Network and Security Strategy

Network and Security Architecture
Digital Enablement
Chief Technology Officer Branch

Table of contents

1. Executive Summary

The Government of Canada (GC) is about to undertake one of its largest technology transformational changes in decades as it begins the process of consuming cloud‑based services from both a computing and a software perspective. These transformation requirements are similar to what is taking place throughout industry. Industries such as retail chains, banks and hotel chains are all undertaking similar network and security transformations to leverage the advantages of using cloud-based solutions to support their core business. The reality that Shared Services Canada (SSC) must support a wide variety of businesses (40+) makes it even more challenging. Owing to this variety, SSC needs to focus its network and security strategy on those network and security requirements that are common to all businesses.

Today, general expectation is to be able to be online at any time, regardless of the demand and/or circumstances, since almost all government employees require information technology (IT) to provide their services. The variety of services requiring secure network connectivity is also expanding. The use of cloud, Internet, collaboration, video/web conferencing and secure-remote access services have exploded throughout the GC in recent years. Providing faster, secure and more reliable network infrastructure will be even more important as current and new services are expected to continue to grow in the future.

Recent events have raised awareness of the need to support flexibility in working requirements to support significant percentage of employees working from home and using other remote access options.

The growing use of these new cloud-based services will increase the attack surface for government infrastructure and applications and therefore, SSC must review how it approaches its delivery of network and security services to support GC departments and agencies in delivering their services to Canadians.

The key business drivers for the updated SSC Network and Security strategy are:

The need for the revised strategy is further reinforced by looking at the data that traverses the government networks—everything from personal information the Canada Revenue Agency keeps for every Canadian, to the Royal Canadian Mounted Police’s policing information, and beyond. The advent of foreign state-sponsored actors undertaking sophisticated attacks on government assets requires the Canadian government to undertake a fundamental redesign of how they secure networks and transport data to employees and Canadians alike.

The future design and provision of network services will also require SSC to take a different approach to security. Organizations globally are moving to a new model of securing the network based on the premise of “don’t trust but verify”, referred to as Zero Trust Architecture (ZTA), which alters the security paradigm from the old protect‑the‑perimeter (also known as castle-and-moat) to the newer idea of protecting the data flow from end to end or user to application.

SSC is refreshing its Network and Security Strategy to align with current best practices, and to be adaptable to future requirements for its network and security services. Technologies, such as cloud computing, Internet of Things (IoT), and 5th Generation Digital Cellular (5G) Network services, are examples of the emerging technologies with which government infrastructure needs to integrate. These technology trends will require SSC to rethink how it architects, provides, manages and secures its network services, and must be agile enough to integrate any technology that is deemed necessary to government operations.

To develop this Network and Security Strategy, new approaches focused on automation, software-defined infrastructure (SDI) and a zero trust concept are required. The foundational pillars in this document are the underpinning for these new approaches, and are the focus of this strategy.

The foundational pillars are:

A new Provisioning Approach must also be adopted to meet advances in technology and user expectations for timely service delivery. Services are expected to be provided in hours or days, and not weeks or months. Leveraging SDI to enable provisioning of network and security infrastructure is a key enabler of this approach.

Underpinning this recommendation is the need for advanced skills in areas including cloud management, cloud security, artificial intelligence, networking, security and automation. SSC will need to consider how it can create a valuable proposition that attracts resources with valued skillsets and enables their retention.

The Network and Security Strategy defines the approach SSC will need to undertake to enable the government to meet the demands of today, and adapt to the demands of the future by leveraging a progressive adoption and migration overall strategy.

To implement this strategy, the following strategic principles are recommended:

  1. Ensure existing and future projects are provided guidance and not done in silos but done with all services in mind toward the Network and Security vision and strategy.
  2. Commence, prioritize and sequence critical foundational capabilities for early delivery. What initiatives will get SSC to its desired end state?
  3. Do not try to implement a big bang solution. This will be an evolution using current projects and refresh cycles, starting small and starting to use technology SSC already has.
  4. Consider investing in automation and orchestration of technology SSC already supports.
  5. Address the need for integration between security and network functions early as a critical change management activity.
  6. Address skills gap within workforce to keep up with the ever -hanging technologies and skill requirements (for example, programming).

1.1. Connectivity

The foundations of this pillar feature the technology components (for example, switches, routers, firewalls and load balancers) that make up the fabric of the GC networks, and covers internal and external access to these networks. SSC will see several emerging technologies become a major part of its connectivity strategy moving forward:

Progressive integration of these technologies, the emerging ones in particular, will establish the foundation for the “go-forward” network SSC is looking to build.

1.2. Identity and Access Control

Identity and access control refers to the authentication and authorization required for users and devices to interact with, and connect to, GC technology resources. Identity and access control will integrate with ZTA to fundamentally change how platforms and data are secured. In the ZTA model, everyone is viewed as a threat unless proven otherwise. The core benefit of this framework is that it enables organizations to secure internal and external users across the network. The complexity is that this model requires SSC to fundamentally redesign the core network and technology components and consolidate the identity services within GC networks with the objective of moving to a single identity for employees and another for external users.

1.3. Monitoring

Figure 1: AIOps Platform Enabling Continuous Insights Across IT Operations and Monitoring
High Level overview of the Artificial Inteligence Operations (AIOps)– outlining the inputs/outputs following the Observe|Engage|Act paradigm aligned with Machine Learning (ML).
Text description – Figure 1: AIOps Circle

Depicts the interrelations of the concept of AIOps (Artificial Intelligence Operations).

Beginning in the centre with the “AIOps Platform” deriving tasks or actions from Machine Learning applied to a Big Data repository to interact with the next layer; Observe (Monitoring), Engage (ITSM), and Act (Automation).

Inputs [Events, Metrics traces, Topology] are collected as both real-time and historical data for analysis.

Incidents, Dependencies and Changes are also collected for review and analysis.

Resulting actions from this analysis process includes: scripts, run books, ARA, or other actions dependent on the level of integration of the systems.

Continuous monitoring and how it addresses both performance and security-related needs means the future network services will also require different monitoring capabilities. SSC will need to adopt a suite of tools to enable effective monitoring of its network, platform and data assets. This will include how SSC leverages products from cloud and third-party technology providers to create a pool of data for predictive analysis of threats, performance and availability challenges. Leveraging platforms such as Artificial Intelligence Operations platforms (AIOps) will enable SSC to derive deep insights and drive automated response to incidents. SDI / software-designed network (SDN) will be a critical enabler for adopting AIOps.

1.4. Provisioning Approach

The way the GC currently provisions infrastructure needs to adapt to meet advances in technology and user expectations of timely service delivery. Increasingly, partner departments will expect, based on comparable public offerings, services to be stood up in hours, not weeks or months. SSC will need to leverage SDI/SDN to enable the provisioning of network resources to meet expected demands.

The Network and Security Strategy defines the approach SSC will need to undertake to enable the government to meet the demands of today, and to adapt to the demands of the future by leveraging a progressive adoption and migration overall strategy. To implement this strategy, SSC will need to develop a cohesive set of requirements and reference architectures for the enabling technologies and frameworks defined within this document, and accelerate the procurement of products and services to enable the strategy.

2. Introduction

2.1. Purpose

The purpose of this document is to expand on the SSC Future Network and Security Vision, which establishes the future vision for SSC, essentially outlining the integration of SDI and ZTA. This document will attempt to elaborate on that premise, and consider the strategy and roadmap that SSC should undertake to uplift network and security services, address emerging technology and security trends, and operationalize the principles outlined in SSC 3.0.

This document was developed leveraging a number of key inputs from both within SSC and the broader GC, security trends and emerging practices, and through interviews with SSC and Treasury Board of Canada Secretariat (TBS) stakeholders.

2.2. Audience

The audience for this document includes the IT Security Tripartite, departmental chief information officers (CIO), the Canadian Centre for Cyber Security’s (CCCS) executives and SSC service lines.

3. Strategy Rationale

With the rapid pace of infrastructure technology advancement, SSC requires a new approach to managing and operating the SSC network and security environment. The current approach will not scale to meet these demands. It is challenging for the workforce to keep pace with these changes as technology advancements are outpacing the available skills required.

Not only is technology evolving too quickly to keep pace, new threat vectors and security breaches are occurring so often that information technology (IT) staff cannot respond quickly enough to address them. Increased user mobility and connectivity from outside of the physical data centre (DC) lends itself to even more challenging security containment, not to mention workloads that are migrating to the public cloud, raising the bar even higher. IT staff cannot respond quickly enough, since they don’t have the right information available to make informed decisions. Better monitoring, encompassing broader data collection (including security events, network events, identity/access management and network performance metrics) is required to ensure sufficient visibility across the enterprise.

IT as a whole has become much more complex. This increased complexity has resulted in negative impacts on the provisioning times of services for SSC customers and overall reduced service levels. IT operations staff are tasked with learning new software and tools constantly to keep pace with the changes in technology. The high rate of change has resulted in, and the increase in, heightened risks related to the manual effort involved, further eroding reliability of SSC’s services to its customers.

To meet these challenges, new approaches are required focusing on automation, SDI and a zero-trust concept. The pillars described in Section 1 will be the foundation for these approaches, and will be the focus of this strategy document.

This Future Network and Security Strategy document is an extension of the SSC Future GC Network and Security Vision document and aligns with SSC 3.0 and the GC Digital Operations Strategic Plan 2018-2022Footnote 1. This document is intended to be a dynamic, strategic description of a future GC network and security direction. The strategy laid out is a critical step toward achieving the GC’s long-term digital government objectives through the development of a “modern, sustainable, reliable and robust technology infrastructure [that] enables horizontal digital service delivery, collaboration and information-sharing across government and with citizens, external business, stakeholders and partners.”

This strategy will provide a future state and roadmap that will enable SSC to evolve into a more modern service delivery organization with best-of-breed technology and practice to meet the needs of the GC partner departments into the future.

4. Business Drivers and Other Challenges

SSC provides a range of services to Government of Canada departments and agencies. The organization plays a key role in the GC’s ability to deliver a secure digital network that enables a positive user experience. The table below lists the key drivers for a modern network and security strategy that supports the emerging demands of digital government. While all are critical, there is no specific order for prioritization, dependencies or implementation sequencing. Some drivers are more relevant to SSC, some more so to GC, and the distinction is indicated in brackets with the Business Driver.

