Skip to content

Latest commit

 

History

History
36 lines (23 loc) · 4.8 KB

06_Protect-Data-at-Rest.md

File metadata and controls

36 lines (23 loc) · 4.8 KB

Protection of Data-at-Rest

(Back)

Objective

Protect data at rest by default (for example, storage) for cloud-based workloads.

Applicable Service Models

IaaS, PaaS, SaaS

Mandatory Requirements

Activity Validation
  • Implement an encryption mechanism to protect the confidentiality and integrity of data when data is at rest in storage.
  • For IaaS and PaaS, confirm that storage service encryption is enabled for data at rest (if required based on the security risk assessment).
  • For SaaS, confirm that the cloud service provider (CSP) has implemented encryption to protect customer data.
  • Use cryptographic algorithms and protocols approved by Communications Security Establishment Canada (CSE) in accordance with ITSP.40.111 and ITSP.40.062.
  • Cryptographic algorithms and protocols configurable by the consumer are in accordance with ITSP.40.111 and ITSP.40.062.
  • For SaaS, confirm that the CSP has implemented algorithms that align with ITSP.40.111 and ITSP.40.062.

Additional Considerations

Activity Validation
  • Seek guidance from privacy and access to information officials within institutions before storing personal information in cloud-based environments.
  • • Confirm that privacy is part of the departmental software development life cycle.
  • Leverage an appropriate key management system for the cryptographic protection used in cloud-based services, in accordance with the Government of Canada Considerations for the Use of Cryptography in Commercial Cloud Services and the Cyber Centre’s Guidance on Cloud Service Cryptography (ITSP.50.106).
  • Confirm that a key management strategy has been adopted for the cloud tenant.

References

Related security controls from ITSG-33

IA-7,SC12, SC13, SC28, SC28(1)