements
- cryptography guidance in Cryptographic Algorithms for Unclassified, Protected A and Protected B Information (ITSP.40.111) and Guidance on Securely Configuring Network Protocols (ITSP.40.062)
- network security zoning guidance in Baseline Security Requirements for Network Security Zones (ITSP.80.022) and Network Security Zoning (ITSG-38)
- Guidance on Cloud Service Cryptography (ITSP.50.106).
- Government of Canada Recommendations for TLS Server Certificates for GC Public Facing Web Services(accessible only on the Government of Canada network)
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104), subsection 4.5
2.7.6 Related security controls from ITSG-33
IA-7, SC-12, SC-13, SC-28, SC-28(1)
2.8 Guardrail 8: segment and separate
2.8.1 Objective
Segment and separate information based on sensitivity of information
2.8.2 Applicable service models
IaaS, PaaS
Note
The following guardrail is not applicable to SaaS. The cloud service provider is responsible for the management and security of the network and this responsibility is included as part of the SaaS offering. Refer to section 4.3 of Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104) to understand key considerations for cloud network segmentation.
2.8.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
2.8.4 Additional considerations
Activity | Validation |
---|---|
|
|
2.8.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.4
- Cyber Centre’s top 10 IT security actions, number 5
- network security zoning guidance in Baseline Security Requirements for Network Security Zones (ITSP.80.022) and Network Security Zoning (ITSG-38)
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104), subsections 4.3 and 4.5
2.8.6 Related security controls from ITSG-33
AC‑4, SC‑7
2.9 Guardrail 9: network security services
2.9.1 Objective
Establish external and internal network perimeters and monitor network traffic.
2.9.2 Applicable service models
IaaS, PaaS, SaaS
2.9.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
|
|
|
|
2.9.4 Additional considerations
Activity | Validation |
---|---|
|
|
2.9.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.4
- Cyber Centre’s top 10 IT security actions, number 1
- network security zoning guidance in Baseline Security Requirements for Network Security Zones (ITSP.80.022) and Network Security Zoning (ITSG-38)
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104), subsection 4.3
2.9.6 Related security controls from ITSG-33
AC-3, AC‑4, SC‑7, SC‑7(5), SI-4, SI-4(18)
2.10 Guardrail 10: cyber defence services
2.10.1 Objective
Establish a memorandum of understanding for defensive services and threat-monitoring protection services.
2.10.2 Applicable service models
IaaS, PaaS, SaaS
2.10.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
2.10.4 Additional considerations
None
2.10.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.3
2.10.6 Related security controls from ITSG-33
SI‑4
2.11 Guardrail 11: logging and monitoring
2.11.1 Objective
Enable logging for the cloud environment and for cloud-based workloads.
2.11.2 Applicable service models
IaaS, PaaS, SaaS
2.11.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
|
|
|
|
|
|
2.11.4 Additional considerations
None
2.11.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.3.1
- Cyber Centre’s top 10 IT security actions, numbers 1, 5 and 8
- Event Logging Guidance
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104), subsection 4.8
2.11.6 Related security controls from ITSG-33
AU‑12, SI-4, SI-4(7)
2.12 Guardrail 12: configuration of cloud marketplaces
2.12.1 Objective
Restrict third-party software from cloud service providers to ensure that only GC-approved products are used.
2.12.2 Applicable service models
IaaS, PaaS, SaaS
2.12.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
2.12.4 Additional considerations
Activity | Validation |
---|---|
| Not applicable |
| Not applicable |
2.12.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.5
2.12.6 Related security controls from ITSG-33
CM5, CM8, SA12
2.13 Guardrail 13: plan for continuity
2.13.1 Objective
Ensure that there is a plan for continuity of access and service that accommodates both expected and unexpected events.
2.13.2 Applicable service models
IaaS, PaaS, SaaS
2.13.3 Mandatory Requirements
Activity | Validation |
---|---|
|
|
|
|
2.13.4 Additional considerations
Activity | Validation |
---|---|
|
|
|
|
|
|
2.13.5 References
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01, subsection 6.2.9
- Break glass emergency account management procedure for Azure and Office 365 (accessible only on the Government of Canada network)
- Cyber Security Event Management Plan template for departments (Word file) (accessible only on the Government of Canada network)
- Directive on Service and Digital
2.13.6 Related security controls from ITSG-33
AC-1, CP-1,CP-2,CP-9,CA-3
3. After the first 30 business days
Implementing the guardrails is one of the first steps to establishing a secure cloud-based environment. Departments are expected to continue implementing the security requirements as outlined in:
- Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) 2017-01
- Government of Canada Security Control Profile for Cloud-Based GC Services
Departments should engage with their IT security risk management teams to obtain advice and guidance on integrating security assessment and authorization activities as part of the implementation of the GC cloud environment. The Government of Canada Cloud Security Risk Management Approach and Procedures outlines activities for departments to consider as part of risk management.
Shared Services Canada (SSC) will perform periodic audits of the departmental tenant environment to ensure ongoing compliance with the guardrails after the first 30 business days.
4. Cloud usage profiles
4.1 Overview
The following table outlines the cloud usage identifier, profiles, descriptions and cloud service models used in the GC.