Table 1 – Business Drivers
Number Business driver Description
1 Seamless end-user mobility (GC) Enables users to connect securely, seamlessly and simply to their departmental network resources and the Internet/cloud. Anytime/anywhere access from any GC‑approved device.
2 Enhanced security (GC) Ensures GC assets are properly protected and GC network connections to the Internet/cloud are adequately monitored.
3 Enhanced network performance (GC) Supports existing and emerging demands for bandwidth and fast response times. Improves reliability through reduced outage times and performance degradation.
4 Network resiliency (GC) Enables self healing, auto recovery and automation to build a more resilient network.
5 Support more remote work (GC) Considers how with current events there are more employees working remotely than there has ever been.
6 Operational efficiency (SSC) Reduces manual effort and overhead, develops scalable solutions to improve time to deliver, integrates teams and breaks down silos.
7 Manage vendor lock-in (SSC) Supports a movement toward open standards with a vendor agnostic mindset.
8 Extend life cycle of existing assets (SSC) Optimizes IT asset refresh cycles.
9 Stewardship of security (SSC, TBS, CCCS and other departments) Provides visibility and control over network assets and services.

The listed Business Drivers comprise some of the key motivating forces behind digital transformation for the GC and within IT in general. For SSC to plan its network strategy, it is important to understand the trends driving change in the IT industry. The aforementioned Digital Operations Strategic Plan is about building on those early steps and charting the path forward. This Network and Security Strategy document works to align with the change drivers and challenges that were considered as part of the basis for the strategic vision, digital standards and action items identified in the Digital Operations Strategic Plan.

Table 2 – Other Challenges
Number Other Challenges Description
1 Aging workforce Resulting in a decreased number of available human resources.
2 Resource competition Skilled resources being sought by private sector, further limiting resources availability.
3 Compliance issues Preventing quicker uptake of evolving technologies (for example, cloud services).
4 Dated processes Government procurement cycles unable to keep pace with technological disruption and innovation.

Similar to the Business Drivers, the Other Challenges present real and significant obstacles to the successful completion of this initiative. Contrary to the Business Drivers, Other Challenges are less tangible than technical issues. Staffing, compliance and processes will contribute as many trials toward this project’s success, but as these issues fall into the people/process category, they can have a more political impact, and thus impose their own requirements.

5. Current State of Networking and Security within the GC

The GC network includes approximately 50 logical networks, spanning approximately 4,000 sites and approximately 5,000 buildings. It reaches over 400,000 users in Canada and around the world. Predictably, this network includes many diverse physical devices, vendors, and different levels of integration. Configurations have been primarily done manually, by system engineers and operators within SSC and within other departments, which can lead to inconsistencies in the configurations. This lack of consistency has led to manageability challenges, reduced reliability and higher operational overhead. Changes to network and security infrastructure and software are slow and expensive, often requiring replacement of incorrectly sized hardware as well as rework for lack of alignment with a long-term vision. Adjusting current network technology and topology to accommodate the demand of agility and flexibility by modern multi-cloud-based services is also unmanageable. There are also costs associated with these inefficiencies:

“A recent Gartner studyFootnote 2 has identified that SSC’s network and security model is expensive to operate with a 19% or $427 million greater cost than peers.”

This network design relies on traditional security models, such as the secure perimeter concept. In this concept, most security efforts go toward defending the perimeter. This has worked well historically, when there was only “one door to defend”— essentially the “door” to the DC. However, today there are many “doors to defend”, including but not limited to:

Cyber threats must also be monitored from within the organization as organizations are experiencing an increase in insider threats, such as users downloading an infected file (inadvertently) or a disgruntled employee exfiltrating data (intentionally). A well-known example is the data breach at DesjardinsFootnote 3 leaking personal information of more than 4.2 million members.

Inconsistency in device monitoring and support teams working in silos further add to the layers of complexity that hinder timely and cost-effective problem resolution. Given the on-going growth of cross-domain integration within technologies, the silo-based team model of the past will prove incompatible with this new paradigm. Engineering, security and support teams need to work together to meet these new demands of network and security services of the future. Cross-domain integration also has training implications, and this should be considered as training plans are developed. The role of the “Hybrid Engineer” is emerging—this individual will have an in-depth understanding of new consumption models for network, security and operations. They will have new skills that are critical to successfully implement the next generation of network and security infrastructure.

Another key requirement is real-time visibility into the network and security health of the entire infrastructure. Continuous monitoring is foundational to understanding not only historical data for forensic review and trend analysis, but also the point-in-time status of the environment, notwithstanding the ability to detect and respond to threats in a timely manner. To effectively manage changes, whether manual or programmatic, understanding the current state is essential. Only then can informed changes be planned and implemented.

The final consideration is the geo-distant nature of the GC network. Spanning beyond national boundaries, GC users can be located around the world, and existing solutions fall short. While the complex nature of the distributed-services requirement will not change, a focus on opportunities of optimization and traffic-shaping will be most advantageous for the future.

In short, the growing risk of cyber threats, the complexity of the current network and security infrastructure, and the lack of cross-functional monitoring and skills will lead to a reduction in operational efficiency, an inability to respond to growth demands and service availability issues.

Figure 2: SSC Current-State Network
High Level overview of the GC Network: Buildings (LAN), Regional Communication Hubs (SD-WAN), EDC Core (SDN), GC Backbone, Cloud/Internet connections and Science network with CANARIE connectivity.
Text description – Figure 2: SSC Current State Network

This image represents the major elements of the SSC network as a whole.

  • Satellite services
  • GC Backbone
  • Enterprise Data Centres
  • Interconnecting the inter and intra building networks [WAN & LAN (including WiFi)]
  • Integration with Internet and multiple cloud services via cloud exchange provider(s)

Additionally showing the GC Science Network & Canarie network connection to the Government of Canada Backbone.

6. Emerging Industry Trends

Over the past decade, the move to cloud is well underway and adoption rates are still rising. Cloud offers the enterprise the platform to support the agility and accelerated pace demanded by their users. Along with cloud and the unprecedented allure of change, there is also an expectation of how users want to work. The idea of “work” is no longer seen as a location, but an activity, as it is becoming the norm in many enterprises, and is becoming an expected trait of the workplace. Lastly, IoT brings devices into the network that would have recently been inconceivable. Coupled with cloud Infrastructure-as-a-Service (IaaS)/Platform-as-a-Service (PaaS)/Software-as-a-Service (SaaS) adoption of services, it is ever increasingly difficult to define, let alone manage, the perimeter for the security defences to contain.

These trends require SSC to examine new approaches to providing network services and information security to the GC. Collectively, these industry changes affect further changes to enterprise infrastructure as organizations no longer control the location or boundary of the collection of services used for business. No longer is the traditional perimeter security model (castle-and-moat) sufficient; the perimeter is no longer within control of one organization.

6.1. Zero Trust Architecture (ZTA)

Figure 3: Zero Trust Access process
Overview of the sequence of events to establish, and then oversee a Zero Trust Access policy based session: from one well-qualified user to one application/data source via secure end-to-end encrypted micro-segment tunnel.
Text description – Figure 3: Zero Trust Access—connect/communications process

Outline the steps involved in establishing a “data flow session” for the secure exchange of data from User to Data.

Steps:

  1. Access request—a well-qualified User and their device context combine as the “who” of the ZTA process.
  2. Secure Access Gateway (aka Secure Web Gateway) acts as a connection broker—forwarding the request through Authentication Services and on to Policy Evaluation.
  3. Once the request is validated, the Policy Engine determines if the User can complete the request.
  4. The Policy Engine forwards the approved request on to a Resource Catalog for an instance of the resource.
  5. This results in the spawning of the data-flow session across the encrypted micro-segmented tunnel which lasts only for the duration of the session.
  6. Throughout the full session, Continuous Monitoring applies behavioural analytics and other oversight monitoring of each packet to ensure full compliance with established security/policy requirements.

The emerging industry trends, and the risks they inherently impose, require adoption of a new paradigm in approach to security; that paradigm is Zero Trust Architecture (ZTA). This new approach renounces any implied trust (of users or location), assumes hostility within the network replaces the dated ideas of security based on physical location, and moves to a dynamic user/device/application policy driven model. Historically, Internet Protocol (IP) networks were designed with the intent of easy discovery of devices on the network. This approach is no longer sufficient for security, and the ZTA concept of no-implied-privilege (also known as a dark network) enables a user to see only devices/applications that they are intended to see/access. This drastically reduces many of the risks associated with the typical security breach. Most significantly, this approach accommodates public, hybrid and private cloud, and access to legacy physical systems. Figure 2 shows the complexity of the modern enterprise environment—hosting multiple compute stacks, including mixed-vendor solutions or private cloud stack.

6.2. Work from Home and Secure Remote Access

Recent events have pushed technology services in almost every industry to rapidly adapt to a change in work location. In response to COVID-19, most organizations were forced to adopt a work-from-home and a remote access work model. This shift of locale has stressed these services to the breaking point, and at the same time sees opportunity for innovative implementations to grow and shine in servicing these needs. Traditional virtual private network (VPN) or remote desktop applications, while functional, were typically not scaled for the majority of the workforce to leverage simultaneously. Secure Access Services Edge (SASE) has been thrust into mainstream with growing visibility from the main research groups (for example, Gartner, Deloitte and KPMG), and have seen exponential growth in the adoption of their services. What was seen as fringe not long ago is now mainstream and central to many “road map” strategies.

6.3. Software-Defined Infrastructure

Legacy networks have served well in their time. However, new and changing demands on these installations are exposing their shortcomings. Long to implement, slow to change and expensive are a few of the common faults identified by stakeholders. Fixed design, while highly performant and predictable, is also the root cause of the static nature of the infrastructure. Additionally, it has been observed that the traffic pattern within the enterprise network has changed. Historically, most traffic was from the business to the consumer or other business (north/south traffic). More recently, the majority of data flow stays within the enterprise organization (east/west traffic). This evolution of traffic flow shifts the security risks and exposure that require additional diligence within the enterprise. In the past, internal data flow was considered trusted based solely on its location within the enterprise. Recent statistics on data breaches show upwards of 80 %Footnote 4 are from internal exposure or compromise. Additionally, as the demand for access from outside the organization accelerates, ability to shift to a model that addresses each data access request equally, regardless of location, is essential. Much like virtualization has revolutionized the compute and storage paradigms, now the network and security devices are undergoing a similar shift. Abstraction of network and security devices allows for a flexibility in design that better suits the new distributed technologies model.

Software-designed infrastructure (SDI) will have considerable influence on technology infrastructure and operational models. SDI represents a collection of software-defined services—the local area network (SD-LAN), commonly found in “Edge” buildings, intelligent routing over WAN link options (SD-WAN), software-designed data centres (SDDC) (including compute, storage) within a virtual context, SDN (encompasses both Network and Security)—that leverages the new paradigm of separation of software. SDI changes traditional functional models, with networking hardware running dedicated specialized software.

SDI represents a collection of software-defined services including the following:

SDI will change the way technologies are deployed in the future, no longer requiring specific hardware for new or improved functionalities. Also, the benefits of SDI will far outweigh the potential throughput impact that is sometimes observed when highly optimized, hardware-based, devices (operating at near line speed) are replaced with software-based devices.

SDI facilitates the elasticity of resources through the application of SDI-specific functions. On-demand changes in infrastructure characteristics, such as capacity, speed, quality of service and security are enacted using SDI technologies. This type of functionality enables fast and efficient provisioning of resources resulting in operational efficiencies, cost effective resource utilization and ultimately, customer satisfaction through improved service offerings.

SDI decouples the hardware and software. This brings additional functionality and flexibility to infrastructure that previously were relatively static throughout their 3-5 year life cycle. SDI enables multiple software components to coexist on a given hardware component resulting in multi-function devices (for example, a router coexisting with a firewall providing advanced integrated networking and security functionality).

6.3.1. SD-LAN - Edge Network - Office / Building LAN Services

Corresponding technology focus: Software-Defined Access (SD-LAN)

SD-LAN defines how offices (vs individuals) will connect with the future-state local network. Technologies such as Wi-Fi 6 and 5G will provide an opportunity to modernize and enhance the user experience as they are leveraged as a more flexible means of connectivity. Edge Network—Office/Building Services include considerations for connecting end-user devices to the network through Wi-Fi/Wi-Fi 6 and 5G. While the strategy/approach of “wireless first” will simplify user connectivity, reduce fit-up costs and enhance user experience, some devices (for example, printers and videoconference stations) are not practical for wireless connectivity. This approach will also accommodate more predictability in the traffic routing to/from these devices, providing traffic optimization.

Network performance is critically important for Edge Building—Office/Building Services and direct Internet connectivity (SD-WAN) for user access (vs backhaul to centralized firewalls) and should be planned as a means of improving network efficiency and effectiveness. Considering that up to 60+ % of network traffic relates to “office” documents (which will be destined to Office 365), Direct Internet Access (DIA) links and SD‑WAN can measurably reduce network traffic across the GC Backbone, while simultaneously improving typical user experience. As a part of the SDI strategy, with enhanced design and policy changes in both the network and the security domains, this will serve to improve application performance, and thereby user experience. Given the adoption of cloud services, the expectation of onboarding IoT devices and the growing call for “bring your own device” (BYOD), it is reasonable to assume the legacy approach to perimeter protection will not suffice. The Zero Trust model provides the flexibility and manageability that will be required for the future state, and therefore, should be considered for early integration as part of the fulfillment of the network and security strategy.

6.3.2. Remote Access—Software-Designed Perimeter

Remote Access focuses on how users connect remotely to GC services.

Corresponding technology focus: SDP

In this context, remote access is defined as any connection where a user is not directly connected to a GC network using traditional wired infrastructure or using a Wi-Fi service with direct corporate network access.

New technologies such as 5G and Wi-Fi 6 will change the users’ “last-mile” services in the medium term. Changes are already occurring in the way end-remote-users devices are secured in areas such as user authentication and end-point protection for laptops, mobile phones and tablets. These changes and the impact on the security requirements for these devices impose new constraints on how remote access services will be implemented going forward. Strong user authentication is critical in a ZTA environment, with GC-wide Multi-Factor Authentication (MFA) being an essential part. With the adoption of BYOD, IoT, and cloud-hosted applications and services, it becomes clear that control over the perimeter is no longer easily definable. Given this “loss of control”, new mitigation measures must be put in place to secure the enterprise. ZTA provides this function. By focusing on security between the end-user/session and the application, regardless of where it resides, the data-flow can be secured and made compliant to policy. This affects two key aspects of security—first, the user gets access only to those applications to which they are allowed to use, and second, the Zero Trust model implies limited visibility. Limited visibility implies that a user or system cannot see or discover other devices on the network outside if its policy-based isolation (see micro-segmentation).

6.3.3. Software-Defined Wide Area Network (SD-WAN)

SD-WAN is a specific application of SDN technology applied to WAN connections such as legacy point-to-point, broadband Internet, 4G, LTE or Multi-protocol label switching (MPLS). SD-WAN intelligently connects enterprise networks across multiple links via optimal traffic routing. It does this by considering factors such as link availability, load, response time, traffic type and priority. For example, this approach manages and directs network traffic from branch offices destined to external services, whether they are in the cloud or in an EDC. The goal of SD-WAN is to optimize network flow and enhance the user experience over larger geographic distances.

SD-WAN has seen several applications since its inception, but the biggest impact it has had is in the replacement of costly point-to-point or MPLS WAN connections with a Dedicated Internet Access-based (DIA) connection.

6.3.4. GC Backbone and Cloud/Internet Access –SD-WAN

Corresponding technology focus: SD-WAN

SD-WAN encompasses all connections to and within the enterprise. The connections between edge network and the EDCs, cloud services, and Internet services would all be augmented by an SD-WAN implementation. External Network Connectivity describes how EDC will connect to the cloud, Internet and GC-WAN connected partners and services. Efforts are currently underway to re-align the external connectivity with the existing and near-future cloud-based SaaS applications such as Office 365. Activities to migrate from traditional ISP services to Internet Exchange Point (IXP) and Cloud Exchange Point (CXP) services will open opportunities to integrate SD‑WAN with controlled access to external resources.

As SSC looks to SD-WAN, it can derive significant benefits from its deployment:

As SSC starts considering an SD-WAN strategy, the current landscape of SD-WAN providers must be examined. Many providers are still in the early stages of defining their SD-WAN solutions and may not have the capabilities that SSC requires. Some organizations, however, are now also offering fully managed SD-WAN-based solutions that should be considered as part of a broader network operations strategy.

6.3.5. Enterprise Data Centre and Core Network Services (SDDC and SDN)

Corresponding technology focus: SDDC and SDN

SDDC and SDN technologies provide the means for providing inter and intra EDC connectivity services as well as the interconnections between the virtual, physical, storage devices, security appliances, and any other DC platform. In the DC, SDDC refers to the collection of SDI services (for example, compute, network and storage) used as part of the DC topology.

6.3.5.1. Software-Defined Data Centre

SDDC (using underlay and overlay architecture) is the next logical evolution from the traditional three-tier architecture for highly-virtualized DCs where virtual machine (VM) mobility, Zero Trust perimeters, on-demand network services and cloud computing are high priorities. This next-generation architecture provides consistent hop count, latency and bandwidth between all devices on the network. Some of the key requirements for a modern SDDC include:

The SDDC fabric delivers integrated network virtualization for all workloads connected, and the controller can manage not only physical devices but also virtual switches.

The new software design infrastructure model will be moving from a single enterprise model to a service provider model supporting multiple tenants. Because the architecture is evolving to a service provider model, the new DC will also evolve to that same model, and will adopt a lot of its architecture from cloud providers. The physical DC locations will influence the DC design in two main ways—proximity to IXP/CXP, and distance from EDC. In the first, the closer proximity to either an IXP or CXP, will allow for earlier off-loading of SaaS traffic (Office 365 ~60 % of network traffic). For distance from an EDC, greater distance will impose greater latency. This is a simple matter of physics—limited to the “speed of light”.

6.3.5.2. Software-Defined Network (SDN)

In common terms, SDN provides separation of the Control Plane from the Data Plane, with some solutions adding Management Plane as an additional separation. These layers of separations allow changes to the control plane (instructions layer) while no impact on the data plane (i.e. packets continue to move). This approach allows the physical underlay to be treated independently from the “overlay” layers. These overlays at the core network level in the EDC accommodate one or more overlays that can interface with different designs. For example, a typical DC has a collection of physical hardware making up the underlay. On this underlay, a first layer overlay would relate to the management of the physical layer. As an option, SDDC could provide another separate overlay for Network and Security device control within.

As previously outlined, SDN virtualizes and separates the functional services of the network devices into the Control Plane and the Data Plane. In the core network this can offer significant advantages for change/adds/deletes of resources. Interaction with the SDDC can take on more automation reducing the need to manually intervene to expand the SDDC physical resource footprint, thus eliminating complexities of multi-team planning and scheduling for routine activities. Similar interactions with SD-WAN can leverage efficiencies and optimize traffic routes in and out of the EDC.

7. Adoption Roadmap

This document uses strategic pillars to break down the strategy in consumable parts—Connectivity, Identity and Access Control, and Monitoring. Connectivity encompasses the traditional networking devices as the underlying infrastructure (for example, switches, routers, firewalls and load balancers). In this context Connectivity also introduces software-defined “X” to enhance the traditional services such that adaptability and optimization of the infrastructure allows for cascading optimization of the application services. Identity and Access Control integrates contemporary identity and security services toward evolving the more advanced options including passwordless intrinsic authentication, centralized privileged access management (PAM) and identity governance, and Contextual Adaptive Single Sign-on Authentication. Monitoring in this case also encompasses collection, processing and dissemination of the collective of data from Network (performance and availability), Security (users, device context, access, authentication and incidents), and Application Data (use, distribution) to empower the future solutions which will leverage AI and machine learning (ML) to optimize user experience in accessing the information required using automation and orchestration. Additionally, a new provisioning approach must be adopted to meet advances in technology and user expectations for timely service delivery. Expectations are for services to be provided in hours—not weeks or months. Leveraging SDI to enable the provisioning of network and security infrastructure is a key enabler of this approach.

Figure 4 shows the Strategic Pillars and how their evolution along with a new provisioning approach is required for SDI, ZTA and eventually moving toward enhanced application/services innovation, AIOps, and Security, Orchestration, Automation and Response (SOAR).

7.1. Strategic Pillars

Figure 4: Strategic Pillars
Overview of the three strategic pillars; Connectivity, Identity, and Monitoring used in the SSC Network & Security Vision and Strategy documents. Connectivity: network foundations, SDN (LAN|WAN|DCN), automation & orchestration. Identity & Access Management: security, elastic perimeter, zero trust access, identity centric. Continuous Monitoring: converging views from: network, security, operations, applications, and data to provide real-time status on performance, security, and utilization across the enterprise.
Text description – Figure 4: Strategic Pillars

Outlining the foundational services and grouping them into three “pillars” for alignment and reference in upcoming implementation initiatives. Overarching benefits include Application/Service Innovation, Artificial Intelligence Operations (AIOps) and Orchestration & Automation (SOAR).

Pillar 1: Connectivity

  • Network Foundation
  • SDN, LAN|WAN|DCN
  • Underlay/Overlay
  • Automation & Orchestration
  • Consistent Configuration

Pillar 2: Identity & Access Management

  • Security
  • Elastic Perimeter
  • Zero Trust Access
  • Identity Centric

Pillar 3: Continuous Monitoring

  • Network
  • Security
  • Operations
  • Applications

These listed Pillars are built upon a foundation of the physical infrastructure.

This section of the document describes the three key strategic pillars that provide the basis for the Network and Security Strategy. These three capabilities support SSC’s Future Network and Security Vision, and are aligned with SSC 3.0 and the Digital Operations Strategic Plan 2018-2022. The focus of this section is to describe the desired target state for SSC in each of these areas. Although not all of these capabilities will be achievable in the near term, the subsequent roadmap and related activities describe the medium-term path toward achieving the future state set out in this section.

7.2. Pillar 1: Connectivity

7.2.1. Overview

Connectivity as a pillar, builds upon the underlying foundational physical infrastructure to provide software-defined services on the LAN / WAN / data centre network (DCN) aspects of the network. This allows the SD underlay/overlay segregation of the Control Plane from the Data Plane providing isolation of the network management from the packet-forwarding layer. This centralized approach not only allows better consistency of the device configuration via Automation of Orchestration, but also less impeding services causing performance impacts.

Network connectivity within the GC network and security strategy can be categorized into four broad areas:

  1. Edge Network—Office/Building Services—LAN
  2. GC Backbone and cloud/Internet access—WAN
  3. DCN—EDC and core network services
  4. Remote Access

Each area encompasses its own complexity, and each area presents opportunities for improvements in communications within the GC integrating the myriad of network and security services required, such as identity and access management, zero trust, “cloud‑first”, wireless-first, and other competencies. SDI will also make these networks more flexible and more efficient.

7.2.2. Current State

The GC currently manages a complex legacy network, providing the backbone for IT services to approximately 4,000 sites and 5,000 buildings, and connects hundreds of thousands of devices for GC employees, contractors and Canadians.

Intra-building networks

Currently, there is no infrastructure standard. Each department has different physical and logical configurations, operating procedures, service levels and use cases. As a result, there is a need for a “standard service development” effort.

The majority of intra-building infrastructure existing in both single and multi-tenant buildings utilizes traditional hard-wired cabling to end-point devices. Usage of hard-wired infrastructure for end-user devices has been steadily decreasing with the ongoing acceptance and deployment of wireless access (Wi-Fi)-based connectivity.

Intra-building network infrastructure, equipment and cabling have multiple custodians, leading to a complexity of operational models with disparate strategies for technologies, vendors, deployment, maintenance and operations. There are hundreds of individual projects planned or in progress to maintain, refresh or replace these environments with no comprehensive nor integrated strategy.

Inter-Building Networks

Inter-building networks consist of a collection of networking components and services that provide data transportation between buildings and DCs, both domestic and international, and often span external networks (for example, Internet and cloud), including:

Most of the above services have been catalogued and outsourced as long-term contracts to various telecom service providers. Stewardship of the network architecture has been retained by SSC.

EDC Networks

In addition to SSC’s four new EDCs, partner departments have approximately 500 legacy DCs that will be consolidated as part of SSC’s ongoing efforts to consolidate DCs. Over 50 of these DCs are considered large deploymentsFootnote 5.

Most of these DCs were deployed before common infrastructure standards were adopted, therefore there is little commonality in network structures and underlying configurations. There have been past projects targeting DC consolidation that have proved challenging.

In addition to production environments, integrated pre-production or laboratory environments should also be considered as part of this strategy. Currently, testing labs are not integrated with all components, and many are restricted by departmental boundaries. This setup, combined with network segmentation, makes it a difficult task to test and validate future-state deployments, thus resulting in added project risk. There are currently hundreds of applications scheduled for development, and with no standardized pre-production testing facility for software, hardware, and infrastructure, integration consistency is a challenge.

The current challenges across these areas of network connectivity result in several general challenges for the GC:

External Network Connectivity—Traditional

SSC partners are being connected to public cloud services in the following ways:

The only SSC-sanctioned solution that customers can use is OpenVPN solutions where SSC provides a secure, dedicated workstation for the customer to establish connectivity to the public cloud supplier. The connectivity is supported for Unclassified and Protected A data only, and does not include Protected B or higher classification levels. SSC partners also currently leverage MPLS and VPN solutions for connectivity to GC WAN services.

At the time of writing, efforts are underway to expand the GC egress/ingress footprint to cloud services. This will include Office 365 and other cloud SaaS-type services. Direct access without VPN will be enacted to optimize the traffic and reduce the latency, ultimately enhancing user experience.

7.2.3. Future State

In the GC target state, networks are based on open system standards, highly automated, and ultimately offered as a service through a web portal, with changes to network connectivity taking seconds or minutes, as opposed to days or weeks. Intent-based networking, coupled with network analytics, will enable dynamic network optimization to meet changing connectivity and performance requirements.

Additionally, GC as an enterprise will have a common place to build, test, integrate, stage and fix underlays, overlays and applications. Using virtualization and common underlays, building a common component pre-production facility will be an on-demand service. Developers will no longer be isolated by departmental boundaries and network segments, which will enable improved abilities to test and validate (de-risk) future-state deployments.

Intra-Building Network

For intra-building connectively, the GC has adopted a wireless-first strategy for end user and IoT devices. In addition, LAN and WAN architecture will be constantly expanding to incorporate IoT devices. Over time, the adoption of 5G technologies will change connectivity models for end-point devices accessing GC resources. This may have a significant impact on the connectivity usage between a building and GC Network (GCNet) services, lessening the reliance on traditional building connectivity, while increasing dependence on the external resources and gateways. In the medium term, devices will continue to rely on both Wi-Fi and cellular (3G/LTE/4G) connectivity as 5G technology reaches maturity, and pricing is analyzed to determine the value-add potential.

Network security must move instep with the new connectivity model, with the ability to confidently identify devices and users accessing GCNet resources, providing trusted any-platform, any-device connectivity and services (see “Identity and Access Control” section for additional details).

Inter-Building Networks

While inter-building networks will begin to leverage the aforementioned SDI technologies, in the short and medium term, the underlying inter-building transport layer will continue to be primarily an insourced model leveraging the infrastructure investments currently in place. However, over time, as new connectivity models (hosted 5G) become more viable, the dependence on traditional building infrastructure will lessen.

Inter-building backbone services will likely remain the same for the connectivity within the NCR, as this is a cost-effective solution with the majority of GC buildings located in the region.

Stewardship of the technology architecture should remain within SSC. Current contracts will need to be reviewed to ensure services are in line with SSC 3.0 future state.

EDCs

The major transformational change within the DCs from a network perspective will be the move to SDN. SDN will enable the rapid provisioning of new network services and changes. AIOps will also provide the ability to make automated changes based on elements such as threat remediation and performance management.

SD-WAN will also play a role in small- to medium-sized DCs acting as the new transport layer for access to Internet and GC WAN services, offloading or replacing legacy (and costly) MPLS-based solutions.

External Network Connectivity

It is expected that many customers will continue to leverage the option previously described in the Current State section for accessing Unclassified/Protected A data. Protected B data will be accessed leveraging the Secure Cloud Enablement for Defence (SCED) connectivity solution. SSC stated that customers are now able to leverage SCED for Protected-B-level connectivity. To leverage SCED, customers were advised to ensure they meet all security requirements prior to being provided with connectivity.

As SD-WAN solutions evolve, we will see more and more customers leverage SD-WAN solutions to enable access to Internet and cloud SaaS services as a replacement for legacy MPLS-based solutions.

7.2.4. Implications and Dependencies

To successfully enable the target state for connectivity a single organization (i.e. SSC) needs to have the authority to ensure compliance and availability of appropriate funding. The Enterprise Perimeter Security (EPS) project may need to be re-visited to take into account a “virtualized” perimeter that spans outside boundaries of the traditional perimeter. Full ZTA will need to be phased in over time to take into account how the EPS project will be aligned with the ZTA approach.

7.3. Pillar 2: Identity and Access Control

7.3.1. Overview

One of the key tenets of a Zero Trust security posture is the implementation of least-privilege access and fine-grained security controls to strengthen information security inside the GCNet perimeter. Access to resources is granted using a policy-based approach to securing access rather than depending on manually configuring firewall rules, which is cumbersome, static and prone to error. Lateral movement within the perimeter is secured using micro-segmentation. Micro-segmentation minimizes and contains the breach when it inevitably occurs. Instead of using IP addresses and security zones to establish segmentation policies, the policies are based on logical attributes as opposed to physical ones, and provide granular application access control to authorized users.

The intention of access controls is to ensure that an authorized user has access to the right resources, such as databases, applications and/or networks, and that these resources are inaccessible to unauthorized users. Access controls include both physical and logical controls. Physical access controls limit access to network closets, rooms and buildings where physical assets or equipment are located. Logical access controls grant or prevent access to resources (for example, information, networks and applications and systems) once the identity of a user, entity or a device has been verified. Logical or physical access privileges are typically tied to the unique identities of the user/entity/device. As the network technology landscape undergoes significant transformation, this further elevates the importance of logical access controls to protect GC networks and information flows.

7.3.2. Current State

The GC has traditionally applied the castle-and-moat approach to access control, aimed at securing the perimeter by authenticating and granting access to authorized users at secure entry-points. Networks have expanded to include a vast number of end points and adversaries continue to find new ways to circumvent perimeter security. This is further complicated by the growing adoption of mobile technologies that enable a remote workforce and the use of outsourced services. The GC has traditionally mitigated these threats by establishing network zones and deploying an increased number of firewalls to filter network access. However, this approach has become cumbersome and costly as firewall rulesets must be continually adjusted to account for both new threats and new authorized traffic.

Today, Canadians securely access GC online services by signing in with an online banking credential (such as username and password) from Canadian financial institutions through the Credential Broker Service, or they can use the GC-branded credential service, known as GCKey.

GC users authenticate with different user stores including built-in ones, departmental Active Directory and Federated Active Directory, and also with a multitude of different multi-factor authentication services including Internal Credential Management and other departmental solutions. A trusted digital identity system is fundamental to access control and a key enabler to seamless and frictionless security in digital systems.

7.3.3. Trends

The legacy approach to access control was that of a defence-in-depth posture that uses a series of defensive mechanisms layered to protect valuable data and information. If one mechanism fails, another steps up immediately to thwart an attack. This approach is no longer seen as a viable means of preventing and mitigating against current security threats.

Access control trends are primarily shaped by proliferation of connected devices, connection options, increased end-user mobility and heightened expectation of consistent and customized experience, regardless of connection channel, location, or type of device used to initiate the connection. These expectations extend beyond the traditional definition of an end user (typically viewed as a consumer of the service) and include privileged users (for example, service administrators) and non-human users (for example, bots and smart connected devices).

