Audit of Cyber Security at Environment and Climate Change Canada (ECCC)

Download the alternative format
(PDF 707KB, 5 pages)

Background

Policy Framework

Cyber security is a shared responsibility across the Government of Canada (GC). While individual departments are responsible and accountable for the security of their endpoints and applications, other departments and agencies carry out specific government-wide responsibilities and provide advice and services to ECCC. Cyber security is the protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. It includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage, or unauthorized access to ensure confidentiality, integrity, and availability.

The Policy on Service and Digital and Directive on Service and Digital establish an enterprise-wide approach to the governance, planning, and management of cyber security. Among other requirements, deputy heads are responsible for ensuring that governance, planning, reporting, innovation and experimentation, and IT and information standards, are in place for a client and service delivery-focused model.

The Policy and Directive also stipulate that the Designated Official for Cyber Security, in collaboration with the departmental Chief Information Officer and Chief Security Officer as appropriate, is responsible for ensuring that cyber security requirements and appropriate risk-based measures are applied in accordance with the Directive on Security Management, Appendix B: Mandatory Procedures for Information Technology Security Control. These must be applied continuously, in an identify, protect, detect, respond, and recover approach to protect information systems and services.

Cyber Security at ECCC

As a science-driven department, ECCC depends on a wide array of applications, networks, and systems to fulfill its responsibilities. It handles and stores sensitive information concerning environmental policy, regulatory matters, and enforcement activities. Additionally, ECCC safeguards over a century's worth of meteorological data. Any theft or compromise of this data by malicious actors could jeopardize Canada's international competitiveness and economic interests, hinder innovation, and potentially threaten national security. Robust cyber security measures are essential to mitigating these risks.

The Department's Designated Official for Cyber Security is the Director General of Digital, Client, and Cyber Security Directorate in the Digital Services Branch, providing leadership and oversight of cyber security, in support to the departmental Chief Security Officer and the Chief Service and Digital Officer. The Information Technology Security Management Division in the Digital Services Branch is responsible for managing the departmental cyber security function. The Division ensures that security requirements and appropriate risk-based measures are applied continuously in an identify, protect, detect, respond, and recover approach to safeguard ECCC's digital assets. The IT Security Management Division is supported by many key stakeholders and teams within the Digital Services Branch, who play a role in cyber security - the Service Desk, Cloud Centre of Expertise, the Web Application and Infrastructure Security Team, IT Desktop Engineering, Development, Business Applications and Solutions, Digital Transformation, Partnerships, Planning and Digital Resource Management, Data Analytics Services, Service Management, and Digital Products, Lifecycle Management and Telecommunications divisions.

Other stakeholders outside of the Digital Services Branch are responsible for risk-management activities in support of cyber-security - for example, the public Affairs and Communications Branch is responsible for the conduct of Privacy Impact Assessments, and the responsibility over business continuity plans falls under the Departmental Security Division in the Corporate Services and Finance Branch.

Objective, scope, and methodology

Objective

The audit objective was to assess the extent to which ECCC has an effective management control framework in place to meet policy requirements, identify vulnerabilities and incidents, and mitigate risks related to cyber security.

Scope

The audit scope focused on cyber security activities under the responsibility of ECCC and related to the corporate network (endpoints and applications), aiming to provide insights into the scale and scope of cyber risk management activities across the Department. The scope included an examination of select aspects within the Department's cyber security framework, based on the results of the risk assessment performed during the planning phase of the audit:

The scope excluded the review of cyber security controls impacting ECCC, but outside of ECCC's purview (i.e. cyber security controls managed by Shared Services Canada).

The period under review for the audit was April 1, 2022, to December 31, 2023.

Methodology

The audit was conducted and completed using the following methods:

Statement of conformance

The audit conforms to the International Standards for the Professional Practice of Internal Auditing, as supported by the results of the quality assurance and improvement program.

Observations

Audit observations were developed through a process of comparing criteria (the correct state) with condition (the current state). Audit observations noted satisfactory performance, where the condition meets the criteria, or they may note areas for improvement, where there was a difference between the condition and the criteria. Where applicable, recommendations were made regarding conditions that were noted as areas of improvement. An overall audit conclusion was also made against the audit objective.

The observations, recommendations, and conclusion of this internal audit engagement were reported to senior management and the ECCC Departmental Audit Committee.

Management Response

Management agrees with the findings and accepts the recommendations of this internal audit. Where applicable, the Digital Services Branch has developed action plans to address findings and recommendations, the implementation of which will be monitored by the Audit and Evaluation Branch.

ECCC is committed to ensuring that the key control activities to mitigate cyber security risks are designed, implemented, and operating as intended.

Lines of enquiry and criteria

The following criteria were developed to address the objectives of the audit.

Line of enquiry 1: Cyber security governance, training and awareness

1.1 ECCC's cyber security governance and management policies and processes are established, with clear roles and responsibilities. This includes the role of the Designated Official for Cyber Security in providing leadership and oversight of cyber security, supporting the Chief Services and Digital Officer and the Chief Security Officer.

1.2 Cyber security training and awareness materials have been developed, communicated, and are accessible to employees.

1.3 Cyber security training activities are prepared and delivered on a regular basis to key departmental personnel involved in the application and maintenance of cyber security.

Line of enquiry 2: Cyber security in risk assessment and management

2.1 The Department has developed and communicated a security assessment (e.g. Privacy Impact Assessment, Business Impact Assessment, Threat and Risk Assessment) and authorization policy and procedures to facilitate the implementation of the policy and associated security controls.

2.2 The Department assesses the security controls in the information system and its environment of operation on a risk-based approach to determine the extent to which the controls are implemented correctly and meet established security requirements.

Line of enquiry 3: Implementation of protective measures to reduce risks

3.1 The Department has established policies governing the development, installation, and use of software by users and monitors and enforces compliance with these policies.

3.2 Controls are in place (e.g. access controls, privileged status, etc.) for the development, installation, and use and management of user-installed software.

3.3 The Department takes pre-emptive, reactive and corrective actions to remediate deficiencies and ensure that IT security practices and controls continue to meet the needs of the department.

Line of enquiry 4: Monitoring and reporting of cyber security threats

4.1 The Department has implemented the processes and technical tools to monitor, detect and report on abnormalities and incidents at application and endpoint level.

4.2 The Department performs monitoring and reporting and reviews the results of system monitoring.

Page details

Date modified: