Search Records

162 datasets found
  • Open Information

    Securing access controls in a volunteer-based organization (ITSM.30.010)

    This document outlines common risks faced by volunteer-based organizations and recommends how to address these risks by adapting how people, processes, information, and technologies are managed. This document is intended for cyber security program owners, managers, and cyber security practitioners.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Digital footprint (ITSAP.00.133)

    Your organization uses the Internet to carry out business activities, provide employees with remote work capabilities, and offer services to clients. As your employees and partners carry out activities on different online platforms and applications, consider the digital footprint they leave...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Implementation guidance: email domain protection (ITSP.40.065 v1.1)

    This document provides guidance to system owners on implementing technical security measures to protect their domains from email spoofing. In this document, we describe technical measures that system owners can implement to prevent the delivery of certain malicious messages that are abusing the...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Security considerations for industrial control systems (ITSAP.00.050)

    An industrial control system (ICS) automates and controls industrial processes (e.g. manufacturing, product handling, production, and distribution) and mechanical functions to keep processes and machinery running smoothly. An ICS may support critical infrastructure (e.g. energy and utilities,...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Developing your incident response plan (ITSAP.40.003)

    Your incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from incidents. Cyber threats, natural disasters, and unplanned outages are examples of incidents that will impact your network, systems, and...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Using encryption to keep your sensitive data secure - ITSAP.40.016

    Encryption technologies are used to secure many applications and websites that you use daily. For example, online banking or shopping, email applications, and secure instant messaging use encryption. Encryption technologies secure information while it is in transit (e.g. connecting to a website)...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Communications Security Establishment Accessibility Plan 2022–2025

    This plan supports our goal of building a skilled and diverse workforce reflective of Canadian society. It showcases the work that has already started at CSE towards identifying and removing barriers for persons with disabilities and acknowledges that we have much more work to do.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Annual Report to Parliament on the Administration of the Access to Informatio...

    This is the ninth annual report prepared by the Communications Security Establishment (CSE) and tabled in Parliament in accordance with section 94 of the Access to Information Act and section 20 of the Service Fees Act. It presents an overview of the agency’s activities and describes how the...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Internet of Things (IoT) Security - ITSAP.00.012

    The Internet of Things (IoT) refers to the network of everyday web-enabled objects that can connect and exchange information. These “smart” objects include more than your computer, smartphone, or tablet. They include items like personal fitness trackers, TVs, thermostats, or cars. This list of...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
You can also access this registry using the API (see API Docs).