As a result, next-generation network access controls should be able to support and enable the following:

7.3.4. Future State

As security threats have increased in recent years, there has been a paradigm shift in architectural thinking on how to balance protection and availability while supporting the evolution of a new, information-centric security model for GC networks. The future-state network model will account for end-user needs while also ensuring security of their data.

From an access control point of view, the most influential change will be associated with the move from a traditional perimeter security approach to a “virtual perimeter”; an approach relying on the concept of Zero Trust and micro-segmentation applied to GC networks and resources. Zero Trust is based on the premise that we “never trust and always verify”. The associated Zero Trust Network Access (ZTNA) architecture dictates that verification is required for all access to resources, even from traditionally trusted sources. Traditional perimeter security may still serve as the first line of defence, but both device and user will be continually verified, authenticated and authorized to gain access to assets and resources, thus the need for micro-segmentation, a more granular view into network resources. This will have significant implications for the design and operation of access control mechanisms.

7.3.5. Implications and Dependencies

The following implications and dependencies will have to be considered in order for the next generation network to meet end user and digital government usability and security expectations:

7.4. Pillar 3: Monitoring

7.4.1. Special Consideration Regarding Security

Given the Canadian Centre for Cyber Security (CCCS) owns the Security Operations Centre (SOC) and the security information and event management (SIEM) process, many overlaps of interest and responsibility will show in this section. While this document does not attempt to delineate tasks or specific responsibility, it will be essential to evaluate any overlaps and consider operational impacts/changes for the optimization of the process model. Mention of the SIEM solution is only to acknowledge that a SIEM is indeed required, and should not be interpreted as a function of SSC.

According to research by Gartner and Forrester and others, the future state of networks will demonstrate a convergence or alignment of functional areas. This will impose an alignment of operations centres, both the SOC and the Network Operations Centre, such that it has been proposed that a Security and Network Operations Centre (SNOC) model may be the way of the future. As SSC and the GC progress into this new paradigm, intermediary steps will pave the way to the final convergence.

While user and system-related security events will remain under the purview of the SOC (as part of CCCS), security interests relating to the infrastructure components will be integrated into the Continuous Monitoring solution. This will facilitate the automated response capabilities of the SDI.

7.4.2. Overview

Monitoring proactively manages the performance and security of the GC’s IT infrastructure. The scope of monitoring capabilities extends across network devices and traffic, servers and end-user devices, and the applications running on these devices. Effective monitoring enables proactive identification of events related to network devices, and it enables the ability to remediate those events to improve the security, reliability and performance.

7.4.3. Current State

Throughout the GC there is a combination of partner-managed and SSC-managed monitoring tools and data. This results in a lack of clarity, accountability and coverage of monitoring functions. Specific skillsets and solution configurations have been tailored to individual departmental requirements. Monitoring tools are used for basic alerting and reporting. An example would be Microsoft System Center Operations Manager (SCOM).

SSC has a decentralized and non-standard SIEM capability (varying levels of maturity and configurations) that provides partial coverage. This means that SSC does not have full visibility over the GC environment to identify risks and to respond quickly to incidents.

The configuration of these solutions allows for the automation of several simple operational tasks. However, human intervention is required for anything more complex. The lack of automation and orchestration capabilities and event correlation leads to irrelevant and non-actionable information that IT operations teams must review. This causes longer analysis and resolution times, and erodes service delivery. Furthermore, SSC’s current operating model is making the upkeep of the infrastructure resources cost-intensive, time-consuming and prone to human error.

7.4.4. Trends

Increasingly, organizations are implementing technologies that ingest and correlate monitoring/logging sources, aggregate this data, and apply both human and machine logic to detect and execute actions to investigate and resolve incidents/events. These platforms include Security Orchestration, Automation and Response (SOAR), behavioural analytics, and AI. The product market for these solutions continues to evolve and solutions have yet to reach their intended potential (see Appendix A).

Additionally, organizations are taking an “assumed breach” position. In doing so, organizations are incorporating threat hunting into security monitoring capabilities to continuously search for anomalies that could indicate a cyber-event.

7.4.5. Target State

Figure 5: AIOps Multi-Layer Technology
The stack of data and processes that combine to enable AIOps. AIOps can leverge collected data (events & Logs) to triger adaptations to algorythms to taylor outcomes based on machine learning.
Text description – Figure 5: AIOps Multi-layer Technology

Outlining the stack of services that collectively make up the AIOps paradigm:

  • Visualization
  • Machine Learning
  • Algorithms
  • Analytics
  • Calculations
  • Big Data
  • Data Sources: Events & Logs, Monitoring, Incident & Change tickets, a Jobs output

In the target state, SSC will need to move from stand-alone monitoring tools and processes to an integrated set of technologies that are supported by a centralized data repository—here on referred to as SSC Data Lake—and provides improved visibility. SSC will need to implement AI, automation and orchestration to improve the efficiency with which it secures the IT infrastructure. There is an initiative underway in SSC to address AIOps.

SSC, in coordination with partners, will work to reduce the number of monitoring solutions in the future state, taking a 70/30 approach, whereby a single tool achieves 70 % of the monitoring requirements and the remaining 30 % will be multiple-point solutions. 70% of the tools should be domain agnostic “full-stack solutions” for the broadest use cases. The 30 % of these “point solutions”, which are focused on one specific domain (for example, network, security, endpoint systems or application performance monitoring), should be domain centric.

DC consolidation will be key in facilitating the consolidation of monitoring tools and the SSC Data Lake. This will include the establishment of a centralized monitoring solution within EDCs that will form the foundation of a centralized monitoring capability for the GC.

Maturing the SIEM capability will be critical to gaining situational awareness across the GC environments and enabling more rapid and coordinated incident response capabilities. This should include an integrated, next generation SIEM solution, the adoption of advanced use case content to detect events (using a combination of rules-based and user/entity behavioural analytics), and SOAR capabilities to improve threat detection and automate response. It will be critical to adopt a situational awareness capability to anticipate IT asset exposure levels to cyber threats and make risk-based remediation decisions.

To support the aggregation and correlation of data, the SSC Data Lake will be created and used to store and analyze logging data. The more data that is fed into the system, the more intelligent decisions can be made through emerging technologies, such as machine learning, SOAR and AI. To achieve better economies of scale for analytics, SSC should investigate the use of public cloud IaaS and/or PaaS solutions for the SSC Data Lake, whereby a hybrid cloud model is used for connectivity back to the EDCs.

The above technologies and solutions will continue to improve auto-remediation, self-healing infrastructure, event correlation and predictive analytics. The diagram below illustrates a proposed next generation SIEM supported by a centralized SSC Data Lake.

Figure 6: Next Generation SIEM with SSC Data Lake
The collection of security related incident or event data gathered for analysis and consumption. The concept tabled, suggests a shared repository (data lake) that can host this traditional SIEM data along with other structured and unstructured data. All together, this data will comprise the source data for AI and machine learning integration to move towards the ideas of ‘self-healing network’ with the advent of AIOps and (next gen) SOAR. Shared data will also provide current individual tool access as tools/systems evolve.
Text description – Figure 6: Next Generation SIEM with SSC Data Lake

SIEM (Security Incident & Event Management) is projected to undertake a generational evolutionary step in elevating the input and output beyond the traditional scope of security services. Integration with the SSC Data Lake will open opportunities to expand SIEM reach to better serve the consumers which will include AIOps.

7.4.6. Implications and Dependencies

Monitoring infrastructure suites have broad and integrated functionalities, while best-of-breed monitoring tools have deep domain-specific functionalities. The key dependency to achieve the future monitoring strategy will be for all partners to share logging data across the technology stack with SSC (including application performance data), and for this data to be stored within a centralized repository (SSC Data Lake). This integration will provide visibility into the overall GC security posture, enable advanced use cases and accelerate incident response. It will also be critical for SSC to work with partners and CCCS to ensure roles and responsibilities for incident detection, response and remediation are clear.

7.5. Provisioning

7.5.1. Overview

Provisioning refers to the ability of the technology platform and solution to implement the components of the overall solution. In the context of networking and security, provisioning provides the ability to implement components of the network and security, such as adding or changing network configurations or adding/changing firewalls rules. Provisioning should be looked at holistically across networking, compute and security, leveraging capabilities like SDI as enablers to enhanced provisioning capabilities.

7.5.2. Current State

Currently, the GC has a number of vendors providing networking, compute and security services (hardware, software and service providers). This has led to a proliferation of platforms throughout the GC that, in many cases, require unique technology solutions and skills across these platforms to manage and monitor.

Provisioning time is one of the main concerns of Chief Information Officers (CIO). CIOs are dependent on SSC for the delivery of compute, storage and network services to implement new applications that enable GC program delivery. SSC’s provisioning time is, therefore, one of the critical enablers of agile program delivery. The target is to reduce provisioning time for infrastructure services from weeks/months to hours/days. Also, many of the legacy network, compute and security platforms are nearing—or have exceeded— their end of life, and need to be replaced to effectively secure and manage the GC’s technical assets.

The advent of new technology capabilities, such as ZTA and SDN, will require most of the legacy networking and security platforms be either replaced, or at a minimum, upgraded, to enable these new operating paradigms.

7.5.3. Trends

The area of networking, compute and security is going through a fundamental overhaul as organizations move to enabling technologies, such as cloud computing. Cloud is driving the need for the provision of networking, compute and security services to happen immediately to support the dynamic demands of cloud services. Use of AI operations also enables the speed of provisioning by automating many of the operational tasks for IT service delivery.

7.5.4 Future State

Enhanced provisioning capabilities will enable network, compute and security services to be provisioned in minutes (vs days/weeks). The trends that are driving the need to enhance provisioning are:

The future state will see the implementation of enabling technologies, such as SDN/SDI, integrated with on-premises infrastructure, such as hyper-converged infrastructure, software-defined-based network and security platforms. Off-premise cloud will enable rapid provisioning of network, security and compute services.

There are multiple approaches to be considered for the delivery of software-defined capabilities, including the selection of a vendor-based ecosystem solution (for example, Cisco Application Centric Infrastructure, Juniper Contrail, Arista EOS) or an open-source-based solution (for example, OpenDayLight SDN).

In the future state, SSC will be able to dynamically provision network, compute and security solutions through a software-enabled platform improving provisioning times and customer satisfaction with departmental CIOs.

7.5.5. Implications and Dependencies

The strategy for achieving enhanced provisioning capabilities will need to consider the following implications/questions:

7.6. Considerations

7.6.1. Re-skilling and Re-tooling the Organization

Given the accelerated rate of change created by rapid advancement in technology, and future ways of working, the current SSC workforce will need to adapt its operating model, skills and operations to support the future-state network and security platform.

