Cloud services
Cloud services
Services and information
Application Hosting Strategy
The Application Hosting Strategy provides direction for departments and agencies to evaluate application hosting solutions
Choosing the right cloud service
Find out which cloud deployment model is right for your organization
Secure use of cloud services
How to put in place secure cloud solutions
Risk-management for cloud-based services
Protect cloud services by ensuring that the proper security controls are in place
Digital sovereignty
Digital and data sovereignty in GC operations and cloud environments
Recommended controls for cloud-based services
How to secure, manage, and use cloud services
Use of Cryptography in Cloud
Security considerations for protecting sensitive data in cloud-based deployments
Security Playbook for Information System Solutions
Tasks to consider when designing and implementing solutions for GC information systems in cloud environments
Guideline on Cloud Authentication
Authentication standards for cloud services, including multi-factor authentication, authentication solutions, implementation, security considerations