Identifier (ID) | Profile | Description | Applicable cloud service model |
---|---|---|---|
1. | Experimentation or sandbox |
| IaaS, PaaS, SaaS |
2. | Non-sensitive cloud-based services |
| IaaS, PaaS, SaaS |
3a. | Sensitive (up to Protected B) cloud-based services |
| IaaS, PaaS, SaaS |
3b. | Sensitive (up to Protected B) cloud-based services (hybrid IT – extension of GC data centres) |
| PaaS, SaaS |
4a. | Sensitive (up to Protected B) cloud-based services for GC-wide SaaS solutions |
| SaaS |
4b. | Sensitive (up to Protected B) cloud-based services for GC-wide SaaS solutions (hybrid IT – extension of GC data centres) |
| SaaS |
5. | GC to GC only (hybrid IT – extension of GC data centres) |
| IaaS, PaaS |
6. | Cloud-based services with external user access and interconnection to GC data centres |
| IaaS, PaaS |
4.2 Mapping guardrails to cloud usage profiles
The following table describes the applicability of the guardrails during the first 30 business days of departments getting access to their cloud account. Within each departmental cloud tenant, there will be various information systems being provided. Each cloud sub-account or resource group should be tagged with the relevant cloud usage profile to ensure that appropriate policies are applied and validation is performed.
Identifier (ID) | Guardrail | Applicable service models | Profile 1: experimentation or sandbox | Profile 2: non-sensitive cloud-based services | Profile 3a and 3b: sensitive (up to Protected B) cloud-based services | Profile 4a and 4b: sensitive (up to Protected B) cloud-based services for GC-wide SaaS solutions | Profile 5: GC to GC only (hybrid IT – extension of GC data centres) | Profile 6: cloud-based service accessible to external users (connections to GC data centres required) |
---|---|---|---|---|---|---|---|---|
1 | Protect user accounts and identities | IaaS, PaaS,SaaS | Required (minimum for privileged users) | Required | Required | Required | Required | Required |
2 | Manage access | IaaS, PaaS, SaaS | Required | Required | Required | Required | Required | Required |
3 | Secure endpoints | IaaS, PaaS, SaaS | Recommended | Required | Required | Required | Required | Required |
4 | Enterprise monitoring accounts | IaaS, PaaS, SaaS | Required (for billing) | Required | Required | Required | Required | Required |
5 | Data location | IaaS, PaaS, SaaS | Recommended | Recommended | Required (required in Canada for GC storage of Protected B information and above) | Required (required in Canada for GC storage of Protected B information and above) | Required (required in Canada for GC storage of Protected B information and above) | Required (required in Canada for GC storage of Protected B information and above) |
6 | Protection of data at rest | IaaS, PaaS, SaaS | Not required | Recommended | Required | Required | Required | Required |
7 | Protection of data in transit | IaaS, PaaS, SaaS | Recommended | Required | Required | Required | Required | Required |
8 | Segment and separate | IaaS, PaaS | Required (network filtering at a minimum) | Required | Required | Required | Required | Required |
9 | Network security services | IaaS, PaaS, SaaS | Recommended | Required | Required | Required (restrict to GC only) | Required (deny external access, GC only) | Required |
10 | Cyber defence services | IaaS, PaaS, SaaS | Not required | Required | Required | Required | Required | Required |
11 | Logging and monitoring | IaaS, PaaS, SaaS | Recommended | Required | Required | Required | Required | Required |
12 | Configuration of cloud marketplaces | IaaS, PaaS, SaaS | Required | Required | Required | Required | Required | Required |
13 | Plan for continuity | IaaS, PaaS, SaaS | Not required | Required | Required | Required | Required | Required |
5. References
5.1 Related policy instruments
5.2 Additional references
- Government of Canada Security Control Profile for Cloud-Based GC Services
- Government of Canada Cloud Security Risk Management Approach and Procedures
- Directive on Security Management - Appendix J: Standard on Security Categorization
- Government of Canada Cloud Event Management Standard Operating Procedure
- Concept case for digital projects (accessible only on the Government of Canada network)
- Enterprise Security Architecture (ESA) Template Guides
- Guideline on Defining Authentication Requirements
- Guideline on Identity Assurance
- Guidance on Using Tokenization for Cloud-Based Services (ITSP.50.108)
- Guidance on Cloud Service Cryptography (ITSP.50.106)
- IT Security Risk Management: A Lifecycle Approach (ITSG-33)
- Guidance on Securely Configuring Network Protocols (ITSP.40.062)
- Baseline Security Requirements for Network Security Zones (ITSP.80.022)
- Network Security Zoning (ITSG-38)
- Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104)
Appendix A: Cloud operationalization framework
The following table provides an overview of the updated framework. The framework sets out the steps that organizations must take in order to make use of Protected B cloud services.
Organization | Responsibilities | ||||||
---|---|---|---|---|---|---|---|
assess the cloud service provider | obtain a cloud account | apply guardrails | obtain the authority to operate | evaluate connectivity readiness | deploy cloud solutions | operate and maintain the solutions | |
Departments |
|
|
|
|
|
|
|
Shared Services Canada |
|
|
|
|
|
|
|
Treasury Board of Canada Secretariat |
|
|
|
|
|
|
|
Canadian Centre for Cyber Security |
|
|
|
|
|
|
|