Operating Model

SSC will need to undertake a fundamental change to its operating model as it moves to cloud and new network and security capabilities. This will require changes in the:

The operating model will need to fundamentally change how SSC is oriented for network and security services from day-to-day technical support right up to the leadership team.

Skills

The changes to network and security will require a new set of skills and capabilities within SSC, such as:

Roles and Responsibilities

Changes to the operating model will also require new roles be defined within SSC to support the future-state model. New roles will be required, such as:

The questions facing the future of the SSC workforce are:

To answer these questions, a separate target operating model program will need to be undertaken by SSC:

The results of this program should drive skill and role gap mitigation strategies at the Department- and enterprise-wide levels, and estimate costs to upskill and size the impact to the overall workforce.

7.7. Recommended Next Steps

In the previous sections, future-state pillars were detailed to describe where SSC needs to go to move to SDI and ZTA. This section will describe the recommended necessary next steps to get there in terms of principles, projects and initiatives.

7.8. The Principles

To implement this strategy, core principles needed to be developed owing to the complexity of the SSC network and security infrastructure. It is impossible to procure and implement in one shot a fully-functional SDI and ZTA infrastructure, therefore, the following strategic principles are recommended:

Figure 7: Foundation Steps
Outlining the foundational 6 High level steps to adopt: 1) align future projects, 2) prioritize foundational capabililties, 3) small steps of implementation, 4) identify and resolve skills gap, 5) converge network & security, 6) invest in Automation & Orchestration of existing systems
Text description – Figure 7: Foundation Steps

Overview of the Foundational Steps to integrate Zero Trust and Software Defined Infrastructure into the SSC environment.

  1. Ensure existing projects are not done in silos—align efforts with SSC Network & Security Vision & Strategy documents
  2. Prioritize and sequence capabilities
  3. Establish “bite sized” initiatives over a “Big Bang” approach for implementation
  4. Identify and action the skills gap
  5. Convergence of Network and Security services
  6. Invest in Automation & Orchestration of existing and new technology

Overall goal: minimize the risk

7.9. Communication Plan

A comprehensive communication plan is essential and needs to be executed to share the Network and Security Vision, Strategy and plan moving forward. This needs to be done throughout SSC at both executive levels and at working levels to ensure there is buy-in and understanding throughout the organization. However, this is not just an SSC initiative—for this initiative to succeed, assistance and buy-in will be required from all SSC partners, as this extends to the business services and applications SSC provides to those partners.

7.10. Reference Architectures

Reference Architecture Documents (RAD) must be developed to provide an architecture, methodology, guidelines and principles for the different technologies at a high level and be broken down into different service levels. The RADs will:

  1. Show relations to the SSC Network and Security Vision and Strategy.
  2. Compare, contrast and align SSC requirements against emerging industry technologies.
  3. Provide guidelines and principles for services/products/projects to follow.
  4. Focus on function over technologies.

An overarching Master RAD will be developed first and will be an architecture that interconnects all sub-RADs to ensure that the overall goals are consistent between interrelated functions and technologies.

The sub-RADs will be developed and will link back to the Overarching Master RAD. The sub-RADs initially proposed to be developed include:

  1. SD-LAN
  2. SD-WAN
  3. SDDC
  4. Cloud, Internet and Remote Access Connectivity
  5. EDC/DCN core network
  6. ZTA

7.11. Support Existing Initiatives

Existing projects and initiatives are currently in progress that have been planned and ongoing for some time. Several of these would have been identified even before the concepts of SDI or ZTA were well known. However, many of these projects/initiatives are important pieces of the core infrastructure for moving SSC toward SDI and ZTA.

It is recommended that in-flight and new projects take time to reflect on the SSC Network and Security Vision and Strategy—and The Principles identified earlier—and work with SSC to identify opportunities to align activities even further than was originally scoped in the projects.

The following table identifies a list of the SSC projects and significant sub-initiatives that support the Network and Security Vision and Strategy moving forward, and should continue to be supported with guidance from SSC.

Table 3 – Supporting SSC Projects and Initiatives
Project Description Sub Projects/Initiatives
SIEM Security Information and Event Management
  • Central Logging Service (CLS)
  • Security Orchestration, Automation and Response (SOAR)
  • SIEM (Traditional)
  • User and Entity Behaviour Analytics (UEBA)
  • Infrastructure Visibility, Awareness and Security (IVAS))
EVAS Endpoint Visibility Awareness and Security N/A
EVCM Enterprise Vulnerability and Compliance Management N/A
CMN Centralized Management Network N/A
DCAM Directory Credential Account Management N/A
AACS Administrative Access Controls Service N/A
NDA (now CLM) Network Device Authentication / Crypto Life Cycle Management N/A
ICAS Internal Centralized Authentication Service N/A
GCNAC Government of Canada Network Access Control N/A
ENM Edge Network Modernization N/A
EPS Enterprise Perimeter Security N/A
SRAM Secure Remote Access Management N/A
RHS Regional Hub Strategy N/A
SCED Secure Cloud Enablement for Defence
  • SCED Core
  • Cloud Access Security Broker (CASB)

The following heatmap demonstrates how each of the projects align with Network and Security Vision.

Table 4 – Project Alignment Heatmap
Project SDI ZTA Continuous monitoring
SIEM-CLS n/a Fully value add Fully value add
SIEM-SOAR Fully value add Fully value add Fully value add
SIEM-UEBA n/a Fully value add Fully value add
SIEM-IVAS n/a Fully value add Fully value add
SIEM-Core n/a Fully value add Fully value add
EVAS Fully value add Fully value add Fully value add
EVCM Partial value Partial value Fully value add
CMN Fully value add Fully value add Fully value add
DCAM Fully value add Partial value n/a
AACS Partial value Fully value add Fully value add
NDA Partial value Fully value add Partial value
ICAS Partial value Fully value add n/a
GCNAC Fully value add Partial value Partial value
ENM Fully value add Partial value Partial value
SRAM Fully value add Fully value add Fully value add
RHS Fully value add Partial value Partial value
SCED-CASB Fully value add Partial value Partial value
SCED-Core Fully value add Partial value Partial value

7.12. Required Future Initiatives

The Network and Security Roadmap summary below outlines the progressive steps necessary to migrate from current state to the projected to SDI and ZTA end state. This evolution will require some specific steps and technologies put in place for each of those disciplines along with supplementing/evolving Identity services and Security. The following diagram summarizes the recommended progressive adoption of future required initiatives that will need to be supported to continue to evolve SSC to SDI and ZTA. For the full details, please see the full Roadmap document in Appendix B.

Figure 8: Future Initiatives
A high-level sequence based map of ‘concepts’ oulining the ‘next-steps’ to provide direction through this IT paradigm shift.
Text description – Figure 8: Future Initiatives

The Network and Security Roadmap outlines the progressive capability steps necessary to migrate from current state to the projected end state. This evolution will require some specific steps and technologies put in place for the Network (Connectivity), Security (Monitoring) and Identity disciplines.

The network discipline shows Enterprise Network, Remote Access/Cloud, Central Management, Automation & Orchestration and Zero Trust Access.

The security discipline shows Perimeter Security, Remote Access, Application/Data Security, Cloud Security & DevSecOps.

The identity discipline shows Credential Centralization & MFA, PKI for Apps & Devices, Contextual Adaptive SSO Authentication.

With all of these disciplines linked up to enable the end state of AIOps, SOAR, Password/Adaptive Authentication and AI Hybrid Identity.

8. Conclusion

Throughout this document three persistent themes emerge:

  1. The ongoing acceleration of change.
  2. The need to keep up with these changes while maintaining security and control.
  3. The criticality of gathering and using monitoring/analytics data.

The saying “Change is inevitable” has long been a mantra within IT circles. However the breadth and pace of change continues to challenge. Adoption and integration of cloud services and the acceptance of IoT expansion of technologies’ footprint—not only in the DC, but across the board in personal and business life—changes user expectations on how, when and where access to GC systems is needed.

Establishing and adopting technologies, (including network, security, compute, storage), that can continually evolve is paramount, but equally critical is the modernization of the processes and policies that define the use and function of the technology. Social acceptance must precede the adoption of this substantially new technology paradigm.

Monitoring or “Continuous Monitoring”, as has been outlined throughout this document, proposes to go beyond traditional functional/performance/security monitoring. These will—and must—remain integrated in any solution. However, what has begun as device and functional convergence will continue and predictably include user/device security information and policy engine authorization. This enhanced model will gather much more monitoring data than previously available, allow the various teams to get data relevant to their needs, and further allow integration of AI-driven solutions to leverage the capabilities of the SDI of tomorrow.

9. Acronyms

AI
Artificial intelligence
AIOps
Artificial intelligence in support of system operations activities
BYOC
Bring Your Own Credentials
BYOD
Bring Your Own Device
CI/CD
Continuous Integration/Continuous Development
IoT
Internet of Things
MAN
Metropolitan Area Network
ML
Machine Learning
PAM
Privileged Access Management
SCED
Secure Cloud Enablement for Defence
SDI
Software-Defined Infrastructure
SDN
Software-Defined Network
SIEM
Security Information and Event Management
SOAR
Security Orchestration, Automation and Response
SRA
Secure Remote Access
TCP/IP
Transport Control Protocol / Internet Protocol
Wi-Fi
Trademark referring to the wireless 802.11 family of standards for wireless network access
ZTA
Zero Trust Architecture / Zero Trust Access – architectural framework alternative to traditional “defence in depth”
ZTNA
Zero Trust Networking Access

10. References

  1. Information Technology Security Guidance Number 33 (ITSG-33): IT Security Risk Management: A Lifecycle Approach.
  2. Cloud First Strategy, SSC 3.0 Strategy
  3. Government of Canada (“GC”) Digital Operations Strategic Plan 2018-2022

Appendix A: Network and Security Trends

The following tables describe various trends that are most relevant to SSC’s strategic vision. A number of these trends are mainstream, while others are not quite as mature, but are gaining market traction. A definition, analysis and applicability for SSC are provided for each trend.

Trend #1: Zero Trust Architecture

What is Zero Trust Architecture (ZTA)?

ZTA leverages a software-defined approach to establishing a perimeter, and creates an identity- and context-based logical-access boundary around an application or set of applications. The applications are hidden from discovery and access is restricted via a trust broker to a set of named entities. The broker verifies the identity, context and policy adherence of the specified participants before allowing access. This removes the application assets from public visibility and significantly reduces the surface area for attack.

Although ZTA offerings differ in their technical approaches, they generally provide the same fundamental value proposition:

  • Removing applications and services from direct visibility on the Internet.
  • Enabling granular application access either programmatically or through role-based access, and applying a least privilege approach.
  • Enabling access independent of the user’s physical location. Access policies are based on user, device and application identities.
  • Granting access only to the specific application, not the underlying network infrastructure. This limits the need for excessive access to all ports and protocols or all applications, some of which the user may not be entitled to.
  • Providing end-to-end encryption of network communications.
  • Providing optional inspection of the traffic stream for excessive risks in the form of sensitive data handling and malware.
  • Enabling optional monitoring of the session for indications of unusual activity, duration or bandwidth requirements.

Trend Analysis

The ZTA market is still immature, but it is growing quickly—interest is based primarily on organizations seeking a more flexible alternative to VPNs and those seeking more granular application access control.

Applicability to SSC

  • Updates its existing dated network security framework
  • Aligns with the GC’s “cloud-first” strategy—new perimeters being established
  • Provides a consistent user experience for accessing applications—clientless or via ZTA client regardless of network location
  • Incorporates automation techniques into the security framework

Trend #2: Software-Defined Perimeter

What is Software-Defined Perimeter (SDP)?

ZTA is typically implemented through the use of SDP and micro-segmentation. SDP is a new, very versatile technology providing confidential, secure access to enterprise applications. The technology is implemented in software on end-user devices, gateways, controllers or servers. An SDP may be acquired either as a stand-alone product (operated by the network team) or as a service.

Trend Analysis

SDP is a newer technology, with vendors rapidly adding new features or form factors. New features specifically include management portal interfaces and flexibilities in attestation and policies. Additional form factors include turnkey virtual gateway appliances, virtual network functions (VNF) and software images on public cloud marketplaces.

SDP and software-defined technologies in general will upend the traditional hardware vendor market.

SDP is generally not used to access Software-as-a-Service (SaaS) applications such as Microsoft Office 365, Salesforce or ServiceNow. Thus, SDPs do not overlap with cloud access security brokers (CASB).

Applicability to SSC

  • Updates its existing dated network security framework
  • In line with mandate to offer secure, remote access for end users
  • As networking components age out, this can facilitate network consolidation

Trend #3: Micro-segmentation

What is Micro-segmentation?

Micro-segmentation is a foundational capability that supports ZTA. Historically, customers were paranoid about breaches from external access into their corporate DC perimeters. They assumed that if a breach occurred from a north-south perspective, they had lost the battle. The mindset has now changed, and customers are coming to terms with the fact that breaches can and do occur, and they need to look at ways to minimize the damage. With the advent of automation and more capable software, micro-segmentation has gained a wide audience in its ability to mitigate damage from a breach once the DC perimeter has been compromised.

Micro-segmentation minimizes and contains the breach when it inevitably occurs. Instead of using IP addresses and security zones to establish segmentation policies, policies are based on logical attributes (not physical) and provide granular application access control.

Trend Analysis

Network virtualization has been mainstream for a number of years now, thereby acting as the enabler for micro-segmentation. It is becoming more mainstream and seems to be the best answer to address east-west traffic containment.

More advanced network micro-segmentation solutions monitor and baseline flows, and alert on anomalies. They also continuously assess the relative levels of risk/trust of the network session behavior observed (for example, unusual connectivity patterns, excessive bandwidth, excessive data transfers, and communication to URLs or IP addresses with low levels of trust). If a network session represents too much risk, an alert can be raised or the session can be terminated.

Applicability to SSC

  • Containment of breaches occurring from within the DC (east-west traffic)
  • Fits well into a microservices architecture
  • In line with automation requirements
  • Much easier to implement and manage
  • Enables enforcement of consistent segmentation policies across on-premises and cloud-based workloads
  • Well suited to workloads that host containers meeting compliance requirements

Trend #4: Secure Access Service Edge

What is Secure Access Service Edge (SASE)?

The requirements of digital business and edge computing are turning traditional traffic patterns upside down, fundamentally transforming this model and forcing a convergence of the WAN edge and network security markets into the SASE (pronounced sassy). SASE typically combines products and services to deliver multiple capabilities such as SD-WAN, WOC, SWG, CASB, NGFW and ZTA/SDP.

Trend Analysis

Over the next few months, there will be a number of offerings in this area, but they will be based on purpose-built appliances built for scale-out, cloud-native and cloud-based delivery, and optimized to deliver very low latency services.

Be aware that during this transition there will be a great deal of slideware and marketing content, especially from incumbents that are not well prepared for the cloud-based delivery model from distributed POPs.

The inversion of networking and network security patterns established by this technology will transform the competitive landscape and create opportunities for enterprises to reduce complexity and allow their IT staff to eliminate mundane aspects of the network and network security operations.

SASE will allow for consolidation across CASB, SWG and SDP solutions, providing a seamless way for users to connect to SaaS applications, Internet websites and private applications (whether hosted on-premises or in public cloud IaaS) based on context and policy.

Applicability to SSC

  • Aligned with SSC 3.0—better end user experience
  • Ability to provide more secure and performant international connectivity
  • Better scalability—less reliance on point solutions and long lead times for hardware procurement
  • Consolidation across CASB, SWG and SDP solutions, providing a unified way for GC users to connect to SaaS applications, Internet websites and private applications (whether hosted on-premises or in public cloud IaaS)

Trend #5: Security Operations, Automation and Response

What is Security Operations, Automation and Response (SOAR)?

The term SOAR is another one of those new buzz words floating around. The security vendor community proudly promotes this term when marketing their products. The fact of the matter is that full automation and remediation is not yet available in the industry and won’t be for a few years to come. The vendors tout their capabilities as being fully automated, but the fact of the matter is that they are doing one of two things:

  • Leveraging external scripts as add-ons to their core offerings for remediation; and
  • Integrating with other products to provide a more robust automation solution set.

SOARs are technologies that enable organizations to take inputs from a variety of sources (mostly from SIEM systems) and apply workflows aligned to processes and procedures. Additional capabilities include case and incident management features; the ability to manage threat intelligence, dashboards and reporting; and analytics that can be applied across various functions. SOAR tools significantly enhance security operations activities like threat detection and response by providing machine-powered assistance to human analysts to improve the efficiency and consistency of people and processes.

The following are aspects of SOAR—in the context of security operations:

  • Aggregation: The ability to aggregate/ingest data across multiple sources.
  • Enrichment: Whether after incident identification or during data collection and processing, SOAR solutions can help integrate external threat intelligence, perform internal contextual look-ups or run processes to gather further data according to defined actions.
  • Orchestration: The complexity of combining resources involves coordination of workflows with manual and automated steps, involving many components and affecting information systems and often humans as well.
  • Automation: This concept involves the capability of software and systems to execute functions on their own, typically to affect other information systems and applications.
  • Response: Manual or automated response provides canned resolution to programmatically defined activities.

Trend Analysis

The SOAR market is still an emerging one. There have been numerous acquisitions over the last few years and this is expected to continue as vendors try to enhance their existing platforms capability or replace it altogether. Customers should be aware of this trend and plan for contingency should their current SOAR platform be acquired by another company.

A number of organizations implement SOAR tools with use cases primarily focused on making their SOC analysts more efficient, such that they can process more incidents while having more time to apply human analysis and drive response actions much quicker.

Applicability to SSC

  • Aligned with SSC movement to more automation and orchestration
  • SOC optimization
  • Augment staff shortages and skill gaps
  • Threat monitoring and response
  • Threat investigation and response
  • Threat intelligence management

Trend #6: Artificial Intelligence Operations

What is Artificial Intelligence Operations (AIOps)?

AIOps platforms provide the ability to augment—and in some cases replace—traditional IT operations platforms primarily in the areas of event correlation and analysis. They leverage big data and machine learning functionality to analyze large data sets in response to digital transformation.

Some of the core capabilities of AIOps platforms include:

  • Ingesting data from multiple sources including infrastructure, networks, applications, cloud or existing monitoring tools (for cross-domain analysis);
  • Enabling data analytics using machine learning at two points:
    • Real-time analysis at the point of ingestion (streaming analytics);
    • Historical analysis of stored data;
  • Storing and providing access to the data;
  • Suggesting prescriptive responses to analysis; and
  • Initiating an action or a next step based on the prescription (result of analysis).

Trend Analysis

The trend for AIOps platforms is one toward a manager of managers (MoM) approach, whereby other ITOps platforms send their data to the AIOps platform for aggregate analysis and reporting, leading to more simplified and efficient operational management. Ideally, organizations are looking for a domain-agnostic approach to AIOps that can cover most of their requirements. However, there are no platforms currently available to meet all customer needs, and a domain-centric-solutions approach is taken to fill the gap.

Since these platforms leverage AI technologies, they rely on very large data sets to show their effectiveness, and are not intended to be deployed in an “island” or “siloed” manner. In other words, the more data the platform has access to, the better it provides value. With the advent of big data, AIOps will show better value over time.

Applicability to SSC

  • More simplified and centralized reporting service
  • Better visibility into partner infrastructures—better Service-Level Agreements (SLA)
  • Good use case for centralized data lake—data from partner departments can feed into the solution to provide better value

Trend #7: Network Managed Services (SD-WAN)

What is SD-WAN?

SD-WAN is a software-defined approach to managing WANs. Key advantages include:

  • Providing agnostic transport across multiple protocols such as MPLS, 3G/4G LTE.
  • Improving business application performance and increases agility and cost reduction.
  • Optimizing the user experience and efficiency for SaaS and public cloud applications.
  • Simplifying operations with automation and cloud-based management.

Managed SD-WAN providers operationally manage customer SD-WAN products, which are physical appliances or software instances that are either enterprise-owned or included with the service. Managed SD-WAN products typically reside on the customer premises, are governed by an SLA and are priced on a recurring monthly basis. Providers offer managed SD-WAN services independently of, or in conjunction with, WAN transport. To be considered a managed SD-WAN services provider, the provider must offer an SPOC for all management inclusive of WAN transport, SD-WAN customer premises equipment and required software functions.

Trend Analysis

SD-WAN solutions are now mainstream and the options available to enterprises for managed SD-WAN services are expanding in parallel to the growth of SD-WAN technology. Hybrid WAN design options will continue to expand, and will continue to be affected by managed SD-WAN service).

SD-WAN’s security capabilities will continue expanding beyond basic firewall as more providers are including unified threat management (UTM) such as SWG and IDS/IPS. Additionally, WAN optimization and acceleration capabilities will grow as more providers incorporate engineered network features to improve quality of service (QoS) and throughput.

Applicability to SSC

  • Good cost alternative to consider when existing MPLS contracts are up for renewal
  • Potential for outsourcing as a managed service
  • Path diversity for availability and cost reduction
  • Aligns well with SSC’s move to SDI
  • Good alternative for non-latency sensitive applications
  • Considered for new site builds at remote locations

Trend #8: Internet of Things

What is the Internet of Things (IoT)?

IoT is defined as:

“A network of physical objects (things) that contain embedded technology to sense or interact with their internal state or external environment, and can send and receive data to or from a remote digital platform.”

Trend Analysis

Five high impact IoT trends:

  • AI: AI will be applied to a wide range of IoT information, including video, still images, speech, network traffic activity and sensor data.
  • Social/legal/ethical IoT: As IoT matures, ownership issues and bias in interpretation of that data will be a concern.
  • Data brokering: IoT system data can be sold or used to others than the device or owner that created it.
  • IoT mesh: Edge architecture layers will dissolve to create a more unstructured architecture consisting of a wide range of “things” and services connected in a dynamic, flexible mesh.
  • IoT governance: Governance encompasses the operational management of IoT devices and the information and services that IoT systems deliver.

Applicability to SSC

  • Real property utility and security monitoring
  • Performance monitoring for GC smart devices
  • Cost savings
  • Security
  • Canadian Food Inspection Agency’s remote inspection
  • Border-crossing inspection equipment
  • National video surveillance systems

Trend #9: Private 5G

What is Private 5G?

A private 5G network, also known as a local or non-public 5G network, is a LAN that provides dedicated bandwidth using 5G technology. 5G is the next revision of 4G/LTE wireless data networks. 5G introduces a higher bandwidth using a different radio spectrum that will also enable more devices to connect simultaneously. It is currently being rolled-out by all major service providers in Canada. A private 5G (local) network is a LAN that provides dedicated bandwidth using 5G technology.

Both private and public 5G deployments are enabling the IoT. It is envisioned that service providers will offer overlays on the public 5G network, enabling the creation of VPNs routed back to private networks. This is an alternative to deploying private 5G equipment and provides the opportunity to outsource this connectivity model instead of a built-in-Canada solution.

Trend Analysis

With Release 16, 5G has the potential to become the world’s predominant LAN and WAN technology over the next 10 to 20 years, especially in greenfield builds. New buildings, factories, ports or campuses may significantly reduce their usage of wired connections by implementing private 5G. The next five years will likely see a boom in private 5G implementations at locations that would greatly benefit from better wireless technology in terms of speed, capacity, latency.

In the short term, 5G will deliver higher bandwidth and lower latency connections, in many cases, in the form of fixed wireless access networks and early IoT networks.

Applicability to SSC

  • IoT communications
  • New site builds in remote locations, i.e. International
  • High-definition video
  • GC building upgrades

Trend #10: Multi-Cloud Networking

What is Multi-Cloud Networking?

As more customers opt for a multi-cloud approach to providing IT services, they are looking for a more seamless way to manage and operate them. Multi-Cloud Networking refers to the network infrastructure to support the use of cloud services from multiple public cloud providers, including connectivity to, between and within providers.

Multi-Cloud Networking solutions are software-based and provide consistent network policy across multiple cloud providers. They include overlays, management of cloud provider APIs or other mechanisms. Multi-Cloud Networking is similar to an ethernet fabric where multiple components are managed as a single construct and policy is created centrally.

Trend Analysis

Although multi-cloud compute has become more mainstream, Multi-Cloud Networking is in its early stages of adoption. A number of organizations can implement multi-cloud computing without Multi-Cloud Networking, and most are doing that.

However, in the interim, organizations looking to implement Multi-Cloud Networking solutions should use multi-cloud network virtualization solutions (NFV) such as with Cisco ACI and VMware (NSX) to fill gaps or address mission-critical business functionality when cloud-native capabilities do not provide the capability.

Applicability to SSC

  • Seamless connectivity and central management interface across multiple providers
  • Centralized reporting capabilities
  • Reduces vendor lock-in
  • The ability to move storage resources among providers as prices change

Trend #11: Networking on Demand

What are Network on Demand (NoD) Services?

NoD services are WAN transport services provided from network service providers (NSP) and managed service providers (MSP). They are typically offered through a portal or a provider’s API. Capacity and configuration changes can be made on-the-fly in real time and are not fixed. Changes can be made by the customer on demand and do not require a lengthy order process to fulfill.

These services are often based on software-defined technology and allow real-time changes to port allocations and bandwidth allocations. Customers can even add and delete network endpoints such as connection to cloud and extranet connections.

Trend Analysis

In support of cloud connectivity and IoT, there is a new generation of network on-demand services that provide greater agility and flexibility. Currently, the primary use case of these new offerings are for connectivity to new endpoints such as cloud services. They can also support a migration of network traffic from MPLS to Internet services.

Organizations that seek these services are primarily looking for cost optimization and agility. Network on demand solutions will start to show higher adoption rates especially related to dynamic bandwidth services as they continue to evolve and add greater value to enterprises in terms of speed and flexibility.

Voice and data services should be a key consideration when evaluating NoD services.

Applicability to SSC

  • Simplified network migration and consolidation
  • On-demand provisioning of edge site and cloud connectivity
  • Better user experience for voice and data services
  • Cost optimization
  • Better capacity planning

Appendix B: Network and Security Roadmap

A more detailed sequence based map of the capabilities outlining the next-steps to provide direction through this IT paradigm shift.
Text description – Long description – Network and Security Roadmap

The Overall Network and Security Roadmap outlines the progressive capability steps necessary to migrate from the current state to the projected end state. This evolution will require some specific steps and technologies to be put in place for the Network, Security and Identity disciplines.

The network discipline shows:

  • Funded in-progress capabilities like for Enterprise Network, Building Edge Network, Central Management
  • Unfunded next-step capabilities like for Transport and Local Software-Defined Networks
  • Gapped next-step capabilities like for Automation and Orchestration, Zero Trust Network Access

The security discipline shows:

  • Funded in progress capabilities like for VA Scans, Perimeter Security, Remote Access
  • Unfunded next-step capabilities like for Endpoint Security, Central Logging, Continuous Monitoring, Cyber Analytics
  • Gapped next-step capabilities like for Development, Security and Operations (DevSecOps), Contexual Access Control

The identity discipline shows:

  • Funded in progress capabilities like for Certificate Authentication, Federation, Privileged Access Management
  • Unfunded next-step capabilities like for PKI Modernization, Common Identity Data, Application MFA, Centralized Identity
  • Gapped next-step capabilities like for Enterprise MFA, Access Certification, Identity Services API

With all of these disciplines linked up to enable the end state of AIOps, SOAR, Password/Adaptive Authentication and AI Hybrid Identity.

Appendix C: In-Flight Projects

*See Section 3 for the Business Drivers table

SCED—Secure Cloud Enablement and Defence

Provides secure cloud connectivity for Protected B workloads. Must be considered as part of any external network connectivity requirements as described in Connectivity section. SSC is still determining whether trusted interconnection point (TIP) / cloud access points (CAP) components of SCED will reside on-premise or in the cloud, which will have an impact on monitoring solution.

Outcome:

Dependencies:

Pillar: Connectivity

Timeline: Year 1

EVAS—Endpoint Visibility, Awareness and Security

Enterprise approach to endpoint security improving visibility and awareness of all endpoint devices on GC/SSC networks to provide cyber situational awareness across the GC/SSC enterprise. Automated asset discovery and assessment to support Operating System and application patch and currency management and hardening requirements.

Outcome:

Dependencies:

Pillar: Access Control

Timeline: Year 1

EVCM—Enterprise Vulnerability and Compliance Management

Enterprise vulnerability and compliance services and capability providing a unified approach and technology solution for vulnerability management.

Outcome:

Dependencies:

Pillar: Access Control

Timeline: Year 1

NDA—Network Device Authentication

NDA is part of SSC’s Infrastructure Security Enterprise Program to implement an enterprise network device authentication service which includes certificate-based network authentication.

Centralizes life cycle management of non-person entity (NPE) certificates and provides reporting on authentication, authorization, and auditing (AAA) transactions for security auditing, compliance and service improvement.

Outcome:

Dependencies:

Pillar: Access Control

Timeline: Year 2

SRAM—Secure Remote Access Migration

Fully integrate and rationalize existing secure remote access (SRA) infrastructure and consolidate process of SRA connections at EDCs. Transform SRA services to an enterprise data service from a departmental-based service.

Outcome:

Dependencies:

Pillar: Access Control

Timeline: Year 2

ENM—EDGE Network Modernization

The ENM Pathfinder Project will define a repeatable network service that can be used to deploy enterprise network structure and services throughout the GC. The standard physical infrastructure should be of the highest quality and latest technology to support any GC department or user and enable true mobility. The ENM Pathfinder Project will lay the groundwork to enable all GC workers to have access to the 3,500 plus GC locations as potential worksites. It will provide the foundational components for network virtualization and automation.

Outcome:

Dependencies: See ENM Business Case for full list of dependencies

Pillar: Connectivity

Timeline: Year 3-5

CMN—Central Management Network

Improve support resource experience by providing a single window to securely manage all partner infrastructure/ services located in DCs (EDCs and legacy), improving service availability and reliability.

Outcome:

Dependencies: How will connectivity occur?

Pillar: Provisioning

Timeline: Year 3-5

EPS—Enterprise Perimeter Security

ZTA is a key architectural approach for the future network and security strategy and assumes that the network perimeter has moved to a “virtual” perimeter. SSC will need to ensure that the design and architecture of the EPS project is aligned to the key tenets of a ZTA.

Outcome:

Dependencies: CMN, EPS, IPAM, DNS and SCED projects

Pillar: Access Control

Timeline: Year 1 (Current)

SIEM—Security Information and Event Management

Fully integrated GC enterprise SIEM solution providing visibility and automated response to cyberattacks. Enables accelerated threat detection and security incident response.

Outcome:

Dependencies:

Pillar: Access Control

Timeline: Year 1

ICAS—Internal Centralized Authentication Service

ICAS provides a centralized authentication capability that will offload end-user authentication from individual GC enterprise applications, providing a whole-of-government authentication solution.

The move to ZTA will drive increased capacity requirements for all components of ICAS as the process of end user/entity/device centralized authentication and authorization becomes continuous and multi-modal. This program will need to be aligned with the ZTA.

Outcome:

Dependencies:

Pillar: Access Control

Timeline: Year 1

GC Digital Workspace Profiles

A standard set of employee experience profiles for standard digital workspace and related employee-centric IT services to be mapped and delivered against, which are function-based.

There are two activities that are coalescing around defining the Digital Workspace:

Outcome:

Dependencies: N/A

Pillar: Access Control

Timeline: Year TBD

Report a problem or mistake on this page
Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, contact us.

Date modified: