<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><id>https://cyber.gc.ca/api/cccs/atom/v1/get?feed=guidance&amp;lang=en</id><link rel="self" href="https://cyber.gc.ca/api/cccs/atom/v1/get?feed=guidance&amp;lang=en"/><title>Guidance, news and events</title><updated>2026-04-02T12:28:45Z</updated><entry><id>https://cyber.gc.ca/en/guidance/cyber-security-privacy-risk-management/suggested-organizational-security-privacy-control-activity-profile-medium-impact-itsp10033-01</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-security-privacy-risk-management/suggested-organizational-security-privacy-control-activity-profile-medium-impact-itsp10033-01"/><title><![CDATA[Suggested organizational security and privacy control and activity profile — Medium impact (ITSP.10.033-01)]]></title><updated>2026-04-02T12:28:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7502" about="/en/guidance/cyber-security-privacy-risk-management/suggested-organizational-security-privacy-control-activity-profile-medium-impact-itsp10033-01" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>April 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Practitioner series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSP.10.033-01</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>April 2026 | Practitioner series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsp.10.033-01-e.pdf">Cyber security and privacy risk management: A lifecycle approach - Suggested organizational security and privacy control and activity profile — Medium impact (ITSP.10.033-01) (PDF, 2.3 MB)</a></p>
</div>

<h2 class="text-info" id="n1">Foreword</h2>

<p>Suggested organizational security and privacy control and activity profile — Medium impact (ITSP.10.033-01) is an UNCLASSIFIED publication issued under the authority of the Head, Canadian Centre for Cyber Security (Cyber Centre). This publication supersedes Annex 4A – Profile 1 (PROTECTED B / Medium Integrity / Medium Availability). For more information or to suggest amendments, email or phone our Contact Centre: <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>, <a href="tel:+16139497048">(613) 949-7048</a> or <a href="tel:+18332923788">1-833-CYBER-88</a>.</p>

<h2 class="text-info">Effective date</h2>

<p>This publication takes effect on April 2, 2026.</p>

<h2 class="text-info">Revision history</h2>

<ol><li><strong>First release:</strong> April 2, 2026</li>
</ol><section><h2 class="text-info">Overview</h2>

<p>This publication is part of a series of guidelines published by the Canadian Centre for Cyber Security (the Cyber Centre) under Cyber security and privacy risk management: A lifecycle approach.</p>

<p>It suggests a selection of security and privacy controls, activities, and enhancements, together referred to as a “security and privacy control and activity profile.” Organizational security and privacy authorities can use this profile as a reference to create organization-specific profiles suitable for protecting the confidentiality, integrity and availability of medium-value organizational assets against non-state actors. This profile has been developed using the <a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033">Security and privacy controls and assurance activities catalogue (ITSP.10.033)</a>.</p>

<p>The suggested controls and activities in this profile constitute a starting point and need to be tailored to the business, technical, and threat and risk context of each department’s business activities and supporting information systems. The controls and activities were selected based on industry and governmental security and privacy best practices. They also consider certain threat assumptions, derived from Cyber Centre’s analysis of the threat environment faced by information systems in the documented business context. This profile does not address sophisticated state actors’ capabilities, but the assumptions are described in more detail in <a href="#2.3">Section 2.3 Threat context</a>.</p>

<p>This profile is a tool to assist security and privacy practitioners in their efforts to protect information systems in compliance with applicable Government of Canada (GC) legislation and Treasury Board of Canada Secretariat (TBS) policies, directives and standards.</p>

<p>When developing their organizational security and privacy control and activity profiles, organizational security and privacy authorities are responsible for ensuring compliance with all security and privacy requirements of <abbr title="Government of Canada">GC</abbr> regulations and <abbr title="Treasury Board Secretariat">TBS</abbr> policy instruments applicable to their business activities, as well with as any other contractual obligations.</p>
</section><section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#1">1 Introduction</a>

	<ul class="lst-none"><li><a href="#1.1">1.1 Purpose</a></li>
		<li><a href="#1.2">1.2 Scope and applicability</a></li>
		<li><a href="#1.3">1.3 Audience</a></li>
		<li><a href="#1.4">1.4 Publication taxonomy</a></li>
	</ul></li>
	<li><a href="#2">2 Context and assumptions</a>
	<ul class="lst-none"><li><a href="#2.1">2.1 Business context</a></li>
		<li><a href="#2.2">2.2 Technical context</a></li>
		<li><a href="#2.3">2.3 Threat context</a></li>
		<li><a href="#2.4">2.4 Relationship of security and privacy controls and activities to confidentiality, integrity and availability objectives</a></li>
	</ul></li>
	<li><a href="#3">3 Implementation guidance</a>
	<ul class="lst-none"><li><a href="#3.1">3.1 Security assurance</a></li>
		<li><a href="#3.2">3.2 Format</a></li>
	</ul></li>
	<li><a href="#4">4 Suggested controls, activities, and enhancements</a></li>
	<li><a href="#5">5 Footnotes</a></li>
</ul><h3>List of tables</h3>

<ul class="list-unstyled"><li><a href="#tab1">Table 1: Characterization of applicable business contexts</a></li>
	<li><a href="#tab2">Table 2: Applicable deliberate threat categories</a></li>
	<li><a href="#tab3">Table 3: Applicable accidental threat categories</a></li>
	<li><a href="#tab4.1">Table 4.1: Access control</a></li>
	<li><a href="#tab4.2">Table 4.2: Awareness and training</a></li>
	<li><a href="#tab4.3">Table 4.3: Audit and accountability</a></li>
	<li><a href="#tab4.4">Table 4.4: Assessment, authorization, and monitoring</a></li>
	<li><a href="#tab4.5">Table 4.5: Configuration management</a></li>
	<li><a href="#tab4.6">Table 4.6: Contingency planning</a></li>
	<li><a href="#tab4.7">Table 4.7: Identification and authentication</a></li>
	<li><a href="#tab4.8">Table 4.8: Incident response</a></li>
	<li><a href="#tab4.9">Table 4.9: Maintenance</a></li>
	<li><a href="#tab4.10">Table 4.10: Media protection</a></li>
	<li><a href="#tab4.11">Table 4.11: Physical and environmental protection</a></li>
	<li><a href="#tab4.12">Table 4.12: Planning</a></li>
	<li><a href="#tab4.13">Table 4.13: Program management</a></li>
	<li><a href="#tab4.14">Table 4.14: Personnel security</a></li>
	<li><a href="#tab4.15">Table 4.15: Personal information handling and transparency</a></li>
	<li><a href="#tab4.16">Table 4.16: Risk assessment</a></li>
	<li><a href="#tab4.17">Table 4.17: System and services acquisition</a></li>
	<li><a href="#tab4.18">Table 4.18: System and communications protection</a></li>
	<li><a href="#tab4.19">Table 4.19: System and information integrity</a></li>
	<li><a href="#tab4.20">Table 4.20: Supply chain risk management</a></li>
</ul></details></section><section><h2 class="text-info" id="1">1 Introduction</h2>

<p>A <strong>security control</strong>, also known as a safeguard, is a legal, administrative, operational or technical element of a system that protects the confidentiality, integrity or availability of a business activity or asset and the information it relies on to satisfy security requirements and mitigate cyber security risk. A <strong>privacy control</strong> is a legal, administrative, operational or technical element of a system implemented at the organizational or system level to mitigate privacy risks and ensure compliance with applicable privacy requirements.</p>

<p>An <strong>assurance activity</strong><sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> is a collection of tasks that increases the confidence that a security or privacy control is appropriately designed and implemented and is operating as intended. Assurance activities include tasks that aim to ensure that all security and privacy controls in a system’s design, implementation and operations are able to satisfy the business needs for security.</p>

<p>Security and privacy activities and controls are selected to satisfy security and privacy requirements levied on a system or organization. Security and privacy requirements are derived from applicable laws, Orders in Council, directives, regulations, policies, standards, and business needs to ensure the confidentiality, integrity and availability of information handled, stored or transmitted and to manage risks to individual privacy.</p>

<h3 id="1.1">1.1 Purpose</h3>

<p>This publication is part of a series of documents published by the Cyber Centre under Cyber security and privacy risk management: A lifecycle approach.</p>

<p>This publication suggests a selection of security and privacy controls, activities and enhancements, together referred to as a “security and privacy control and activity profile.” Organizational security and privacy authorities can use this profile as a reference to create organization-specific profiles suitable for protecting the confidentiality, integrity and availability of medium-value organizational assets against non-state threat actors. This profile has been developed using the <a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033">Security and privacy controls and assurance activities catalogue (ITSP.10.033)</a>.</p>

<p>Organizational profiles help ensure that the security and privacy functions of organizational security and privacy programs can:</p>

<ul><li>perform appropriate cyber security and privacy risk management activities</li>
	<li>provide adequate direction to projects</li>
</ul><p>It is important to note that a profile is only a baseline. It needs to be tailored according to an organization’s business needs for security and privacy based on the confidentiality, integrity and availability objectives of the organization.</p>

<h3 id="1.2">1.2 Scope and applicability</h3>

<p>The medium confidentiality, integrity and availability (medium impact) profile is primarily intended for use by <abbr title="Government of Canada">GC</abbr> departments<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup> and agencies. Organizations from industry or academia seeking to protect at a medium confidentiality, integrity and availability level can use the medium profile and tailor the controls and activities according to their specific context.</p>

<p>The suggested security and privacy controls and activities in this profile constitute a starting point and need to be tailored to the business, technical, and threat and risk context of each organization’s business activities and supporting systems (as described in <a href="#2">Section 2</a>). The security and privacy controls and activities were selected based on industry and governmental security best practices, and under certain threat assumptions derived from the Cyber Centre’s analysis of the threat environment faced by information systems in the documented business context.</p>

<p>This profile does not provide details about implementing or utilizing these security and privacy controls and activities in an organization or its information systems. The Cyber Centre publications Organizational cyber security and privacy risk management activities (ITSP.10.036) and System lifecycle cyber security and privacy risk management activities (ITSP.10.037) provide more detailed guidance on these topics. They outline the recommended processes to adequately select, tailor and implement controls and assurance activities at the organization and system level, respectively.</p>

<p>Refer to the <a href="http://www.cyber.gc.ca/">Cyber Centre’s website</a> for additional cyber security guidance publications.</p>

<h3 id="1.3">1.3 Audience</h3>

<p>This publication is intended to serve a diverse audience, including:</p>

<ul><li>individuals with system development responsibilities, including:
	<ul><li>mission or business owners</li>
		<li>program managers</li>
		<li>system engineers</li>
		<li>system security engineers</li>
		<li>privacy practitioners</li>
		<li>hardware and software developers</li>
		<li>system integrators</li>
		<li>acquisition or procurement officials or executives</li>
	</ul></li>
	<li>individuals with logistical or disposition-related responsibilities, including:
	<ul><li>program managers</li>
		<li>procurement officials or executives</li>
		<li>system integrators</li>
		<li>property managers</li>
	</ul></li>
	<li>individuals with security and privacy implementation and operations responsibilities, including:
	<ul><li>mission or business owners</li>
		<li>system owners</li>
		<li>information custodians</li>
		<li>system administrators</li>
		<li>continuity planners</li>
		<li>system security or privacy officers</li>
	</ul></li>
	<li>individuals with security and privacy assessment and monitoring responsibilities, including:
	<ul><li>auditors</li>
		<li>system evaluators</li>
		<li>control assessors</li>
		<li>independent verifiers and validators</li>
		<li>analysts</li>
	</ul></li>
	<li>commercial entities, including industry partners, that produce component products and systems, create security and privacy technologies, or provide services or capabilities that support cyber security or privacy</li>
</ul><p>In the <abbr title="Government of Canada">GC</abbr>, this publication is intended for the audience above, as well as for individuals who support departmental cyber security and privacy risk management activities, such as:</p>

<ul><li>individuals with system, information security, privacy, or risk management and oversight responsibilities, including:
	<ul><li>authorizing officials</li>
		<li>chief information officers</li>
		<li>chief security officers</li>
		<li>senior officials in the department’s security governance</li>
		<li>designated officials for cyber security</li>
		<li>appropriate privacy officials or executives</li>
	</ul></li>
	<li>individuals who participate in the definition, design, development, installation and operation of information systems, specifically:
	<ul><li>authorizers</li>
		<li>project managers</li>
		<li>cyber security architects</li>
		<li>cyber security engineers</li>
		<li>cyber security assessors</li>
		<li>members of cyber security operations groups</li>
	</ul></li>
</ul><h3 id="1.4">1.4 Publication taxonomy</h3>

<p>This publication is part of a series of guidelines that fall under Cyber security and privacy risk management: A lifecycle approach. The documents in the series are as follows:</p>

<ul><li>Overview, Cyber security and privacy risk management: A lifecycle approach (ITSP.10.035)</li>
	<li>Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li>System lifecycle cyber security and privacy risk management activities (ITSP.10.037)</li>
	<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033">Security and privacy controls and assurance activities catalogue (ITSP.10.033)</a></li>
	<li>Suggested organizational security and privacy control and activity profile—Medium impact (ITSP.10.033-01)</li>
	<li>Assessment of security and privacy controls and assurance activities (ITSP.10.033-02)</li>
</ul></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="2">2 Context and assumptions</h2>

<p>This section characterizes the business, technical, and threat and risk contexts for which this security and privacy control and activity profile is suitable. When selecting this profile as a starting point, organizational security and privacy authorities (supported by security and privacy practitioners) will need to tailor it to create organization-specific security and privacy control and activity profiles that will be appropriate for their organization and business activities.</p>

<h3 id="2.1">2.1 Business context</h3>

<p>This profile is suitable for organizations using information systems to support a wide range of business activities of medium sensitivity and criticality involving medium-injury information.</p>

<p>In the <abbr title="Government of Canada">GC</abbr>, examples of such business activities include but are not limited to:</p>

<ul><li>the delivery of social services</li>
	<li>taxation</li>
	<li>Receiver General functions</li>
	<li>departmental finance and administration</li>
	<li>human resources</li>
	<li>public service pay and benefits</li>
	<li>providing common and shared services to a broad client base</li>
</ul><p>In industry, examples of such business activities include but are not limited to:</p>

<ul><li>human resources</li>
	<li>finance management</li>
	<li>procurement</li>
	<li>most health records processing</li>
	<li>tax records</li>
</ul><p>Organizations that are candidates for using this profile will perform business activities with a maximum security category of medium confidentiality, integrity and availability, as defined in Organizational cyber security and privacy risk management activities (ITSP.10.036). A compromise of the confidentiality of the information and of the integrity and availability of supporting assets<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup> is reasonably expected to cause a medium level of injury to non-national interests.</p>

<p>The intended maximum robustness level (RL) for controls and enhancements is RL3, and the intended maximum security assurance level (SAL) is SAL3, as defined in System lifecycle cyber security and privacy risk management activities (ITSP.10.037).</p>

<p>Below, Table 1 characterizes in greater detail suitable business contexts using confidentiality, integrity and availability objectives. It also includes examples of consequences of compromise, business processes and related information.</p>

<h4>2.1.1 Compliance with Government of Canada legislation and Treasury Board of Canada Secretariat policy instruments</h4>

<p>This profile has been created as a tool to assist security and privacy practitioners in their efforts to protect information systems in compliance with applicable <abbr title="Government of Canada">GC</abbr> legislation and <abbr title="Treasury Board Secretariat">TBS</abbr> policies, directives and standards.</p>

<p>When developing departmental security and privacy control and activity profiles, departmental security and privacy authorities are responsible for ensuring compliance with all security requirements of <abbr title="Government of Canada">GC</abbr> regulations and <abbr title="Treasury Board Secretariat">TBS</abbr> policy instruments applicable to their business activities, as well as any other contractual obligations.</p>

<div class="panel panel-default">
<header class="panel-heading"><h5 id="tab1">Table 1: Characterization of applicable business contexts</h5>
</header><div class="panel-body">
<dl class="dl-horizontal"><dt>Confidentiality objective</dt>
	<dd>The business activities involve the processing, transmission and storage of information that needs to be adequately protected from unintentional disclosure.</dd>
	<dt>Integrity and availability objective</dt>
	<dd>The expected injury from compromise of the integrity and availability of assets is assessed as medium. Assets therefore need to be adequately protected from integrity and availability compromise.</dd>
	<dt>Examples of injuries</dt>
	<dd>
	<ul><li>Serious civil disorder or unrest</li>
		<li>Physical pain, injury, trauma, hardship or illness to individuals</li>
		<li>Psychological distress or trauma to individuals</li>
		<li>Financial loss to individuals that affects their quality of life</li>
		<li>Financial loss to Canadian companies that reduces their competitiveness</li>
		<li>Inability to conduct criminal investigations or other impediments to effective law enforcement</li>
		<li>Disruption of government business activities that would inconvenience Canadians</li>
	</ul></dd>
	<dt>Examples of business processes</dt>
	<dd>
	<ul><li>Payments of benefits to Canadians where disruption or delay could cause psychological harm to people</li>
		<li>Financial and reporting processes where disruption could lead to financial losses to individuals or Canadian companies</li>
		<li>Processing of large financial transactions and payments</li>
		<li>Processes involving most health care records</li>
	</ul></dd>
	<dt>Examples of information assets</dt>
	<dd>
	<ul><li>Personal medical and financial information</li>
		<li>Personal income tax information</li>
		<li>Large financial transactions and payments</li>
		<li>Information that could be used for criminal purposes (for example, false identity or impersonation)</li>
		<li>Information about an individual’s eligibility for social benefits</li>
	</ul></dd>
</dl></div>
</div>

<h3 id="2.2">2.2 Technical context</h3>

<p>This profile is suitable for organizations operating in a wide range of environments. In general terms, organizational information systems to which this profile applies can be categorized based on their objective, as follows:</p>

<ul><li>information systems providing online services (for example, internet-based) to organizational program or service recipients</li>
	<li>information systems providing operational support services to organizational employees and contractors (for example, a corporate network)</li>
	<li>information systems providing shared or common services within and outside of the organization</li>
</ul><p>It is assumed that these information systems will be connected to other organizations and the Internet.</p>

<h4>2.2.1 Security architectural approaches</h4>

<p>The selection of security and privacy controls and activities documented in <a href="#4">Section 4</a> was also influenced by the choice of security engineering best practices applied to the implementation of dependable information systems. This profile is meant to address the cyber security needs of a broad range of business activities, from daily office work to citizen-facing service delivery applications to common and shared service infrastructure support.</p>

<p>This profile is for a categorization of medium confidentiality, integrity, and availability, with an acceptance of risk from high tier threat actors (Td5, Td6 and Td7). It assumes connection to lower sensitivity networks (for example, the public internet) using commercial security products, such as a firewall. It suggests a balanced set of security and privacy controls and activities to reduce the risk that compromised internal elements of an information system could be used to easily compromise additional elements. This profile also suggests security and privacy controls and activities to detect, respond to and recover from security incidents. Many of these are operational controls and activities that a mature cyber security operations group should have in place, not only for security and privacy reasons, but also for the efficient and cost-effective daily management of information systems.</p>

<p>Although selecting security and privacy controls and activities is somewhat subjective, the Cyber Centre made considerable effort to include controls and activities that mitigate real threats and that can be implemented using readily available commercial-off-the-shelf (COTS) products. We excluded from this suggested profile those security and privacy controls and activities that specify a specialized or advanced capability not required for all information systems. Furthermore, this profile aims to achieve the appropriate balance between usability and security.</p>

<h3 id="2.3">2.3 Threat context</h3>

<p>This profile has been developed to protect organizational business activities from cyber security-related threats that are relevant to both business and technical contexts.</p>

<p>This profile aims to protect information systems, in addition to business activities. This approach is necessary as threats may be directed at <abbr title="Government of Canada">GC</abbr> technical assets for no other reason than to compromise and exploit them, irrespective of the type of business activities that these assets support.</p>

<p>For example, some threat actors are not interested in <abbr title="Government of Canada">GC</abbr> information or in disrupting <abbr title="Government of Canada">GC</abbr> business activities. Instead, they are interested in compromising <abbr title="Government of Canada">GC</abbr> information systems to perform illegal acts, such as:</p>

<ul><li>storing illegal data (for example, images or movies) and covertly sharing that data with other criminals</li>
	<li>performing denial-of-service attacks on commercial websites</li>
	<li>extorting money</li>
	<li>sending spam</li>
	<li>infecting <abbr title="Government of Canada">GC</abbr> information systems with malware</li>
</ul><p>The Cyber Centre has analyzed threat information from multiple sources, including <abbr title="Treasury Board Secretariat">TBS</abbr> and departmental threat and incident reports, in addition to conducting its own analysis. As a result, this profile, when properly implemented (see <a href="#4">Section 4</a>), mitigates the risks from exposure to deliberate threat actors of categories Td1 to Td4, and accidental threats, including natural hazards, of categories Ta1 to Ta3, as defined in Table 2 and Table 3. As threat actor capabilities evolve, this profile will be updated to ensure that the selection of controls and activities is adjusted appropriately to mitigate new capabilities.</p>

<p>Before selecting and tailoring this profile, organizations must ensure that the threat context is applicable to their environment. If this profile is not suitable, organizations will need to create their own profile by considering the suite of security and privacy controls and activities documented in <a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033">Security and privacy controls and assurance activities catalogue (ITSP.10.033)</a>. For more details on creating security and privacy control and activity profiles and organizational threat assessments, read Organizational cyber security and privacy risk management activities (ITSP.10.036).</p>

<h4 class="h5" id="tab2">Table 2: Applicable deliberate threat categories</h4>

<div class="table-responsive">
<table class="table table-bordered"><thead><tr><th scope="col">Threat category</th>
			<th scope="col">Threat actor description</th>
			<th scope="col">Examples of increasing threat actor capabilities</th>
		</tr></thead><tbody><tr><td>Td1</td>
			<td>Non-adversarial actor (for example, non-malicious unauthorized browsing, modification, or destruction of information due to lack of training, concern or attentiveness)</td>
			<td>Basic end user capabilities to access information systems and contents</td>
		</tr><tr><td>Td2</td>
			<td>Passive, casual adversary with minimal resources who is willing to take little risk (for example, listening, script kiddie)</td>
			<td>
			<ul><li>Execution of a publicly available vulnerability scanner</li>
				<li>Execution of scripts to attack servers</li>
				<li>Attempts to randomly delete system files</li>
				<li>Modification of configuration files settings</li>
			</ul></td>
		</tr><tr><td>Td3</td>
			<td>Adversary with minimal resources who is willing to take significant risk (for example, unsophisticated hackers)</td>
			<td>
			<ul><li>Use of publicly available hacker tools to run various exploits</li>
				<li>Insiders installing Trojans and key loggers on unprotected systems</li>
				<li>Use of simple phishing attacks to compromise targets with malware</li>
				<li>Execution of programs to crash computers and applications</li>
			</ul></td>
		</tr><tr><td>Td4</td>
			<td>Sophisticated adversary with moderate resources who is willing to take little risk (for example, organized crime, sophisticated hackers, international corporations)</td>
			<td>
			<ul><li>Sophisticated use of publicly available hacker tools, including zero-day exploits</li>
				<li>Ability to create own attack tools in software</li>
				<li>Basic social engineering attacks</li>
				<li>Ability to assemble hardware using COTS components to facilitate attacks</li>
				<li>Phishing attacks to gain access to credit card or personal data</li>
			</ul></td>
		</tr></tbody></table></div>

<div class="panel panel-default">
<header class="panel-heading"><h5 id="tab3">Table 3: Applicable accidental threat categories</h5>
</header><div class="panel-body">
<dl class="dl-horizontal"><dt>Threat category: Ta1</dt>
	<dd>Magnitude of events:<br />
	Minor accidental events (for example, tripping over a power cord, entering incorrect information)</dd>
	<dt>Threat category: Ta2</dt>
	<dd>Magnitude of events:
	<ul><li>Moderate accidental events (for example, rendering a server inoperable, database corruption, releasing information to the wrong individual or organization)</li>
		<li>Minor hardware or software failures (for example, hard disk failure)</li>
		<li>Minor mechanical failures (for example, power failure within a section of a facility)</li>
		<li>Minor natural hazards (for example, localized flooding or an earthquake compromising part of a facility)</li>
	</ul></dd>
	<dt>Threat category: Ta3</dt>
	<dd>Magnitude of events:
	<ul><li>Serious inadvertent or accidental events (for example, cut facility telecommunications or power cables, fire in the facility, large-scale compromise of information)</li>
		<li>Moderate mechanical failures (for example, long-term facility power failure)</li>
		<li>Moderate natural hazards (for example, localized flooding or earthquake compromising a facility)</li>
	</ul></dd>
</dl></div>
</div>

<h3 id="2.4">2.4 Relationship of security and privacy controls and activities to confidentiality, integrity and availability objectives</h3>

<p>The selection of security and privacy controls and activities in this profile aims to ensure the appropriate mitigation of threats that could compromise the confidentiality, integrity or availability of assets supporting organizational business activities. This profile does not document the exact mapping between a security or privacy control or activity and the specific objectives it aims to fulfil. While some controls and activities map more clearly to a specific objective (for example, CP-7 Alternate Processing Site maps to an availability objective), most of them support more than one security objective. For example, most controls in the Access Control family support, either directly or indirectly, all 3 objectives of confidentiality, integrity and availability of assets. An adequate implementation of Access Control will mitigate a compromise where a threat actor:</p>

<ul><li>exfiltrates sensitive documents containing personal information (confidentiality objective)</li>
	<li>modifies documents or database records (integrity and usually availability objective)</li>
	<li>tampers with the proper behaviour of a business application (integrity and possibly availability objective)</li>
	<li>deletes database records (availability objective)</li>
	<li>corrupts a business application to make it inoperable (availability objective)</li>
</ul></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="3">3 Implementation guidance</h2>

<p>Security and privacy controls and activities need to be implemented in a manner commensurate with the potential for threat and injury. This profile was developed under certain assumptions, as described in <a href="#2">Section 2</a>. Consequently, the controls and activities should be implemented with a medium level of effort and due diligence, as described in this section.</p>

<h3 id="3.1">3.1 Security assurance</h3>

<p>To meet the control and activity requirements documented in this profile, organizations must define the level of effort that will be invested in developing, documenting and assessing the implementation of the controls and activities.</p>

<p>Organizational cyber security and privacy risk management activities (ITSP.10.036) describes a suggested process to implement or update security and privacy controls and activities in this profile that relate to the management of cyber security risks and those that are not deployed as part of information systems. System lifecycle cyber security and privacy risk management activities (ITSP.10.037) provides guidance on the level of effort expected for the implementation of those common security and privacy controls and activities (for example, incident management, risk assessments, personnel screening program, physical security program).</p>

<p>System lifecycle cyber security and privacy risk management activities (ITSP.10.037) describes a suggested security and privacy engineering process that is useful to cost-effectively design, develop, test, install and operate dependable information systems that satisfy business needs for security and privacy. ITSP.10.037 provides guidance to project managers, security and privacy practitioners, security and privacy assessors, and authorizers on the expected level of effort for security and privacy engineering and assessment tasks to ensure that the cyber security implemented in information systems meets the objectives of this profile.</p>

<p>In the case of security and privacy controls and activities implemented for information systems, the appropriate level of effort for security and privacy engineering and assessment tasks is defined through security assurance requirements. These requirements are directed at the tasks that security and privacy control and activity designers, developers and implementers need to perform to increase confidence that the security engineering work and documentation produced is adequate. These tasks also ensure that controls and activities are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the security objectives defined for the information systems. The Cyber Centre suggests that projects use SAL2, as defined in ITSP.10.037, to implement most of the security and privacy controls and activities in this profile.</p>

<p>For critical controls and activities, in particular those on the boundary of an information system and those facing greater threat actor capabilities, an adequate implementation will ensure that a greater level of effort has been applied to the design, development, testing, installation and operation of these controls and activities. The Cyber Centre suggests that projects use SAL3, as defined in ITSP.10.037, to implement the critical controls and activities in this profile. The criticality of a control or activity is dependent on the specific design of the information systems to which it is applied and must be determined by projects’ security and privacy practitioners.</p>

<p>Additionally, for assurance levels SAL1 to SAL3, any supplier involved in the design, development or operation of an information system should hold, as a minimum, a designated organization screening, as stipulated in ITSP.10.037.</p>

<p>Note that the level of assurance suggested to adequately implement this profile does not ensure adequate protection of an information system against the highest level of threat actor capabilities (that is, Td5, Td6 and Td7 threat actors that are highly skilled, highly motivated and well resourced).</p>

<p>ITSP.10.037 provides more detailed guidance for projects on security assurance requirements and the development, documentation and assessment tasks required to satisfy those requirements.</p>

<p>In addition, the Cyber Centre recommends that selected commercial products that perform security functionality should be evaluated to ensure that they function as required and are sufficiently resilient to identified threats. To facilitate this assurance process and ensure that products are evaluated against appropriate security requirements, the Cyber Centre provides a list of commercially available products evaluated against the Common Criteria (CC) program. The Cyber Centre has evaluated these products in partnership with certain commercial laboratories<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup>, and organizations can use them at their discretion. If organizations choose to leverage this list of Cyber Centre–assured products, procurement vehicles should specify that the selected security products be verified by the <abbr title="Common Criteria">CC</abbr> program against an appropriate security target or <abbr title="Common Criteria">CC</abbr> protection profile<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>. The target or profile is either defined organizationally in security standards or determined by the project’s security practitioners to satisfy the requirements of sections 2 and 3. If the product contains a cryptographic module, then it must also be verified by the Cryptographic Module Validation Program<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup> (CMVP), a joint program between the Cyber Centre and <abbr title="National Institute of Standards and Technology">NIST</abbr>. A database of validated cryptographic modules is hosted on the <abbr title="National Institute of Standards and Technology"><a href="https://csrc.nist.gov/Projects/cryptographic-module-validation-program/validated-modules/search">NIST</a></abbr> website.</p>

<h3 id="3.2">Format</h3>

<p>The table in Section 4 provides the suggested set of security and privacy controls, activities and enhancements for this profile. For each control or activity, an ID is provided, along with:</p>

<ul><li>the name of the control or activity</li>
	<li>a list of suggested enhancements</li>
	<li>a general description and implementation guidance notes</li>
	<li>values for the placeholder parameters documented as part of each control or activity in the profile</li>
	<li>additional notes regarding the controls, activities and enhancements in the context of this profile</li>
</ul><p>The complete description of the security and privacy controls, activities, enhancements and placeholder parameters is available in Security and privacy controls and assurance activities catalogue (ITSP.10.033). The columns “Suggested placeholder values” and “Profile-specific notes” are usually empty. Your organization can use these columns as tools to tailor your profile.</p>

<p>To make it convenient for security and privacy practitioners to tailor or create their own organizational security and privacy control and activity profile, the Cyber Centre has created a spreadsheet containing the controls and activities provided in <a href="#4">Section 4</a>. Email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> to request a copy of this spreadsheet.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="4">4 Suggested controls, activities, and enhancements</h2>

<h3>Suggested security and privacy controls, activities, and enhancements</h3>

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.1">Table 4.1: Access control</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>AC</td>
			<td>01</td>
			<td>Access control policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (1 or more): Organization-level; Mission/business process-level; System-level] access control policy that
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, jurisprudence, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the access control policy and the associated access controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the access control policy and procedures</li>
				<li>Review and update the current access control
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>C.1 C.2 frequency [at a frequency no longer than annually]</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02</td>
			<td>Account management</td>
			<td>
			<ol class="lst-upr-alph"><li>Define and document the types of accounts allowed and specifically prohibited for use within the system</li>
				<li>Assign account managers and data custodians</li>
				<li>Require [Assignment: organization-defined prerequisites and criteria] for group and role membership</li>
				<li>Specify:
				<ol><li>authorized users of the system</li>
					<li>group and role membership</li>
					<li>access authorizations (i.e., privileges) and [Assignment: organization-defined attributes (as required)] for each account</li>
				</ol></li>
				<li>Require approvals by [Assignment: organization-defined personnel or roles] for requests to create accounts</li>
				<li>Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined policy, procedures, prerequisites, and criteria]</li>
				<li>Monitor the use of accounts</li>
				<li>Notify account managers and [Assignment: organization-defined personnel or roles] within:
				<ol><li>[Assignment: organization-defined time period] when accounts are no longer required or are dormant</li>
					<li>[Assignment: organization-defined time period] when users are terminated or transferred</li>
					<li>[Assignment: organization-defined time period] when system usage or need-to-know changes for an individual</li>
				</ol></li>
				<li>Authorize access to the system based on:
				<ol><li>a valid access authorization</li>
					<li>intended system usage</li>
					<li>[Assignment: organization-defined attributes (as required)]</li>
				</ol></li>
				<li>Periodically review accounts for compliance with account management requirements [Assignment: organization-defined frequency]</li>
				<li>Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group</li>
				<li>Align account management processes with personnel termination and transfer processes</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>(J) frequency [at a frequency no longer than monthly]</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(01)</td>
			<td>Account management</td>
			<td>Account management: Automated system account management<br />
			Support the management of system accounts using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(02)</td>
			<td>Account management</td>
			<td>Account management: Automated temporary and emergency account management<br />
			Automatically [Selection (one): remove; disable] temporary and emergency accounts after [Assignment: organization-defined time period for each type of account].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>time period [not to exceed 48 hours after no longer being required]</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(03)</td>
			<td>Account management</td>
			<td>Account management: Disable accounts<br />
			Disable accounts within [Assignment: organization-defined time period] when the accounts:
			<ol class="lst-lwr-alph"><li>have expired</li>
				<li>are no longer associated with a user or individual</li>
				<li>are in violation of organizational policy</li>
				<li>have been inactive for [Assignment: organization-defined time period]</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>a. b. time period [not to exceed 30 days]<br />
			c. time period [not to exceed 24 hours]</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(04)</td>
			<td>Account management</td>
			<td>Account management: Automated audit actions<br />
			Automatically audit account creation, modification, enabling, disabling, and removal actions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(05)</td>
			<td>Account management</td>
			<td>Account management: Inactivity logout<br />
			Require that users log out when [Assignment: organization-defined time period of expected inactivity or description of when to log out].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(06)</td>
			<td>Account management</td>
			<td>Account management: Dynamic privilege management<br />
			Implement [Assignment: organization-defined dynamic privilege management capabilities].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(07)</td>
			<td>Account management</td>
			<td>Account management: Privileged user accounts
			<ol class="lst-lwr-alph"><li>Establish and administer privileged user accounts in accordance with [Selection (one): a role-based access scheme; an attribute-based access scheme].</li>
				<li>Monitor privileged role or attribute assignments.</li>
				<li>Monitor changes to roles or attributes.</li>
				<li>Revoke access when privileged role or attribute assignments are no longer appropriate.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(08)</td>
			<td>Account management</td>
			<td>Account management: Dynamic account management<br />
			Create, activate, manage, and deactivate [Assignment: organization-defined system accounts] dynamically.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(09)</td>
			<td>Account management</td>
			<td>Account management: Restrictions on use of shared and group accounts<br />
			Only permit the use of shared and group accounts that meet [Assignment: organization-defined conditions for establishing shared and group accounts].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(10)</td>
			<td>Account management</td>
			<td>Account management: Shared / group account credential termination<br />
			Withdrawn: Incorporated into AC-2K.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(11)</td>
			<td>Account management</td>
			<td>Account management: Usage conditions<br />
			Enforce [Assignment: organization-defined circumstances and/or usage conditions] for [Assignment: organization-defined system accounts].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(12)</td>
			<td>Account management</td>
			<td>Account management: Account monitoring for atypical usage
			<ol class="lst-lwr-alph"><li>Monitor system accounts for [Assignment: organization-defined atypical usage].</li>
				<li>Report atypical usage of system accounts to [Assignment: organization-defined personnel or roles].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>02(13)</td>
			<td>Account management</td>
			<td>Account management: Disable accounts for high-risk individuals<br />
			Disable accounts of individuals within [Assignment: organization-defined time period] of discovery of [Assignment: organization-defined significant risks].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03</td>
			<td>Access enforcement</td>
			<td>Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(01)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Restricted access to privileged functions<br />
			Withdrawn: Incorporated into AC-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(02)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Dual authorization<br />
			Enforce dual authorization for [Assignment: organization-defined privileged commands and/or other organization-defined actions].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>[1] privileged commands [creation and deletion of <abbr title="public key infrastructure">PKI</abbr> officers and administrators accounts]<br />
			[2] actions [examples are: <abbr title="public key infrastructure">PKI</abbr> changes to administrators and security officers; global administrator actions in cloud tenancies; domain administrator actions in single-forest systems]</td>
			<td>Organizations must assess which administrative actions are capable of creating the entire available Injury. These actions are candidates for dual authorization</td>
		</tr><tr><td>AC</td>
			<td>03(03)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Mandatory access control<br />
			Enforce [Assignment: organization-defined mandatory access control policy] over the set of covered subjects and objects specified in the policy, and where the policy:
			<ol class="lst-lwr-alph"><li>is uniformly enforced across the covered subjects and objects within the system</li>
				<li>specifies that a subject that has been granted access to information is constrained from doing any of the following;
				<ol><li>passing the information to unauthorized subjects or objects</li>
					<li>granting its privileges to other subjects</li>
					<li>changing one or more security attributes (specified by the policy) on subjects, objects, the system, or system components</li>
					<li>choosing the security attributes and attribute values (specified by the policy) to be associated with newly created or modified objects</li>
					<li>changing the rules governing access control</li>
				</ol></li>
				<li>specifies that [Assignment: organization-defined subjects] may explicitly be granted [Assignment: organization-defined privileges] such that they are not limited by any defined subset (or all) of the above constraints</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(04)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Discretionary access control<br />
			Enforce [Assignment: organization-defined discretionary access control policy] over the set of covered subjects and objects specified in the policy, and where the policy specifies that a subject that has been granted access to information can do one or more of the following:
			<ol class="lst-lwr-alph"><li>pass the information to any other subjects or objects</li>
				<li>grant its privileges to other subjects</li>
				<li>change security attributes on subjects, objects, the system, or the system’s components</li>
				<li>choose the security attributes to be associated with newly created or revised objects</li>
				<li>change the rules governing access control</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>Control enhancement (04) clarifies the Access Enforcement security control by detailing the policy that should be used for access enforcement to Protected B information. That is, while the system may be authorized to process <abbr title="protected B">PB</abbr>, not all information will necessarily be <abbr title="protected B">PB</abbr>. Therefore, <abbr title="discretionary access control">DAC</abbr> will be used to establish and enforce access controls over <abbr title="protected B">PB</abbr> information to “need to know.”<br />
			Examples of <abbr title="discretionary access control">DAC</abbr> include Windows groups (at the file object level) and document management systems that allow document access permissions to be modified by the owner.</td>
		</tr><tr><td>AC</td>
			<td>03(05)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Security-relevant information<br />
			Prevent access to [Assignment: organization-defined security-relevant information] except during secure, non-operable system states.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(06)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Protection of user and system information<br />
			Withdrawn: Incorporated into MP-04 and SC-28.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(07)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Role-based access control<br />
			Enforce a role-based access control policy over defined subjects and objects and control access based upon [Assignment: organization-defined roles and users authorized to assume such roles].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(08)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Revocation of access authorizations<br />
			Enforce the revocation of access authorizations resulting from changes to the security attributes of subjects and objects based on [Assignment: organization-defined rules governing the timing of revocations of access authorizations].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(09)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Controlled release<br />
			Release information outside of the system only if:
			<ol class="lst-lwr-alph"><li>the receiving [Assignment: organization-defined system or system component] provides [Assignment: organization-defined controls]</li>
				<li>[Assignment: organization-defined controls] are used to validate the appropriateness of the information designated for release</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(10)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Audited override of access control mechanisms<br />
			Employ an audited override of automated access control mechanisms under [Assignment: organization-defined conditions] by [Assignment: organization-defined roles].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(11)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Restrict access to specific information types<br />
			Restrict access to data repositories containing [Assignment: organization-defined information types].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(12)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Assert and enforce application access
			<ol class="lst-lwr-alph"><li>Require applications to assert, as part of the installation process, the access needed to the following system applications and functions: [Assignment: organization-defined system applications and functions].</li>
				<li>Provide an enforcement mechanism to prevent unauthorized access.</li>
				<li>Approve access changes after initial installation of the application.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(13)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Attribute-based access control<br />
			Enforce attribute-based access control policy over defined subjects and objects and control access based upon [Assignment: organization-defined attributes to assume access permissions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(14)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Individual access<br />
			Provide [Assignment: organization-defined mechanisms] to enable individuals to have access to the following elements of their personal information: [Assignment: organization-defined elements].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>03(15)</td>
			<td>Access enforcement</td>
			<td>Access enforcement: Discretionary and mandatory access control
			<ol class="lst-lwr-alph"><li>Enforce [Assignment: organization-defined mandatory access control policy] over the set of covered subjects and objects specified in the policy.</li>
				<li>Enforce [Assignment: organization-defined discretionary access control policy] over the set of covered subjects and objects specified in the policy.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04</td>
			<td>Information flow enforcement</td>
			<td>Enforce approved authorizations for controlling the flow of information within the system and between connected systems based on [Assignment: organization-defined information flow control policies].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(01)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Object security and privacy attributes<br />
			Use [Assignment: organization-defined security and privacy attributes] associated with [Assignment: organization-defined information, source, and destination objects] to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(02)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Processing domains<br />
			Use protected processing domains to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(03)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Dynamic information flow control<br />
			Enforce [Assignment: organization-defined information flow control policies].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(04)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Flow control of encrypted information<br />
			Prevent encrypted information from bypassing [Assignment: organization-defined information flow control mechanisms] by [Selection (one or more): decrypting the information; blocking the flow of the encrypted information; terminating communications sessions attempting to pass encrypted information; [Assignment: organization-defined procedure or method]].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(05)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Embedded data types<br />
			Enforce [Assignment: organization-defined limitations] on embedding data types within other data types.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(06)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Metadata<br />
			Enforce information flow control based on [Assignment: organization-defined metadata].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(07)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: One-way flow mechanisms<br />
			Enforce one-way information flows through hardware-based flow control mechanisms.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(08)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Security and privacy policy filters
			<ol class="lst-lwr-alph"><li>Enforce information flow control using [Assignment: organization-defined security or privacy policy filters] as a basis for flow control decisions for [Assignment: organization-defined information flows].</li>
				<li>[Selection (one or more): Block; Strip; Modify; Quarantine] data after a filter processing failure in accordance with [Assignment: organization-defined security or privacy policy].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(09)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Human reviews<br />
			Enforce the use of human reviews for [Assignment: organization-defined information flows] under the following conditions: [Assignment: organization-defined conditions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(10)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Enable and disable security or privacy policy filters<br />
			Provide the capability for privileged administrators to enable and disable [Assignment: organization-defined security or privacy policy filters] under the following conditions: [Assignment: organization-defined conditions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(11)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Configuration of security or privacy policy filters<br />
			Provide the capability for privileged administrators to configure [Assignment: organization-defined security or privacy policy filters] to support different security or privacy policies.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(12)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Data type identifiers<br />
			When transferring information between different security domains, use [Assignment: organization-defined data type identifiers] to validate data essential for information flow decisions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(13)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Decomposition into policy-relevant subcomponents<br />
			When transferring information between different security domains, decompose information into [Assignment: organization-defined policy-relevant subcomponents] for submission to policy enforcement mechanisms.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(14)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Security or privacy policy filter constraints<br />
			When transferring information between different security domains, implement [Assignment: organization-defined security or privacy policy filters] requiring fully enumerated formats that restrict data structure and content.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(15)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Detection of unsanctioned information<br />
			When transferring information between different security domains, examine the information for the presence of [Assignment: organization-defined unsanctioned information] and prohibit the transfer of such information in accordance with the [Assignment: organization-defined security or privacy policy].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(16)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Information transfers on interconnected systems<br />
			Withdrawn: Incorporated into AC-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(17)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Domain authentication<br />
			Uniquely identify and authenticate source and destination points by [Selection (one or more): organization; system; application; service; individual] for information transfer.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(18)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Security attribute binding<br />
			Withdrawn: Incorporated into AC-16.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(19)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Validation of metadata<br />
			When transferring information between different security domains, implement [Assignment: organization-defined security or privacy policy filters] on metadata.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(20)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Approved solutions<br />
			Employ [Assignment: organization-defined solutions in approved configurations] to control the flow of [Assignment: organization-defined information] across security domains.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(21)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Physical or logical separation of information flows<br />
			Separate information flows logically or physically using [Assignment: organization-defined mechanisms and/or techniques] to accomplish [Assignment: organization-defined required separations by types of information].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(22)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Access only<br />
			Provide access from a single device to computing platforms, applications, or data residing in multiple different security domains, while preventing information flow between the different security domains.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(23)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Modify non-releasable information<br />
			When transferring information between different security domains, modify non-releasable information by implementing [Assignment: organization-defined modification action].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(24)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Internal normalized format<br />
			When transferring information between different security domains, parse incoming data into an internal normalized format and regenerate the data to be consistent with its intended specification.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(25)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Data sanitization<br />
			When transferring information between different security domains, sanitize data to minimize [Selection (one or more): delivery of malicious content, command and control of malicious code, malicious code augmentation, and steganography encoded data; spillage of sensitive information] in accordance with [Assignment: organization-defined policy].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(26)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Audit filtering actions<br />
			When transferring information between different security domains, record and audit content filtering actions and results for the information being filtered.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(27)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Redundant/independent filtering mechanisms<br />
			When transferring information between different security domains, implement content filtering solutions that provide redundant and independent filtering mechanisms for each data type.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(28)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Linear filter pipelines<br />
			When transferring information between different security domains, implement a linear content filter pipeline that is enforced with discretionary and mandatory access controls.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(29)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Filter orchestration engines<br />
			When transferring information between different security domains, employ content filter orchestration engines to ensure that:
			<ol class="lst-lwr-alph"><li>Content filtering mechanisms successfully complete execution without errors; and</li>
				<li>Content filtering actions occur in the correct order and comply with [Assignment: organization-defined policy].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(30)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Filter mechanisms using multiple processes<br />
			When transferring information between different security domains, implement content filtering mechanisms using multiple processes.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(31)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Failed content transfer prevention<br />
			When transferring information between different security domains, prevent the transfer of failed content to the receiving domain.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>04(32)</td>
			<td>Information flow enforcement</td>
			<td>Information flow enforcement: Process requirements for information transfer<br />
			When transferring information between different security domains, the process that transfers information between filter pipelines:
			<ol class="lst-lwr-alph"><li>does not filter message content</li>
				<li>validates filtering metadata</li>
				<li>ensures the content associated with the filtering metadata has successfully completed filtering</li>
				<li>transfers the content to the destination filter pipeline</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>05</td>
			<td>Separation of duties</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify and document [Assignment: organization-defined duties of individuals requiring separation].</li>
				<li>Define system access authorizations to support separation of duties.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06</td>
			<td>Least privilege</td>
			<td>Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(01)</td>
			<td>Least privilege</td>
			<td>Least privilege: Authorize access to security functions<br />
			Authorize access for [Assignment: organization-defined individuals or roles] to:
			<ol class="lst-lwr-alph"><li>[Assignment: organization-defined security functions (deployed in hardware, software, and firmware)]</li>
				<li>[Assignment: organization-defined security-relevant information]</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(02)</td>
			<td>Least privilege</td>
			<td>Least privilege: Non-privileged access for non-security functions<br />
			Require that users of system accounts (or roles) with access to [Assignment: organization-defined security functions or security-relevant information] use non-privileged accounts or roles, when accessing non-security functions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(03)</td>
			<td>Least privilege</td>
			<td>Least privilege: Network access to privileged commands<br />
			Authorize network access to [Assignment: organization-defined privileged commands] only for [Assignment: organization-defined compelling operational needs] and document the rationale for such access in the security plan for the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(04)</td>
			<td>Least privilege</td>
			<td>Least privilege: Separate processing domains<br />
			Provide separate processing domains to enable finer-grained allocation of user privileges.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(05)</td>
			<td>Least privilege</td>
			<td>Least privilege: Privileged accounts<br />
			Restrict privileged accounts on the system to [Assignment: organization-defined personnel or roles].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(06)</td>
			<td>Least privilege</td>
			<td>Least privilege: Privileged access by non-organizational users<br />
			Prohibit privileged access to the system by non-organizational users.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(07)</td>
			<td>Least privilege</td>
			<td>Least privilege: Review of user privileges
			<ol class="lst-lwr-alph"><li>Review [Assignment: organization-defined frequency] the privileges assigned to [Assignment: organization-defined roles or classes of users] to validate the need for such privileges.</li>
				<li>Reassign or remove privileges, if necessary, to correctly reflect organizational mission and business needs.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(08)</td>
			<td>Least privilege</td>
			<td>Least privilege: Privilege levels for code execution<br />
			Prevent the following software from executing at higher privilege levels than users executing the software: [Assignment: organization-defined software].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(09)</td>
			<td>Least privilege</td>
			<td>Least privilege: Log use of privileged functions<br />
			Log the execution of privileged functions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>06(10)</td>
			<td>Least privilege</td>
			<td>Least privilege: Prohibit non-privileged users from executing privileged functions<br />
			Prevent non-privileged users from executing privileged functions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>07</td>
			<td>Unsuccessful logon attempts</td>
			<td>
			<ol class="lst-upr-alph"><li>Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period].</li>
				<li>Automatically [Selection (one or more): lock the account or node for an [Assignment: organization-defined time period]; lock the account or node until released by an administrator; delay next logon prompt per [Assignment: organization-defined delay algorithm]; notify system administrator; take other [Assignment: organization-defined action]] when the maximum number of unsuccessful attempts is exceeded.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>A. number [of a maximum of 5]<br />
			A. time period [period of at least 5 minutes]</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>07(01)</td>
			<td>Unsuccessful logon attempts</td>
			<td>Unsuccessful logon attempts: automatic account lock<br />
			Withdrawn: Incorporated into AC-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>07(02)</td>
			<td>Unsuccessful logon attempts</td>
			<td>Unsuccessful logon attempts: Purge or wipe mobile device<br />
			Purge or wipe information from [Assignment: organization-defined mobile devices] based on [Assignment: organization-defined purging or wiping requirements and techniques] after [Assignment: organization-defined number] consecutive, unsuccessful device logon attempts.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>07(03)</td>
			<td>Unsuccessful logon attempts</td>
			<td>Unsuccessful logon attempts: Biometric attempt limiting<br />
			Limit the number of unsuccessful biometric logon attempts to [Assignment: organization-defined number].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>07(04)</td>
			<td>Unsuccessful logon attempts</td>
			<td>Unsuccessful logon attempts: Use of alternate authentication factor
			<ol class="lst-lwr-alph"><li>Allow the use of [Assignment: organization-defined authentication factors] that are different from the primary authentication factors after the number of organization-defined consecutive invalid logon attempts have been exceeded.</li>
				<li>Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts through use of the alternative factors by a user during a [Assignment: organization-defined time period].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>08</td>
			<td>System use notification</td>
			<td>
			<ol class="lst-upr-alph"><li>Display [Assignment: organization-defined system use notification message or banner] to users before granting access to the system that provides privacy and security notices consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines and state that:
				<ol><li>users are accessing a Government of Canada system</li>
					<li>system usage may be monitored, recorded, and subject to audit</li>
					<li>unauthorized use of the system is prohibited and subject to criminal and civil penalties</li>
					<li>the relevant Personal Information Bank reference, if applicable</li>
					<li>legal authority for the collection of personal information</li>
					<li>any legal or administrative consequences for refusing to provide the personal information</li>
					<li>the rights of access to, correction and protection of personal information</li>
					<li>how the information will be used</li>
					<li>the right to file a complaint to the Privacy Commissioner of Canada regarding the institution’s handling of the individual’s personal information</li>
				</ol></li>
				<li>Retain the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system.</li>
				<li>For publicly accessible systems:
				<ol><li>display system use information [Assignment: organization-defined conditions], before granting further access to the publicly accessible system</li>
					<li>display references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities</li>
					<li>include a description of the authorized uses of the system</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>09</td>
			<td>Previous logon notification</td>
			<td>Notify the user, upon successful logon to the system, of the date and time of the last logon.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>09(01)</td>
			<td>Previous logon notification</td>
			<td>Previous logon notification: Unsuccessful logons<br />
			Notify the user, upon successful logon, of the number of unsuccessful logon attempts since the last successful logon.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>09(02)</td>
			<td>Previous logon notification</td>
			<td>Previous logon notification: Successful and unsuccessful logons<br />
			Notify the user, upon successful logon, of the number of [Selection (one): successful logons; unsuccessful logon attempts; both] during [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>09(03)</td>
			<td>Previous logon notification</td>
			<td>Previous logon notification: Notification of account changes<br />
			Notify the user, upon successful logon, of changes to [Assignment: organization-defined security-related characteristics or parameters of the user’s account] during [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>09(04)</td>
			<td>Previous logon notification</td>
			<td>Previous logon notification: Additional logon information<br />
			Notify the user, upon successful logon, of the following additional information: [Assignment: organization-defined additional information].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>10</td>
			<td>Concurrent session control</td>
			<td>Limit the number of concurrent sessions for each [Assignment: organization-defined account and/or account type] to [Assignment: organization-defined number].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>11</td>
			<td>Device lock</td>
			<td>
			<ol class="lst-upr-alph"><li>Prevent further access to the system by [Selection (one or more): initiating a device lock after [Assignment: organization-defined time period] of inactivity; requiring the user to initiate a device lock before leaving the system unattended].</li>
				<li>Retain the device lock until the user re-establishes access using established identification and authentication procedures.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>11(01)</td>
			<td>Device lock</td>
			<td>Device lock: Pattern-hiding displays<br />
			Conceal, via the device lock, information previously visible on the display with a publicly viewable image.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>12</td>
			<td>Session termination</td>
			<td>Automatically terminate a user session after [Assignment: organization-defined conditions or trigger events requiring session disconnect].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>12(01)</td>
			<td>Session termination</td>
			<td>Session termination: User-initiated logouts<br />
			Provide a logout capability for user-initiated communications sessions whenever authentication is used to gain access to [Assignment: organization-defined information resources].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>12(02)</td>
			<td>Session termination</td>
			<td>Session termination: Termination message<br />
			Display an explicit logout message to users indicating the termination of authenticated communications sessions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>12(03)</td>
			<td>Session termination</td>
			<td>Session termination: Timeout warning message<br />
			Display an explicit message to users indicating that the session will end in [Assignment: organization-defined time until end of session].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>13</td>
			<td>Supervision and review — access control</td>
			<td>Withdrawn: Incorporated into AC-02 and AU-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>14</td>
			<td>Permitted actions without identification or authentication</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify [Assignment: organization-defined user actions] that can be performed on the system without identification or authentication consistent with organizational mission and business functions.</li>
				<li>Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>14(01)</td>
			<td>Permitted actions without identification or authentication</td>
			<td>Permitted actions without identification or authentication: Necessary uses<br />
			Withdrawn: Incorporated into AC-14.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>15</td>
			<td>Automated marking</td>
			<td>Withdrawn: Incorporated into MP-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16</td>
			<td>Security and privacy attributes</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide the means to associate [Assignment: organization-defined types of security and privacy attributes] with [Assignment: organization-defined security and privacy attribute values] for information in storage, in process, and/or in transmission.</li>
				<li>Ensure that the attribute associations are made and retained with the information.</li>
				<li>Establish the following permitted security and privacy attributes from the attributes defined in AC-16A for [Assignment: organization-defined systems]: [Assignment: organization-defined security and privacy attributes].</li>
				<li>Determine the following permitted attribute values or ranges for each of the established attributes: [Assignment: organization-defined attribute values or ranges for established attributes].</li>
				<li>Audit changes to attributes.</li>
				<li>Review [Assignment: organization-defined security and privacy attributes] for applicability [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>In the context of this profile, the objective of this control is to achieve consistent labeling of Protected B material to the maximum extent supported by available, automated mechanisms (for example, email system enforcing classification labels). Since not all information on the system will be sensitive, labeling will help prevent the accidental distribution of Protected B information by providing filter mechanisms with a differentiator.</td>
		</tr><tr><td>AC</td>
			<td>16(01)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Dynamic attribute association<br />
			Dynamically associate security and privacy attributes with [Assignment: organization-defined subjects and objects] in accordance with the following security and privacy policies as information is created and combined: [Assignment: organization-defined security and privacy policies].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(02)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Attribute value changes by authorized individuals<br />
			Provide authorized individuals (or processes acting on behalf of individuals) the capability to define or change the value of associated security and privacy attributes.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(03)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Maintenance of attribute associations by system<br />
			Maintain the association and integrity of [Assignment: organization-defined security and privacy attributes] to [Assignment: organization-defined subjects and objects].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(04)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Association of attributes by authorized individuals<br />
			Provide the capability to associate [Assignment: organization-defined security and privacy attributes] with [Assignment: organization-defined subjects and objects] by authorized individuals (or processes acting on behalf of individuals).</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(05)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Attribute displays on objects to be output<br />
			Display security and privacy attributes in human-readable form on each object that the system transmits to output devices to identify [Assignment: organization-defined special dissemination, handling, or distribution instructions] using [Assignment: organization-defined human-readable, standard naming conventions].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(06)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Maintenance of attribute association<br />
			Require personnel to associate and maintain the association of [Assignment: organization-defined security and privacy attributes] with [Assignment: organization-defined subjects and objects] in accordance with [Assignment: organization-defined security and privacy policies].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(07)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Consistent attribute interpretation<br />
			Provide a consistent interpretation of security and privacy attributes transmitted between distributed system components.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(08)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Association techniques and technologies<br />
			Implement [Assignment: organization-defined techniques and technologies] in associating security and privacy attributes to information.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(09)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Attribute reassignment - regrading mechanisms<br />
			Change security and privacy attributes associated with information only via regrading mechanisms validated using [Assignment: organization-defined techniques or procedures].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>16(10)</td>
			<td>Security and privacy attributes</td>
			<td>Security and privacy attributes: Attribute configuration by authorized individuals<br />
			Provide authorized individuals the capability to define or change the type and value of security and privacy attributes available for association with subjects and objects.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17</td>
			<td>Remote access</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed.</li>
				<li>Authorize each type of remote access to the system prior to allowing such connections.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(01)</td>
			<td>Remote access</td>
			<td>Remote access: Monitoring and control<br />
			Employ automated mechanisms to monitor and control remote access methods.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(02)</td>
			<td>Remote access</td>
			<td>Remote access: Protection of confidentiality and integrity using encryption<br />
			Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(03)</td>
			<td>Remote access</td>
			<td>Remote access: Managed access control points<br />
			Route remote accesses through authorized and managed network access control points.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(04)</td>
			<td>Remote access</td>
			<td>Remote access: Privileged commands and access
			<ol class="lst-lwr-alph"><li>Authorize the execution of privileged commands and access to security-relevant information via remote access only in a format that provides assessable evidence and for the following needs: [Assignment: organization-defined needs].</li>
				<li>Document the rationale for remote access in the security plan for the system.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(05)</td>
			<td>Remote access</td>
			<td>Remote access: Monitoring for unauthorized connections<br />
			Withdrawn: Incorporated into SI-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(06)</td>
			<td>Remote access</td>
			<td>Remote access: Protection of mechanism information<br />
			Protect information about remote access mechanisms from unauthorized use and disclosure.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(07)</td>
			<td>Remote access</td>
			<td>Remote access: Additional protection for security function access<br />
			Withdrawn: Incorporated into AC-03(10).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(08)</td>
			<td>Remote access</td>
			<td>Remote access: Disable non-secure network protocols<br />
			Withdrawn: Incorporated into CM-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(09)</td>
			<td>Remote access</td>
			<td>Remote access: Disconnect or disable access<br />
			Provide the capability to disconnect or disable remote access to the system within [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(10)</td>
			<td>Remote access</td>
			<td>Remote access: Authenticate remote commands<br />
			Implement [Assignment: organization-defined mechanisms] to authenticate [Assignment: organization-defined remote commands].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>17(400)</td>
			<td>Remote access</td>
			<td>Remote access: Privileged accounts remote access<br />
			Access to privileged account remotely is only done from dedicated management consoles.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>18</td>
			<td>Wireless access</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access.</li>
				<li>Authorize each type of wireless access to the system prior to allowing such connections.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>18(01)</td>
			<td>Wireless access</td>
			<td>Wireless access: Authentication and encryption<br />
			Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>18(02)</td>
			<td>Wireless access</td>
			<td>Wireless access: Monitoring unauthorized connections<br />
			Withdrawn: Incorporated into SI-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>18(03)</td>
			<td>Wireless access</td>
			<td>Wireless access: Disable wireless networking<br />
			Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>18(04)</td>
			<td>Wireless access</td>
			<td>Wireless access: Restrict configurations by users<br />
			Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>18(05)</td>
			<td>Wireless access</td>
			<td>Wireless access: Antennas and transmission power levels<br />
			Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>19</td>
			<td>Access control for mobile devices</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas.</li>
				<li>Authorize the connection of mobile devices to organizational systems.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>19(01)</td>
			<td>Access control for mobile devices</td>
			<td>Access control for mobile devices: Use of mobile devices<br />
			Withdrawn: Incorporated into MP-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>19(02)</td>
			<td>Access control for mobile devices</td>
			<td>Access control for mobile devices: Use of personally owned mobile devices<br />
			Withdrawn: Incorporated into MP-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>19(03)</td>
			<td>Access control for mobile devices</td>
			<td>Access control for mobile devices: Use of mobile devices with no identifiable owner<br />
			Withdrawn: Incorporated into MP-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>19(04)</td>
			<td>Access control for mobile devices</td>
			<td>Access control for mobile devices: Restrictions for classified information
			<ol class="lst-lwr-alph"><li>Prohibit the use of unclassified mobile devices in facilities containing systems processing, storing, or transmitting classified information unless specifically permitted by the authorizing official.</li>
				<li>Enforce the following restrictions on individuals permitted by the authorizing official to use unclassified mobile devices in facilities containing systems processing, storing, or transmitting classified information:
				<ol><li>connection of unclassified mobile devices to classified systems is prohibited</li>
					<li>connection of unclassified mobile devices to unclassified systems requires approval from the authorizing official</li>
					<li>use of internal or external modems or wireless interfaces within the unclassified mobile devices is prohibited</li>
					<li>unclassified mobile devices and the information stored on those devices are subject to random reviews and inspections by [Assignment: organization-defined security officials], and if classified information is found, the incident handling policy is followed</li>
				</ol></li>
				<li>Restrict the connection of classified mobile devices to classified systems in accordance with [Assignment: organization-defined security policies].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>19(05)</td>
			<td>Access control for mobile devices</td>
			<td>Access control for mobile devices: Full device or container-based encryption<br />
			Employ [Selection: full-device encryption; container-based encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>19(400)</td>
			<td>Access control for mobile devices</td>
			<td>Access control for mobile devices: Wireless devices<br />
			Withdrawn: Moved to SC-42(400).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>20</td>
			<td>Use of external systems</td>
			<td>
			<ol class="lst-upr-alph"><li>[Selection (one or more): Establish [Assignment: organization-defined terms and conditions]; Identify [Assignment: organization-defined controls asserted to be implemented on external systems]], consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to:
				<ol><li>access the system from external systems</li>
					<li>process, store, or transmit organization-controlled information using external systems</li>
				</ol></li>
				<li>Prohibit the use of [Assignment: organizationally-defined types of external systems].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>20(01)</td>
			<td>Use of external systems</td>
			<td>Use of external systems: Limits on authorized use<br />
			Permit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after:
			<ol class="lst-lwr-alph"><li>verification of the implementation of controls on the external system as specified in the organization’s security and privacy policies and security and privacy plans</li>
				<li>retention of approved system connection or processing agreements with the organizational entity hosting the external system</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>20(02)</td>
			<td>Use of external systems</td>
			<td>Use of external systems: Portable storage devices - restricted use<br />
			Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems using [Assignment: organization-defined restrictions].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>20(03)</td>
			<td>Use of external systems</td>
			<td>Use of external systems: Non-organizationally owned systems - restricted use<br />
			Restrict the use of non-organizationally owned systems or system components to process, store, or transmit organizational information using [Assignment: organization-defined restrictions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>20(04)</td>
			<td>Use of external systems</td>
			<td>Use of external systems: Network accessible storage devices - restricted use<br />
			Prohibit the use of [Assignment: organization-defined network accessible storage devices] in external systems.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>20(05)</td>
			<td>Use of external systems</td>
			<td>Use of external information systems: Portable storage devices - prohibited use<br />
			Prohibit the use of organization-controlled portable storage devices by authorized individuals on external systems.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>21</td>
			<td>Information sharing</td>
			<td>
			<ol class="lst-upr-alph"><li>Enable authorized users to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for [Assignment: organization-defined information sharing circumstances where user discretion is required].</li>
				<li>Employ [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing and collaboration decisions.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>21(01)</td>
			<td>Information sharing</td>
			<td>Information sharing: Automated decision support<br />
			Employ [Assignment: organization-defined automated mechanisms] to enforce information-sharing decisions by authorized users based on access authorizations of sharing partners and access restrictions on information to be shared.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>21(02)</td>
			<td>Information sharing</td>
			<td>Information sharing: Information search and retrieval<br />
			Implement information search and retrieval services that enforce [Assignment: organization-defined information sharing restrictions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>21(400)</td>
			<td>Information sharing</td>
			<td>Information sharing: Information sharing agreement<br />
			Ensure through written agreements the appropriate safeguarding of sensitive information shared with external public-sector entities and organizations.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td><abbr title="Government of Canada">GC</abbr> specific</td>
		</tr><tr><td>AC</td>
			<td>21(401)</td>
			<td>Information sharing</td>
			<td>Information sharing: Information sharing arrangement<br />
			Ensure through written arrangements the appropriate safeguarding of sensitive information shared between and within federal institutions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td><abbr title="Government of Canada">GC</abbr> specific</td>
		</tr><tr><td>AC</td>
			<td>22</td>
			<td>Publicly accessible content</td>
			<td>
			<ol class="lst-upr-alph"><li>Designate individuals authorized to make information publicly accessible;</li>
				<li>Train authorized individuals to ensure that publicly accessible information does not contain non-public information;</li>
				<li>Review the proposed content of information prior to posting onto the publicly accessible system to ensure that non-public information is not included.</li>
				<li>Review the content on the publicly accessible system for non-public information [Assignment: organization-defined frequency] and remove such information, if discovered.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>23</td>
			<td>Data mining protection</td>
			<td>Employ [Assignment: organization-defined data mining prevention and detection techniques] for [Assignment: organization-defined data storage objects] to detect and protect against unauthorized data mining.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>24</td>
			<td>Access control decisions</td>
			<td>[Selection: Establish procedures; Implement mechanisms] to ensure [Assignment: organization-defined access control decisions] are applied to each access request prior to access enforcement.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>24(01)</td>
			<td>Access control decisions</td>
			<td>Access control decisions: Transmit access authorization information<br />
			Transmit [Assignment: organization-defined access authorization information] using [Assignment: organization-defined controls] to [Assignment: organization-defined systems] that enforce access control decisions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>24(02)</td>
			<td>Access control decisions</td>
			<td>Access control decisions: No user or process identity<br />
			Enforce access control decisions based on [Assignment: organization-defined security or privacy attributes] that do not include the identity of the user or process acting on behalf of the user.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AC</td>
			<td>25</td>
			<td>Reference monitor</td>
			<td>Implement a reference monitor for [Assignment: organization-defined access control policies] that is tamperproof, always invoked, and small enough to be subject to analysis and testing, the completeness of which can be assured.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.2">Table 4.2: Awareness and training</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>AT</td>
			<td>01</td>
			<td>Awareness and training policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] awareness and training policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, jurisprudence, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the awareness and training policy and the associated awareness and training controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the awareness and training policy and procedures.</li>
				<li>Review and update the current awareness and training:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>02</td>
			<td>Literacy training and awareness</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide security and privacy literacy training to system users (including managers, senior executives, and contractors):
				<ol><li>as part of initial training for new users and [Assignment: organization-defined frequency] thereafter</li>
					<li>when required by system changes or following [Assignment: organization-defined events]</li>
				</ol></li>
				<li>Employ the following techniques to increase the security and privacy awareness of system users [Assignment: organization-defined awareness techniques].</li>
				<li>Update literacy training and awareness content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].</li>
				<li>Incorporate lessons learned from internal or external security incidents or breaches into literacy training and awareness techniques.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>02(01)</td>
			<td>Literacy training and awareness</td>
			<td>Literacy training and awareness: Practical exercises<br />
			Provide practical exercises in literacy training that simulate events and incidents.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>02(02)</td>
			<td>Literacy training and awareness</td>
			<td>Literacy training and awareness: Insider threat<br />
			Provide literacy training on recognizing and reporting potential indicators of insider threat.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>02(03)</td>
			<td>Literacy training and awareness</td>
			<td>Literacy training and awareness: Social engineering and mining<br />
			Provide literacy training on recognizing and reporting potential and actual instances of social engineering and social mining.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>02(04)</td>
			<td>Literacy training and awareness</td>
			<td>Literacy training and awareness: Suspicious communications and anomalous system behaviour<br />
			Provide literacy training on recognizing suspicious communications and anomalous behaviour in organizational systems using [Assignment: organization-defined indicators of malicious code].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>02(05)</td>
			<td>Literacy training and awareness</td>
			<td>Literacy training and awareness: Advanced persistent threat<br />
			Provide literacy training on the advanced persistent threat.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>02(06)</td>
			<td>Literacy training and awareness</td>
			<td>Literacy training and awareness: Cyber threat environment
			<ol class="lst-lwr-alph"><li>Provide literacy training on the cyber threat environment.</li>
				<li>Reflect current cyber threat information in system operations.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>03</td>
			<td>Role-based training</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide role-based security and privacy training to personnel with the following roles and responsibilities: [Assignment: organization-defined roles and responsibilities]:
				<ol><li>before authorizing access to the system, information, or performing assigned duties, and [Assignment: organization-defined frequency] thereafter</li>
					<li>when required by system changes</li>
				</ol></li>
				<li>Update role-based training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].</li>
				<li>Incorporate lessons learned from internal or external security incidents or breaches into role-based training.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>03(01)</td>
			<td>Role-based training</td>
			<td>Role-based training: Environmental controls<br />
			Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of environmental controls.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>03(02)</td>
			<td>Role-based training</td>
			<td>Role-based training: Physical security controls<br />
			Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of physical security controls.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>03(03)</td>
			<td>Role-based training</td>
			<td>Role-based training: Practical exercises<br />
			Provide practical exercises in security and privacy training that reinforce training objectives.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>03(04)</td>
			<td>Role-based training</td>
			<td>Role-based training: Suspicious communications and anomalous system behaviour<br />
			Withdrawn: Moved to AT-02(04).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>03(05)</td>
			<td>Role-based training</td>
			<td>Role-based training: Handling personal information<br />
			Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of personal information handling and transparency controls.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>04</td>
			<td>Training records</td>
			<td>
			<ol class="lst-upr-alph"><li>Document and monitor information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training.</li>
				<li>Retain individual training records for [Assignment: organization-defined time period].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>05</td>
			<td>Contacts with security groups and associations</td>
			<td>Withdrawn: Incorporated into PM-15.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AT</td>
			<td>06</td>
			<td>Training feedback</td>
			<td>Provide feedback on organizational training results to the following personnel [Assignment: organization-defined frequency]: [Assignment: organization-defined personnel].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.3">Table 4.3: Audit and accountability</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>AU</td>
			<td>01</td>
			<td>Audit and accountability policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] audit and accountability policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the audit and accountability policy and the associated audit and accountability controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the audit and accountability policy and procedures.</li>
				<li>Review and update the current audit and accountability:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>02</td>
			<td>Event logging</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: organization-defined event types that the system is capable of logging].</li>
				<li>Coordinate the event logging function with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged.</li>
				<li>Specify the following event types for logging within the system: [Assignment: organization-defined event types (subset of the event types defined in AU-02A.) along with the frequency of (or situation requiring) logging for each identified event type].</li>
				<li>Provide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents.</li>
				<li>Review and update the event types selected for logging [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>02(01)</td>
			<td>Event logging</td>
			<td>Event logging: Compilation of audit records from multiple sources<br />
			Withdrawn: Incorporated into AU-12.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>02(02)</td>
			<td>Event logging</td>
			<td>Event logging: Selection of audit events by component<br />
			Withdrawn: Incorporated into AU-12.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>02(03)</td>
			<td>Event logging</td>
			<td>Event logging: Reviews and updates<br />
			Withdrawn: Incorporated into AU-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>02(04)</td>
			<td>Event logging</td>
			<td>Event logging: Privileged functions<br />
			Withdrawn: Incorporated into AC-06(09).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>03</td>
			<td>Content of audit records</td>
			<td>Ensure that audit records contain information that establishes the following:
			<ol class="lst-upr-alph"><li>what type of event occurred</li>
				<li>when the event occurred</li>
				<li>where the event occurred</li>
				<li>source of the event</li>
				<li>outcome of the event</li>
				<li>identity of any individuals, subjects, objects or entities associated with the event</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>03(01)</td>
			<td>Content of audit records</td>
			<td>Content of audit records: Additional audit information<br />
			Generate audit records containing the following additional information: [Assignment: organization-defined additional information].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>03(02)</td>
			<td>Content of audit records</td>
			<td>Content of audit records: Centralized management of planned audit record content<br />
			Withdrawn: Incorporated into PL-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>03(03)</td>
			<td>Content of audit records</td>
			<td>Content of audit records: Limit personal information elements<br />
			Limit personal information contained in audit records to the following elements identified in the privacy impact assessment: [Assignment: organization-defined elements].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>04</td>
			<td>Audit log storage capacity</td>
			<td>Allocate audit log storage capacity to accommodate [Assignment: organization-defined audit log retention requirements].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>04(01)</td>
			<td>Audit log storage capacity</td>
			<td>Audit log storage capacity: Transfer to alternate storage<br />
			Transfer audit logs [Assignment: organization-defined frequency] to a different system, system component, or media other than the system or system component conducting the logging.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>05</td>
			<td>Response to audit logging process failures</td>
			<td>
			<ol class="lst-upr-alph"><li>Alert [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] in the event of an audit logging process failure.</li>
				<li>Take the following additional actions: [Assignment: organization-defined additional actions].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>05(01)</td>
			<td>Response to audit logging process failures</td>
			<td>Response to audit logging process failures: Storage capacity warning<br />
			Provide a warning to [Assignment: organization-defined personnel, roles, and/or locations] within [Assignment: organization-defined time period] when allocated audit log storage volume reaches [Assignment: organization-defined percentage] of repository maximum audit log storage capacity.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>05(02)</td>
			<td>Response to audit logging process failures</td>
			<td>Response to audit logging process failures: Real-time alerts<br />
			Provide an alert within [Assignment: organization-defined real-time period] to [Assignment: organization-defined personnel, roles, and/or locations] when the following audit failure events occur: [Assignment: organization-defined audit logging failure events requiring real-time alerts].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>05(03)</td>
			<td>Response to audit logging process failures</td>
			<td>Response to audit logging process failures: Configurable traffic volume thresholds<br />
			Enforce configurable network communications traffic volume thresholds reflecting limits on audit log storage capacity and [Selection: reject; delay] network traffic above those thresholds.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>05(04)</td>
			<td>Response to audit logging process failures</td>
			<td>Response to audit logging process failures: Shutdown on failure<br />
			Invoke a [Selection (one): full system shutdown; partial system shutdown; degraded operational mode with limited mission or business functionality available] in the event of [Assignment: organization-defined audit logging failures], unless an alternate audit logging capability exists.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>05(05)</td>
			<td>Response to audit logging process failures</td>
			<td>Response to audit logging process failures: Alternate audit logging capability<br />
			Provide an alternate audit logging capability in the event of a failure in primary audit logging capability that implements [Assignment: organization-defined alternate audit logging functionality].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>
			<ol class="lst-upr-alph"><li>Review and analyze system audit records [Assignment: organization-defined frequency] for indications of [Assignment: organization-defined inappropriate or unusual activity] and the potential impact of the inappropriate or unusual activity;</li>
				<li>Report findings to [Assignment: organization-defined personnel or roles].</li>
				<li>Adjust the level of audit record review, analysis, and reporting within the system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(01)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Automated process integration<br />
			Integrate audit record review, analysis, and reporting processes using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(02)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Automated security alerts<br />
			Withdrawn: Incorporated into SI-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(03)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Correlate audit record repositories<br />
			Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(04)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Central review and analysis<br />
			Provide and implement the capability to centrally review and analyze audit records from multiple components within the system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(05)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Integrated analysis of audit records<br />
			Integrate analysis of audit records with analysis of [Selection (one or more): vulnerability scanning information; performance data; system monitoring information; [Assignment: organization-defined data/information collected from other sources]] to further enhance the ability to identify inappropriate or unusual activity.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(06)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Correlation with physical monitoring<br />
			Correlate information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(07)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Permitted actions<br />
			Specify the permitted actions for each [Selection (one or more): system process; role; user] associated with the review, analysis, and reporting of audit record information.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(08)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Full text analysis of privileged commands<br />
			Perform a full text analysis of logged privileged commands in a physically distinct component or subsystem of the system, or other system that is dedicated to that analysis.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(09)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Correlation with information from nontechnical sources<br />
			Correlate information from nontechnical sources with audit record information to enhance organization-wide situational awareness.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>06(10)</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>Audit record review, analysis, and reporting: Audit level adjustment<br />
			Withdrawn: Incorporated into AU-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>07</td>
			<td>Audit record reduction and report generation</td>
			<td>Provide and implement an audit record reduction and report generation capability that:
			<ol class="lst-upr-alph"><li>supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents</li>
				<li>does not alter the original content or time ordering of audit records</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>07(01)</td>
			<td>Audit record reduction and report generation</td>
			<td>Audit record reduction and report generation: Automatic processing<br />
			Provide and implement the capability to process, sort, and search audit records for events of interest based on the following content: [Assignment: organization-defined fields within audit records].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>07(02)</td>
			<td>Audit record reduction and report generation</td>
			<td>Audit record reduction and report generation: Automatic sort and search<br />
			Withdrawn: Incorporated into AU-07(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>08</td>
			<td>Time stamps</td>
			<td>
			<ol class="lst-upr-alph"><li>Use internal system clocks to generate time stamps for audit records.</li>
				<li>Record time stamps for audit records that meet [Assignment: organization-defined granularity of time measurement] and that use Coordinated Universal Time (UTC), have a fixed local time offset from Coordinated Universal Time, or that include the local time offset as part of the time stamp.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>08(01)</td>
			<td>Time stamps</td>
			<td>Time stamps: Synchronization with authoritative time source<br />
			Withdrawn: Moved to SC-45(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>08(02)</td>
			<td>Time stamps</td>
			<td>Time stamps: Secondary authoritative time source<br />
			Withdrawn: Moved to SC-45(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09</td>
			<td>Protection of audit information</td>
			<td>
			<ol class="lst-upr-alph"><li>Protect audit information and audit logging tools from unauthorized access, modification, and deletion.</li>
				<li>Alert [Assignment: organization-defined personnel or roles] upon detection of unauthorized access, modification, or deletion of audit information.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09(01)</td>
			<td>Protection of audit information</td>
			<td>Protection of audit information: Hardware write-once media<br />
			Write audit trails to hardware-enforced, write-once media.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09(02)</td>
			<td>Protection of audit information</td>
			<td>Protection of audit information: Store on separate physical systems or components<br />
			Store audit records [Assignment: organization-defined frequency] in a repository that is part of a physically different system or system component than the system or component being audited.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09(03)</td>
			<td>Protection of audit information</td>
			<td>Protection of audit information: Cryptographic protection<br />
			Implement cryptographic mechanisms to protect the integrity of audit information and audit tools.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09(04)</td>
			<td>Protection of audit information</td>
			<td>Protection of audit information: Access by subset of privileged users<br />
			Authorize access to management of audit logging functionality to only [Assignment: organization-defined subset of privileged users or roles].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09(05)</td>
			<td>Protection of audit information</td>
			<td>Protection of audit information: Dual authorization<br />
			Enforce dual authorization for [Selection (one or more): movement; deletion] of [Assignment: organization-defined audit information].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09(06)</td>
			<td>Protection of audit information</td>
			<td>Protection of audit information: Read-only access<br />
			Authorize read-only access to audit information to [Assignment: organization-defined subset of privileged users or roles].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>09(07)</td>
			<td>Protection of audit information</td>
			<td>Protection of audit information: Store on component with different operating system<br />
			Store audit information on a component running a different operating system than the system or component being audited.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>10</td>
			<td>Non-repudiation</td>
			<td>Provide irrefutable evidence that an individual (or process acting on behalf of an individual) has performed [Assignment: organization-defined actions to be covered by non-repudiation].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>10(01)</td>
			<td>Non-repudiation</td>
			<td>Non-repudiation: Association of identities
			<ol class="lst-lwr-alph"><li>Bind the identity of the information producer with the information to [Assignment: organization-defined strength of binding].</li>
				<li>Provide the means for authorized individuals to determine the identity of the producer of the information.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>10(02)</td>
			<td>Non-repudiation</td>
			<td>Non-repudiation: Validate binding of information producer identity
			<ol class="lst-lwr-alph"><li>Validate the binding of the information producer identity to the information at [Assignment: organization-defined frequency].</li>
				<li>Perform [Assignment: organization-defined actions] in the event of a validation error.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>10(03)</td>
			<td>Non-repudiation</td>
			<td>Non-repudiation: Chain of custody<br />
			Maintain reviewer or releaser credentials within the established chain of custody for information reviewed or released.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>10(04)</td>
			<td>Non-repudiation</td>
			<td>Non-repudiation: Validate binding of information reviewer identity
			<ol class="lst-lwr-alph"><li>Validate the binding of the information reviewer identity to the information at the transfer or release points prior to release or transfer between [Assignment: organization-defined security domains].</li>
				<li>Perform [Assignment: organization-defined actions] in the event of a validation error.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>10(05)</td>
			<td>Non-repudiation</td>
			<td>Non-repudiation: Digital signatures<br />
			Withdrawn: Incorporated into SI-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>11</td>
			<td>Audit record retention</td>
			<td>Retain audit records for [Assignment: organization-defined time period consistent with records retention policy] to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>11(01)</td>
			<td>Audit record retention</td>
			<td>Audit record retention: Long-term retrieval capability<br />
			Employ [Assignment: organization-defined measures] to ensure that long-term audit records generated by the system can be retrieved.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>12</td>
			<td>Audit record generation</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-02A on [Assignment: organization-defined system components].</li>
				<li>Allow [Assignment: organization-defined personnel or roles] to select the event types that are to be logged by specific components of the system.</li>
				<li>Generate audit records for the event types defined in AU-02C that include the audit record content defined in AU-03.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>12(01)</td>
			<td>Audit record generation</td>
			<td>Audit record generation: System-wide and time-correlated audit trail<br />
			Compile audit records from [Assignment: organization-defined system components] into a system-wide (logical or physical) audit trail that is time-correlated to within [Assignment: organization-defined level of tolerance for the relationship between time stamps of individual records in the audit trail].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>12(02)</td>
			<td>Audit record generation</td>
			<td>Audit record generation: Standardized formats<br />
			Produce a system-wide (logical or physical) audit trail composed of audit records in a standardized format.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>12(03)</td>
			<td>Audit record generation</td>
			<td>Audit record generation: Changes by authorized individuals<br />
			Provide and implement the capability for [Assignment: organization-defined individuals or roles] to change the logging to be performed on [Assignment: organization-defined system components] based on [Assignment: organization-defined selectable event criteria] within [Assignment: organization-defined time thresholds].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>12(04)</td>
			<td>Audit record generation</td>
			<td>Audit record generation: Query parameter audits of personal information<br />
			Provide and implement the capability for auditing the parameters of user query events for data sets containing personal information.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>13</td>
			<td>Monitoring for information disclosure</td>
			<td>
			<ol class="lst-upr-alph"><li>Monitor [Assignment: organization-defined open-source information and/or information sites] [Assignment: organization-defined frequency] for evidence of unauthorized disclosure of organizational information.</li>
				<li>If an information disclosure is discovered:
				<ol><li>notify [Assignment: organization-defined personnel or roles]</li>
					<li>take the following additional actions: [Assignment: organization-defined additional actions]</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>13(01)</td>
			<td>Monitoring for information disclosure</td>
			<td>Monitoring for information disclosure: Use of automated tools<br />
			Monitor open-source information and information sites using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>13(02)</td>
			<td>Monitoring for information disclosure</td>
			<td>Monitoring for information disclosure: Review of monitored sites<br />
			Review the list of open-source information sites being monitored [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>13(03)</td>
			<td>Monitoring for information disclosure</td>
			<td>Monitoring for information disclosure: Unauthorized replication of information<br />
			Employ discovery techniques, processes, and tools to determine if external entities are replicating organizational information in an unauthorized manner.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>14</td>
			<td>Session audit</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide and implement the capability for [Assignment: organization-defined users or roles] to [Selection (one or more): record; view; hear; log] the content of a user session under [Assignment: organization-defined circumstances].</li>
				<li>Develop, integrate, and use session auditing activities in consultation with legal counsel and in accordance with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>14(01)</td>
			<td>Session audit</td>
			<td>Session audit: System start-up Initiate session audits automatically at system start-up.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>14(02)</td>
			<td>Session audit</td>
			<td>Session audit: Capture/record and log content<br />
			Withdrawn: Incorporated into AU-14.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>14(03)</td>
			<td>Session audit</td>
			<td>Session audit: Remote viewing and listening<br />
			Provide and implement the capability for authorized users to remotely view and hear content related to an established user session in real time.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>15</td>
			<td>Alternate audit capability</td>
			<td>Withdrawn: Moved to AU-05(05).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>16</td>
			<td>Cross-organizational audit logging</td>
			<td>Employ [Assignment: organization-defined methods] for coordinating [Assignment: organization-defined audit information] among external organizations when audit information is transmitted across organizational boundaries.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>16(01)</td>
			<td>Cross-organizational audit logging</td>
			<td>Cross-organizational audit logging: Identity preservation<br />
			Preserve the identity of individuals in cross-organizational audit trails.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>16(02)</td>
			<td>Cross-organizational audit logging</td>
			<td>Cross-organizational audit logging: Sharing of audit information<br />
			Provide cross-organizational audit information to [Assignment: organization-defined organizations] based on [Assignment: organization-defined cross-organizational sharing agreements].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>AU</td>
			<td>16(03)</td>
			<td>Cross-organizational audit logging</td>
			<td>Cross-organizational audit logging: Disassociability<br />
			Implement [Assignment: organization-defined measures] to disassociate individuals from audit information transmitted across organizational boundaries.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.4">Table 4.4: Assessment, authorization, and monitoring</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>CA</td>
			<td>01</td>
			<td>Assessment, authorization, and monitoring policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] assessment, authorization, and monitoring policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, jurisprudence, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and the associated assessment, authorization, and monitoring controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures.</li>
				<li>Review and update the current assessment, authorization, and monitoring:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>02</td>
			<td>Control assessments</td>
			<td>
			<ol class="lst-upr-alph"><li>Select the appropriate assessor or assessment team for the type of assessment to be conducted.</li>
				<li>Develop a control assessment plan that describes the scope of the assessment including:
				<ol><li>controls and control enhancements under assessment</li>
					<li>assessment procedures to be used to determine control effectiveness</li>
					<li>assessment environment, assessment team, and assessment roles and responsibilities</li>
				</ol></li>
				<li>Ensure the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment.</li>
				<li>Assess the controls in the system and its environment of operation [Assignment: organization-defined frequency] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security and privacy requirements.</li>
				<li>Produce a control assessment report, Privacy Impact Assessment or Privacy Protocol that documents the results of the assessment.</li>
				<li>Provide the results of the control assessment to [Assignment: organization-defined individuals or roles].</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>02(01)</td>
			<td>Control assessments</td>
			<td>Control assessments: Independent assessors<br />
			Employ independent assessors or assessment teams to conduct control assessments.</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>02(02)</td>
			<td>Control assessments</td>
			<td>Control assessments: Specialized assessments<br />
			Include as part of control assessments, [Assignment: organization-defined frequency], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; security instrumentation; automated security test cases; vulnerability scanning; malicious user testing; insider threat assessment; performance and load testing; data leakage or data loss assessment; [Assignment: organization-defined other forms of assessment]].</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>02(03)</td>
			<td>Control assessments</td>
			<td>Control assessments: Leveraging results from external organizations<br />
			Leverage the results of control assessments performed by [Assignment: organization-defined external organization(s)] on [Assignment: organization-defined system] when the assessment meets [Assignment: organization-defined requirements].</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03</td>
			<td>Information exchange</td>
			<td>
			<ol class="lst-upr-alph"><li>Approve and manage the exchange of information between the system and other systems using [Selection (one or more): interconnection security agreements; information exchange security agreements; memoranda of understanding or agreement; information sharing agreements; information sharing arrangements; service level agreements; user agreements; nondisclosure agreements; [Assignment: organization-defined type of agreement]].</li>
				<li>Document, as part of each exchange agreement, the interface characteristics, security and privacy requirements, controls, and responsibilities for each system, and the impact level of the information communicated.</li>
				<li>Review and update the agreements [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03(01)</td>
			<td>Information exchange</td>
			<td>Information exchange: Unclassified national security system connections<br />
			Withdrawn: Moved to SC-07(25).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03(02)</td>
			<td>Information exchange</td>
			<td>Information exchange: Classified national security system connections<br />
			Withdrawn: Moved to SC-07(26).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03(03)</td>
			<td>Information exchange</td>
			<td>Information exchange: Unclassified non-national security system connections<br />
			Withdrawn: Moved to SC-07(27).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03(04)</td>
			<td>Information exchange</td>
			<td>Information exchange: Connections to public networks<br />
			Withdrawn: Moved to SC-07(28).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03(05)</td>
			<td>Information exchange</td>
			<td>Information exchange: Restrictions on external system connections<br />
			Withdrawn: Moved to SC-07(05).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03(06)</td>
			<td>Information exchange</td>
			<td>Information exchange: Transfer authorizations<br />
			Verify that individuals or systems transferring data between interconnecting systems have the requisite authorizations (i.e., write permissions or privileges) prior to accepting such data.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>03(07)</td>
			<td>Information exchange</td>
			<td>Information exchange: Transitive information exchanges
			<ol class="lst-lwr-alph"><li>Identify transitive (downstream) information exchanges with other systems through the systems identified in CA-03A.</li>
				<li>Take measures to ensure that transitive (downstream) information exchanges cease when the controls on identified transitive (downstream) systems cannot be verified or validated.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>04</td>
			<td>Security certification</td>
			<td>Withdrawn: Incorporated into CA-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>05</td>
			<td>Plan of action and milestones</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop a plan of action and milestones for the system to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system.</li>
				<li>Update existing plan of action and milestones [Assignment: organization-defined frequency] based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>05(01)</td>
			<td>Plan of action and milestones</td>
			<td>Plan of action and milestones: Automation support for accuracy and currency<br />
			Ensure the accuracy, currency, and availability of the plan of action and milestones for the system using [Assignment: organization-defined automated mechanisms].</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>06</td>
			<td>Authorization</td>
			<td>
			<ol class="lst-upr-alph"><li>Assign a senior official as the authorizing official or custodian for the system.</li>
				<li>Assign a senior official as the authorizing official or custodian for common controls available for inheritance by organizational systems.</li>
				<li>Ensure that the authorizing official or custodian for the system, before commencing operations:
				<ol><li>accepts the use of common controls inherited by the system</li>
					<li>authorizes the system to operate</li>
				</ol></li>
				<li>Ensure that the authorizing official or custodian for common controls authorizes the use of those controls for inheritance by organizational systems.</li>
				<li>Update the authorizations [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>06(01)</td>
			<td>Authorization</td>
			<td>Authorization: joint authorization — Intra-organization<br />
			Employ a joint authorization process for the system that includes multiple authorizing officials from the same organization conducting the authorization.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>06(02)</td>
			<td>Authorization</td>
			<td>Authorization: joint authorization — Inter-organization<br />
			Employ a joint authorization process for the system that includes multiple authorizing officials with at least one authorizing official from an organization external to the organization conducting the authorization.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>07</td>
			<td>Continuous monitoring</td>
			<td>Develop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes:
			<ol class="lst-upr-alph"><li>establishing the following system-level metrics to be monitored: [Assignment: organization-defined system-level metrics]</li>
				<li>establishing [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessment of control effectiveness</li>
				<li>ongoing control assessments in accordance with the continuous monitoring strategy</li>
				<li>ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy</li>
				<li>correlation and analysis of information generated by control assessments and monitoring</li>
				<li>response actions to address results of the analysis of control assessment and monitoring information</li>
				<li>reporting the security and privacy status of the system to [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency]</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>07(01)</td>
			<td>Continuous monitoring</td>
			<td>Continuous monitoring: Independent assessment<br />
			Employ independent assessors or assessment teams to monitor the controls in the system on an ongoing basis.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>07(02)</td>
			<td>Continuous monitoring</td>
			<td>Continuous monitoring: Types of assessments<br />
			Withdrawn: Incorporated into CA-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>07(03)</td>
			<td>Continuous monitoring</td>
			<td>Continuous monitoring: Trend analyses<br />
			Employ trend analyses to determine if control implementations, the frequency of continuous monitoring activities, and the types of activities used in the continuous monitoring process need to be modified based on empirical data.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>07(04)</td>
			<td>Continuous monitoring</td>
			<td>Continuous monitoring: Risk monitoring<br />
			Ensure risk monitoring is an integral part of the continuous monitoring strategy that includes the following:
			<ol class="lst-lwr-alph"><li>effectiveness monitoring</li>
				<li>compliance monitoring</li>
				<li>change monitoring</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>07(05)</td>
			<td>Continuous monitoring</td>
			<td>Continuous monitoring: Consistency analysis<br />
			Employ the following actions to validate that policies are established and implemented controls are operating in a consistent manner: [Assignment: organization-defined actions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>07(06)</td>
			<td>Continuous monitoring</td>
			<td>Continuous monitoring: Automation support for monitoring<br />
			Ensure the accuracy, currency, and availability of monitoring results for the system using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>08</td>
			<td>Penetration testing</td>
			<td>Conduct penetration testing [Assignment: organization-defined frequency] on [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>08(01)</td>
			<td>Penetration testing</td>
			<td>Penetration testing: Independent penetration testing agent or team<br />
			Employ an independent penetration testing agent or team to perform penetration testing on the system or system components.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>08(02)</td>
			<td>Penetration testing</td>
			<td>Penetration testing: Red team exercises<br />
			Employ the following red-team exercises to simulate attempts by adversaries to compromise organizational systems in accordance with applicable rules of engagement: [Assignment: organization-defined red team exercises].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>08(03)</td>
			<td>Penetration testing</td>
			<td>Penetration testing: Facility penetration testing<br />
			Employ a penetration testing process that includes [Assignment: organization-defined frequency] [Selection (one or more): announced; unannounced] attempts to bypass or circumvent controls associated with physical access points to the facility.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>09</td>
			<td>Internal system connections</td>
			<td>
			<ol class="lst-upr-alph"><li>Authorize internal connections of [Assignment: organization-defined system components or classes of components] to the system.</li>
				<li>Document, for each internal connection, the interface characteristics, security and privacy requirements, and the nature of the information communicated.</li>
				<li>Terminate internal system connections after [Assignment: organization-defined conditions].</li>
				<li>Review [Assignment: organization-defined frequency] the continued need for each internal connection.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CA</td>
			<td>09(01)</td>
			<td>Internal system connections</td>
			<td>Internal system connections: Compliance checks<br />
			Perform security and privacy compliance checks on constituent system components prior to the establishment of the internal connection.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.5">Table 4.5: Configuration management</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>CM</td>
			<td>01</td>
			<td>Configuration management policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] configuration management policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the configuration management policy and the associated configuration management controls.</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the configuration management policy and procedures.</li>
				<li>Review and update the current configuration management:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02</td>
			<td>Baseline configuration</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and maintain under configuration control, a current baseline configuration of the system.</li>
				<li>Review and update the baseline configuration of the system:
				<ol><li>[Assignment: organization-defined frequency]</li>
					<li>when required due to [Assignment: organization-defined circumstances]</li>
					<li>when system components are installed or upgraded</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02(01)</td>
			<td>Baseline configuration</td>
			<td>Baseline configuration: Reviews and updates<br />
			Withdrawn: Incorporated into CM-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02(02)</td>
			<td>Baseline configuration</td>
			<td>Baseline configuration: Automation support for accuracy and currency<br />
			Maintain the currency, completeness, accuracy, and availability of the baseline configuration of the system using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02(03)</td>
			<td>Baseline configuration</td>
			<td>Baseline configuration: Retention of previous configurations<br />
			Retain [Assignment: organization-defined number] of previous versions of baseline configurations of the system to support rollback.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02(04)</td>
			<td>Baseline configuration</td>
			<td>Baseline configuration: Unauthorized software<br />
			Withdrawn: Incorporated into CM-07(04).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02(05)</td>
			<td>Baseline configuration</td>
			<td>Baseline configuration: Authorized software<br />
			Withdrawn: Incorporated into CM-07(05).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02(06)</td>
			<td>Baseline configuration</td>
			<td>Baseline configuration: Development and test environments<br />
			Maintain a baseline configuration for system development and test environments that is managed separately from the operational baseline configuration.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>02(07)</td>
			<td>Baseline configuration</td>
			<td>Baseline configuration: Configure systems and components for high-risk areas
			<ol class="lst-lwr-alph"><li>Issue [Assignment: organization-defined systems or system components] with [Assignment: organization-defined configurations] to individuals traveling to locations that the organization deems to be of significant risk.</li>
				<li>Apply the following controls to the systems or components when the individuals return from travel: [Assignment: organization-defined controls].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03</td>
			<td>Configuration change control</td>
			<td>
			<ol class="lst-upr-alph"><li>Determine and document the types of changes to the system that are configuration-controlled.</li>
				<li>Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses.</li>
				<li>Document configuration change decisions associated with the system.</li>
				<li>Implement approved configuration-controlled changes to the system.</li>
				<li>Retain records of configuration-controlled changes to the system for [Assignment: organization-defined time period].</li>
				<li>Monitor and review activities associated with configuration-controlled changes to the system.</li>
				<li>Coordinate and provide oversight for configuration change control activities through [Assignment: organization-defined configuration change control element] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; when [Assignment: organization-defined configuration change conditions]].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(01)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Automated documentation, notification, and prohibition of changes<br />
			Use [Assignment: organization-defined automated mechanisms] to:
			<ol class="lst-lwr-alph"><li>document proposed changes to the system</li>
				<li>notify [Assignment: organization-defined approval authorities] of proposed changes to the system and request change approval</li>
				<li>highlight proposed changes to the system that have not been approved or disapproved within [Assignment: organization-defined time period]</li>
				<li>prohibit changes to the system until designated approvals are received</li>
				<li>document all changes to the system</li>
				<li>notify [Assignment: organization-defined personnel] when approved changes to the system are completed</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(02)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Testing, validation, and documentation of changes<br />
			Test, validate, and document changes to the system before finalizing the implementation of the changes.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(03)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Automated change implementation<br />
			Implement changes to the current system baseline and deploy the updated baseline across the installed base using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(04)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Security and privacy representatives<br />
			Require [Assignment: organization-defined security and privacy representatives] to be members of the [Assignment: organization-defined configuration change control element].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(05)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Automated security response<br />
			Implement the following security responses automatically if baseline configurations are changed in an unauthorized manner: [Assignment: organization-defined security responses].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(06)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Cryptography management<br />
			Ensure that cryptographic mechanisms used to provide the following controls are under configuration management: [Assignment: organization-defined controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(07)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Review system changes<br />
			Review changes to the system [Assignment: organization-defined frequency] or when [Assignment: organization-defined circumstances] to determine whether unauthorized changes have occurred.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>03(08)</td>
			<td>Configuration change control</td>
			<td>Configuration change control: Prevent or restrict configuration changes<br />
			Prevent or restrict changes to the configuration of the system under the following circumstances: [Assignment: organization-defined circumstances].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>04</td>
			<td>Impact analyses</td>
			<td>Analyze changes to the system to determine potential security and privacy impacts prior to change implementation.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>04(01)</td>
			<td>Impact analyses</td>
			<td>Impact analyses: Separate test environments<br />
			Analyze changes to the system in a separate test environment before implementation in an operational environment, looking for security and privacy impacts due to flaws, weaknesses, incompatibility, or intentional malice.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>04(02)</td>
			<td>Impact analyses</td>
			<td>Impact analyses: Verification of controls<br />
			After system changes, verify that the impacted controls are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security and privacy requirements for the system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05</td>
			<td>Access restrictions for change</td>
			<td>Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05(01)</td>
			<td>Access restrictions for change</td>
			<td>Access restrictions for change: Automated access enforcement and audit records
			<ol class="lst-lwr-alph"><li>Enforce access restrictions using [Assignment: organization-defined automated mechanisms].</li>
				<li>Automatically generate audit records of the enforcement actions.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05(02)</td>
			<td>Access restrictions for change</td>
			<td>Access restrictions for change: Review system changes<br />
			Withdrawn: Incorporated into CM-03(07).</td>
			<td>Control</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05(03)</td>
			<td>Access restrictions for change</td>
			<td>Access restrictions for change: Signed components<br />
			Withdrawn: Moved to CM-14.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05(04)</td>
			<td>Access restrictions for change</td>
			<td>Access restrictions for change: Dual authorization<br />
			Enforce dual authorization for implementing changes to [Assignment: organization-defined system components and system-level information].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05(05)</td>
			<td>Access restrictions for change</td>
			<td>Access restrictions for change: Privilege limitation for production and operation
			<ol class="lst-lwr-alph"><li>Limit privileges to change system components and system-related information within a production or operational environment.</li>
				<li>Review and re-evaluate privileges [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05(06)</td>
			<td>Access restrictions for change</td>
			<td>Access restrictions for change: Limit library privileges<br />
			Limit privileges to change software resident within software libraries.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>05(07)</td>
			<td>Access restrictions for change</td>
			<td>Access restrictions for change: Automatic implementation of security safeguards<br />
			Withdrawn: Incorporated into SI-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>06</td>
			<td>Configuration settings</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using [Assignment: organization-defined common secure configurations].</li>
				<li>Implement the configuration settings.</li>
				<li>Identify, document, and approve any deviations from established configuration settings for [Assignment: organization-defined system components] based on [Assignment: organization-defined operational requirements].</li>
				<li>Monitor and control changes to the configuration settings in accordance with organizational policies and procedures.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>06(01)</td>
			<td>Configuration settings</td>
			<td>Configuration settings: Automated management, application, and verification<br />
			Manage, apply, and verify configuration settings for [Assignment: organization-defined system components] using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>06(02)</td>
			<td>Configuration settings</td>
			<td>Configuration settings: Respond to unauthorized changes<br />
			Take the following actions in response to unauthorized changes to [Assignment: organization-defined configuration settings]: [Assignment: organization-defined actions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>06(03)</td>
			<td>Configuration settings</td>
			<td>Configuration settings: Unauthorized change detection<br />
			Withdrawn: Incorporated into SI-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>06(04)</td>
			<td>Configuration settings</td>
			<td>Configuration settings: Conformance demonstration<br />
			Withdrawn: Incorporated into CM-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07</td>
			<td>Least functionality</td>
			<td>
			<ol class="lst-upr-alph"><li>Configure the system to provide only [Assignment: organization-defined mission essential capabilities].</li>
				<li>Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(01)</td>
			<td>Least functionality</td>
			<td>Least functionality: Periodic review
			<ol class="lst-lwr-alph"><li>Review the system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure functions, ports, protocols, software, and services.</li>
				<li>Disable or remove [Assignment: organization-defined functions, ports, protocols, software, and services within the system deemed to be unnecessary and/or nonsecure].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(02)</td>
			<td>Least functionality</td>
			<td>Least functionality: Prevent program execution<br />
			Prevent program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies, rules of behavior, and/or access agreements regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(03)</td>
			<td>Least functionality</td>
			<td>Least functionality: Registration compliance<br />
			Ensure compliance with [Assignment: organization-defined registration requirements for functions, ports, protocols, and services].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(04)</td>
			<td>Least functionality</td>
			<td>Least functionality: Unauthorized software - deny-by-exception
			<ol class="lst-lwr-alph"><li>Identify [Assignment: organization-defined software programs not authorized to execute on the system].</li>
				<li>Employ an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the system.</li>
				<li>Review and update the list of unauthorized software programs [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(05)</td>
			<td>Least functionality</td>
			<td>Least functionality: Authorized software - allow-by-exception
			<ol class="lst-lwr-alph"><li>Identify [Assignment: organization-defined software programs authorized to execute on the system].</li>
				<li>Employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system.</li>
				<li>Review and update the list of authorized software programs [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(06)</td>
			<td>Least functionality</td>
			<td>Least functionality: Confined environments with limited privileges<br />
			Require that the following user-installed software execute in a confined physical or virtual machine environment with limited privileges: [Assignment: organization-defined user-installed software].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(07)</td>
			<td>Least functionality</td>
			<td>Least functionality: Code execution in protected environment<br />
			Allow execution of binary or machine-executable code only in confined physical or virtual machine environments and with the explicit approval of [Assignment: organization-defined personnel or roles] when such code is:
			<ol class="lst-lwr-alph"><li>obtained from sources with limited or no warranty</li>
				<li>without the provision of source code</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(08)</td>
			<td>Least functionality</td>
			<td>Least functionality: Binary or machine executable code
			<ol class="lst-lwr-alph"><li>Prohibit the use of binary or machine-executable code from sources with limited or no warranty or without the provision of source code.</li>
				<li>Allow exceptions only for compelling mission or operational requirements and with the approval of the authorizing official.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>07(09)</td>
			<td>Least functionality</td>
			<td>Least functionality: Prohibiting the use of unauthorized hardware
			<ol class="lst-lwr-alph"><li>Identify [Assignment: organization-defined hardware components authorized for system use].</li>
				<li>Prohibit the use or connection of unauthorized hardware components.</li>
				<li>Review and update the list of authorized hardware components [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08</td>
			<td>System component inventory</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop and document an inventory of system components that:
				<ol><li>accurately reflects the system</li>
					<li>includes all components within the system</li>
					<li>does not include duplicate accounting of components or components assigned to any other system</li>
					<li>is at the level of granularity deemed necessary for tracking and reporting</li>
					<li>includes the following information to achieve system component accountability: [Assignment: organization-defined information deemed necessary to achieve effective system component accountability]</li>
				</ol></li>
				<li>Review and update the system component inventory [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(01)</td>
			<td>System component inventory</td>
			<td>System component inventory: Updates during installations and removals<br />
			Update the inventory of system components as part of component installations, removals, and system updates.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(02)</td>
			<td>System component inventory</td>
			<td>System component inventory: Automated maintenance<br />
			Maintain the currency, completeness, accuracy, and availability of the inventory of system components using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(03)</td>
			<td>System component inventory</td>
			<td>System component inventory: Automated unauthorized component detection
			<ol class="lst-lwr-alph"><li>Detect the presence of unauthorized hardware, software, and firmware components within the system using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency].</li>
				<li>Take the following actions when unauthorized components are detected: [Selection (one or more): disable network access by such components; isolate the components; notify [Assignment: organization-defined personnel or roles]].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(04)</td>
			<td>System component inventory</td>
			<td>System component inventory: Accountability information<br />
			Include in the system component inventory information, a means for identifying by [Selection (one or more): name; position; role], individuals responsible and accountable for administering those components.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(05)</td>
			<td>System component inventory</td>
			<td>System component inventory: No duplicate accounting of components<br />
			Withdrawn: Incorporated into CM-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(06)</td>
			<td>System component inventory</td>
			<td>System component inventory: Assessed configurations and approved deviations<br />
			Include assessed component configurations and any approved deviations to current deployed configurations in the system component inventory.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(07)</td>
			<td>System component inventory</td>
			<td>System component inventory: Centralized repository<br />
			Provide a centralized repository for the inventory of system components.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(08)</td>
			<td>System component inventory</td>
			<td>System component inventory: Automated location tracking<br />
			Support the tracking of system components by geographic location using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>08(09)</td>
			<td>System component inventory</td>
			<td>System component inventory: Assignment of components to systems
			<ol class="lst-lwr-alph"><li>Assign system components to a system.</li>
				<li>Receive an acknowledgement from [Assignment: organization-defined personnel or roles] of this assignment.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>09</td>
			<td>Configuration management plan</td>
			<td>Develop, document, and implement a configuration management plan for the system that:
			<ol class="lst-upr-alph"><li>addresses roles, responsibilities, and configuration management processes and procedures</li>
				<li>establishes a process for identifying configuration items throughout the system development lifecycle and for managing the configuration of the configuration items</li>
				<li>defines the configuration items for the system and places the configuration items under configuration management</li>
				<li>is reviewed and approved by [Assignment: organization-defined personnel or roles]</li>
				<li>protects the configuration management plan from unauthorized disclosure and modification</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>09(01)</td>
			<td>Configuration management plan</td>
			<td>Configuration management plan: Assignment of responsibility<br />
			Assign responsibility for developing the configuration management process to organizational personnel that are not directly involved in system development.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>10</td>
			<td>Software usage restrictions</td>
			<td>
			<ol class="lst-upr-alph"><li>Use software and associated documentation in accordance with contract agreements and copyright laws.</li>
				<li>Track the use of software and associated documentation protected by quantity licenses to control copying and distribution.</li>
				<li>Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>10(01)</td>
			<td>Software usage restrictions</td>
			<td>Software usage restrictions: Open-source software<br />
			Establish the following restrictions on the use of open-source software: [Assignment: organization-defined restrictions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>11</td>
			<td>User-installed software</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish [Assignment: organization-defined policies] governing the installation of software by users.</li>
				<li>Enforce software installation policies through the following methods: [Assignment: organization-defined methods].</li>
				<li>Monitor policy compliance [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>11(01)</td>
			<td>User-installed software</td>
			<td>User-installed software: Alerts for unauthorized installations<br />
			Withdrawn: Incorporated into CM-08(03).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>11(02)</td>
			<td>User-installed software</td>
			<td>User-installed software: Software installation with privileged status<br />
			Allow user installation of software only with explicit privileged status.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>11(02)</td>
			<td>User-installed software</td>
			<td>User-installed software: Automated enforcement and monitoring<br />
			Enforce and monitor compliance with software installation policies using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>12</td>
			<td>Information location</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify and document the location of [Assignment: organization-defined information] and the specific system components on which the information is processed and stored.</li>
				<li>Identify and document the users who have access to the system and system components where the information is processed and stored.</li>
				<li>Document changes to the location (i.e., system or system components) where the information is processed and stored.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>12(01)</td>
			<td>Information location</td>
			<td>Information location: Automated tools to support information location<br />
			Use automated tools to identify [Assignment: organization-defined information by information type] on [Assignment: organization-defined system components] to ensure controls are in place to protect organizational information and individual privacy.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>13</td>
			<td>Data action mapping</td>
			<td>Develop and document a map of system data actions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CM</td>
			<td>14</td>
			<td>Signed components</td>
			<td>Prevent the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.6">Table 4.6: Contingency planning</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>CP</td>
			<td>01</td>
			<td>Contingency planning policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] contingency planning policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, jurisprudence, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the contingency planning policy and the associated contingency planning controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the contingency planning policy and procedures.</li>
				<li>Review and update the current contingency planning:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02</td>
			<td>Contingency plan</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop a contingency plan for the system that:
				<ol><li>identifies essential mission and business functions and associated contingency requirements</li>
					<li>provides recovery objectives, restoration priorities, and metrics</li>
					<li>addresses contingency roles, responsibilities, assigned individuals with contact information</li>
					<li>addresses maintaining essential mission and business functions despite a system disruption, compromise, or failure</li>
					<li>addresses eventual, full system restoration without deterioration of the controls originally planned and implemented</li>
					<li>addresses the integrity of the data held within the system, including personal information</li>
					<li>addresses the impact, injury, or consequence of a system compromise, including with respect to personal information</li>
					<li>addresses the sharing of contingency information</li>
					<li>is reviewed and approved by [Assignment: organization-defined personnel or roles]</li>
				</ol></li>
				<li>Distribute copies of the contingency plan to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements].</li>
				<li>Ensure individuals with responsibilities review the contingency plan and understand their roles.</li>
				<li>Coordinate contingency planning activities with incident handling activities.</li>
				<li>Review the contingency plan for the system [Assignment: organization-defined frequency].</li>
				<li>Update the contingency plan to address changes to the organization, system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing.</li>
				<li>Communicate contingency plan changes to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements].</li>
				<li>Incorporate lessons learned from contingency plan testing, training, or actual contingency activities into contingency testing and training.</li>
				<li>Protect the contingency plan from unauthorized disclosure and modification.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(01)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Coordinate with related plans<br />
			Coordinate contingency plan development with organizational elements responsible for related plans.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(02)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Capacity planning<br />
			Conduct capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(03)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Resume mission and business functions<br />
			Plan for the resumption of [Selection (one): all; essential] mission and business functions within [Assignment: organization-defined time period] of contingency plan activation.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(04)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Resume all missions / business functions<br />
			Withdrawn: Incorporated into CP-02(03).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(05)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Continue mission and business functions<br />
			Plan for the continuance of [Selection (one): all; essential] mission and business functions with minimal or no loss of operational continuity and sustain that continuity until full system restoration at primary processing and/or storage sites.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(06)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Alternate processing and storage site<br />
			Plan for the transfer of [Selection (one): all; essential] mission and business functions to alternate processing and/or storage sites with minimal or no loss of operational continuity and sustain that continuity through system restoration to primary processing and/or storage sites.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(07)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Coordinate with external service providers<br />
			Coordinate the contingency plan with the contingency plans of external service providers to ensure that contingency requirements can be satisfied.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>02(08)</td>
			<td>Contingency plan</td>
			<td>Contingency plan: Identify critical assets<br />
			Identify critical system assets supporting [Selection (one): all; essential] mission and business functions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>03</td>
			<td>Contingency training</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide contingency training to system users consistent with assigned roles and responsibilities:
				<ol><li>within [Assignment: organization-defined time period] of assuming a contingency role or responsibility</li>
					<li>when required by system changes</li>
					<li>[Assignment: organization-defined frequency] thereafter</li>
				</ol></li>
				<li>Review and update contingency training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>03(01)</td>
			<td>Contingency training</td>
			<td>Contingency training: Simulated events<br />
			Incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>03(02)</td>
			<td>Contingency training</td>
			<td>Contingency training: Mechanisms used in training environments<br />
			Employ mechanisms used in operations to provide a more thorough and realistic contingency training environment.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>04</td>
			<td>Contingency plan testing</td>
			<td>
			<ol class="lst-upr-alph"><li>Test the contingency plan for the system [Assignment: organization-defined frequency] using the following tests to determine the effectiveness of the plan and the readiness to execute the plan: [Assignment: organization-defined tests].</li>
				<li>Review the contingency plan test results.</li>
				<li>Initiate corrective actions, if needed.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>04(01)</td>
			<td>Contingency plan testing</td>
			<td>Contingency plan testing: Coordinate with related plans<br />
			Coordinate contingency plan testing with organizational elements responsible for related plans.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>04(02)</td>
			<td>Contingency plan testing</td>
			<td>Contingency plan testing: Alternate processing site<br />
			Test the contingency plan at the alternate processing site to:
			<ol class="lst-lwr-alph"><li>familiarize contingency personnel with the facility and available resources</li>
				<li>evaluate the capabilities of the alternate processing site to support contingency operations</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>04(03)</td>
			<td>Contingency plan testing</td>
			<td>Contingency plan testing: Automated testing<br />
			Test the contingency plan using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>04(04)</td>
			<td>Contingency plan testing</td>
			<td>Contingency plan testing: Full recovery and reconstitution<br />
			Include a full recovery and reconstitution of the system to a known state as part of contingency plan testing.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>04(05)</td>
			<td>Contingency plan testing</td>
			<td>Contingency plan testing: Self-challenge<br />
			Employ [Assignment: organization-defined mechanisms] to [Assignment: organization-defined system or system component] to disrupt and adversely affect the system or system component.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>05</td>
			<td>Contingency plan update</td>
			<td>Withdrawn: Incorporated into CP-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>06</td>
			<td>Alternate storage site</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish an alternate storage site, including necessary agreements to permit the storage and retrieval of system backup information.</li>
				<li>Ensure that the alternate storage site provides controls equivalent to that of the primary site.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>06(01)</td>
			<td>Alternate storage site</td>
			<td>Alternate storage site: Separation from primary site<br />
			Identify an alternate storage site that is sufficiently separated from the primary storage site to reduce susceptibility to the same threats.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>06(02)</td>
			<td>Alternate storage site</td>
			<td>Alternate storage site: Recovery time and recovery point objectives<br />
			Configure the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>06(03)</td>
			<td>Alternate storage site</td>
			<td>Alternate storage site: Accessibility<br />
			Identify potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outline explicit mitigation actions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>07</td>
			<td>Alternate processing site</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish an alternate processing site, including necessary agreements to permit the transfer and resumption of [Assignment: organization-defined system operations] for essential mission and business functions within [Assignment: organization-defined time period consistent with recovery time and recovery point objectives] when the primary processing capabilities are unavailable.</li>
				<li>Make available at the alternate processing site the equipment and supplies required to transfer and resume operations or put contracts in place to support delivery to the site within the organization-defined time period for transfer and resumption.</li>
				<li>Provide controls at the alternate processing site that are equivalent to those at the primary site.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>07(01)</td>
			<td>Alternate processing site</td>
			<td>Alternate processing site: Separation from primary site<br />
			Identify an alternate processing site that is sufficiently separated from the primary processing site to reduce susceptibility to the same threats.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>07(02)</td>
			<td>Alternate processing site</td>
			<td>Alternate processing site: Accessibility<br />
			Identify potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>07(03)</td>
			<td>Alternate processing site</td>
			<td>Alternate processing site: Priority of service<br />
			Develop alternate processing site agreements that contain priority of service provisions in accordance with availability requirements (including recovery time objectives).</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>07(04)</td>
			<td>Alternate processing site</td>
			<td>Alternate processing site: Preparation for use<br />
			Prepare the alternate processing site so that the site can serve as the operational site supporting essential mission and business functions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>07(05)</td>
			<td>Alternate processing site</td>
			<td>Alternate processing site: Equivalent information security safeguards<br />
			Withdrawn: Incorporated into CP-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>07(06)</td>
			<td>Alternate processing site</td>
			<td>Alternate processing site: Inability to return to primary site<br />
			Plan and prepare for circumstances that preclude returning to the primary processing site.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>08</td>
			<td>Telecommunications services</td>
			<td>Establish alternate telecommunications services, including necessary agreements to permit the resumption of [Assignment: organization-defined system operations] for essential mission and business functions within [Assignment: organization-defined time period] when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>08(01)</td>
			<td>Telecommunications services</td>
			<td>Telecommunications services: Priority of service provisions
			<ol class="lst-lwr-alph"><li>Develop primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives).</li>
				<li>Request priority access for dialing (see Industry Canada’s Priority Access for Dialing: telecommunications services in times of crisis) via Innovation, Science and Economic Development Canada (ISED) for all telecommunications services used for national security emergency preparedness if the primary and/or alternate telecommunications services are provided by a common carrier.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>08(02)</td>
			<td>Telecommunications services</td>
			<td>Telecommunications services: Single points of failure<br />
			Obtain alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>08(03)</td>
			<td>Telecommunications services</td>
			<td>Telecommunications services: Separation of primary and alternate providers<br />
			Obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>08(04)</td>
			<td>Telecommunications services</td>
			<td>Telecommunications services: Provider contingency plan
			<ol class="lst-lwr-alph"><li>Require primary and alternate telecommunications service providers to have contingency plans.</li>
				<li>Review provider contingency plans to ensure that the plans meet organizational contingency requirements.</li>
				<li>Obtain evidence of contingency testing and training by providers [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>08(05)</td>
			<td>Telecommunications services</td>
			<td>Telecommunications services: Alternate telecommunication service testing<br />
			Test alternate telecommunication services [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09</td>
			<td>System backup</td>
			<td>
			<ol class="lst-upr-alph"><li>Conduct backups of user-level information contained in [Assignment: organization-defined system components] [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives].</li>
				<li>Conduct backups of system-level information contained in the system [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives].</li>
				<li>Conduct backups of system documentation, including security- and privacy-related documentation [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives].</li>
				<li>Protect the confidentiality, integrity, and availability of backup information.</li>
			</ol><ol class="lst-upr-alph" start="27"><li>The organization determines retention periods for essential business information and archived backups.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(01)</td>
			<td>System backup</td>
			<td>System backup: Testing for reliability and integrity<br />
			Test backup information [Assignment: organization-defined frequency] to verify media reliability and information integrity.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(02)</td>
			<td>System backup</td>
			<td>System backup: Test restoration using sampling<br />
			Use a sample of backup information in the restoration of selected system functions as part of contingency plan testing.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(03)</td>
			<td>System backup</td>
			<td>System backup: Separate storage for critical information<br />
			Store backup copies of [Assignment: organization-defined critical system software and other security-related information] in a separate facility or in a fire rated container that is not collocated with the operational system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(04)</td>
			<td>System backup</td>
			<td>System backup: Protection from unauthorized modification<br />
			Withdrawn: Incorporated into CP-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(05)</td>
			<td>System backup</td>
			<td>System backup: Transfer to alternate storage site<br />
			Transfer system backup information to the alternate storage site [Assignment: organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(06)</td>
			<td>System backup</td>
			<td>System backup: Redundant secondary system<br />
			Conduct system backup by maintaining a redundant secondary system that is not collocated with the primary system and that can be activated without loss of information or disruption to operations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(07)</td>
			<td>System backup</td>
			<td>System backup: Dual authorization for deletion or destruction<br />
			Enforce dual authorization for the deletion or destruction of [Assignment: organization-defined backup information].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>09(08)</td>
			<td>System backup</td>
			<td>System backup: Cryptographic protection<br />
			Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined backup information].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>10</td>
			<td>System recovery and reconstitution</td>
			<td>Provide for the recovery and reconstitution of the system to a known state within [Assignment: organization-defined time period consistent with recovery time and recovery point objectives] after a disruption, compromise, or failure.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>10(01)</td>
			<td>System recovery and reconstitution</td>
			<td>System recovery and reconstitution: Contingency plan testing<br />
			Withdrawn: Incorporated into CP-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>10(02)</td>
			<td>System recovery and reconstitution</td>
			<td>System recovery and reconstitution: Transaction recovery<br />
			Implement transaction recovery for systems that are transaction-based.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>10(03)</td>
			<td>System recovery and reconstitution</td>
			<td>System recovery and reconstitution: Compensating security controls<br />
			Withdrawn: Addressed through tailoring procedures.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>10(04)</td>
			<td>System recovery and reconstitution</td>
			<td>System recovery and reconstitution: Restore within time period<br />
			Provide the capability to restore system components within [Assignment: organization-defined restoration time periods] from configuration-controlled and integrity-protected information representing a known, operational state for the components.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>10(05)</td>
			<td>System recovery and reconstitution</td>
			<td>System recovery and reconstitution: Failover capability<br />
			Withdrawn: Incorporated into SI-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>10(06)</td>
			<td>System recovery and reconstitution</td>
			<td>System recovery and reconstitution: Component protection<br />
			Protect system components used for recovery and reconstitution.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>11</td>
			<td>Alternate communications protocols</td>
			<td>Provide the capability to employ [Assignment: organization-defined alternative communications protocols] in support of maintaining continuity of operations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>12</td>
			<td>Safe mode</td>
			<td>When [Assignment: organization-defined conditions] are detected, enter a safe mode of operation with [Assignment: organization-defined restrictions of safe mode of operation].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>CP</td>
			<td>13</td>
			<td>Alternative security mechanisms</td>
			<td>Employ [Assignment: organization-defined alternative or supplemental security mechanisms] for satisfying [Assignment: organization-defined security functions] when the primary means of implementing the security function is unavailable or compromised.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.7">Table 4.7: Identification and authentication</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>IA</td>
			<td>01</td>
			<td>Identification and authentication policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] identification and authentication (IA) policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, jurisprudence, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the identification and authentication policy and the associated identification and authentication controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the identification and authentication policy and procedures.</li>
				<li>Review and update the current identification and authentication:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Uniquely identify and authenticate organizational users and associate that unique identification with processes acting on behalf of those users.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(01)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Strong <abbr title="multi-factor authentication">MFA</abbr> to privileged accounts<br />
			Implement strong multi-factor authentication for access to privileged accounts.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(02)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): <abbr title="multi-factor authentication">MFA</abbr> to non-privileged accounts<br />
			Implement multi-factor authentication for access to non-privileged accounts.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(03)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Local access to privileged accounts<br />
			Withdrawn: Incorporated into IA-02(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(04)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Local access to non-privileged accounts<br />
			Withdrawn: Incorporated into IA-02(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(05)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Individual authentication with group authentication<br />
			When shared accounts or authenticators are employed, require users to be individually authenticated before granting access to the shared accounts or resources.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(06)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Access to accounts - separate device<br />
			Implement <abbr title="multi-factor authentication">MFA</abbr> for [Selection (one or more): local; network; remote] access to [Selection (one or more): privileged accounts; non-privileged accounts] such that:
			<ol class="lst-lwr-alph"><li>one of the factors is provided by a device separate from the system gaining access</li>
				<li>the device meets [Assignment: organization-defined strength of mechanism requirements]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(07)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Network access to non-privileged accounts - separate device<br />
			Withdrawn: Incorporated into IA-02(06).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(08)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Access to accounts - replay resistant<br />
			Implement replay-resistant authentication mechanisms for access to [Selection (one or more): privileged accounts; non-privileged accounts].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(09)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Network access to non-privileged accounts - replay resistant<br />
			Withdrawn: Incorporated into IA-02(08).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(10)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Single sign-on<br />
			Provide a single sign-on capability for [Assignment: organization-defined system accounts and services].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(11)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Remote access - separate device<br />
			Withdrawn: Incorporated into IA-02(06).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(12)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Use of hardware token <abbr title="Government of Canada">GC</abbr>-issued <abbr title="public key infrastructure">PKI</abbr>-based credentials<br />
			Accept and electronically verify <abbr title="Government of Canada">GC</abbr>-issued hardware token <abbr title="public key infrastructure">PKI</abbr>-based credentials.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(13)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Out-of-band authentication<br />
			Implement the following out-of-band authentication mechanisms under [Assignment: organization-defined conditions]: [Assignment: organization-defined out-of-band authentication].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>02(400)</td>
			<td>Identification and authentication (organizational users)</td>
			<td>Identification and authentication (organizational users): Multi-factor authentication for remote access to privileged accounts<br />
			Withdrawn: Incorporated into IA-02(01) and IA-02(06).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>03</td>
			<td>Device identification and authentication</td>
			<td>Uniquely identify and authenticate [Assignment: organization-defined devices and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>03(01)</td>
			<td>Device identification and authentication</td>
			<td>Device identification and authentication: Cryptographic bidirectional authentication<br />
			Authenticate [Assignment: organization-defined devices and/or types of devices] before establishing [Selection (one or more): local; remote; network] connection using bidirectional authentication that is cryptographically based.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>03(02)</td>
			<td>Device identification and authentication</td>
			<td>Device identification and authentication: Cryptographic bidirectional network authentication<br />
			Withdrawn: Incorporated into IA-03 (01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>03(03)</td>
			<td>Device identification and authentication</td>
			<td>Device identification and authentication: Dynamic address allocation
			<ol class="lst-lwr-alph"><li>Where addresses are allocated dynamically, standardize dynamic address allocation lease information and the lease duration assigned to devices in accordance with [Assignment: organization-defined lease information and lease duration].</li>
				<li>Audit lease information when assigned to a device.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>03(04)</td>
			<td>Device identification and authentication</td>
			<td>Device identification and authentication: Device attestation<br />
			Handle device identification and authentication based on attestation by [Assignment: organization-defined configuration management process].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04</td>
			<td>Identifier management</td>
			<td>Manage system identifiers by:
			<ol class="lst-upr-alph"><li>receiving authorization from [Assignment: organization-defined personnel or roles] to assign an individual, group, role, service, or device identifier</li>
				<li>selecting an identifier that identifies an individual, group, role, service, or device</li>
				<li>assigning the identifier to the intended individual, group, role, service, or device</li>
				<li>preventing reuse of identifiers for [Assignment: organization-defined time period]</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(01)</td>
			<td>Identifier management</td>
			<td>Identifier management: Prohibit account identifiers as public identifiers<br />
			Prohibit the use of system account identifiers that are the same as public identifiers for individual accounts.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(02)</td>
			<td>Identifier management</td>
			<td>Identifier management: Supervisor authorization<br />
			Withdrawn: Incorporated into IA-12(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(03)</td>
			<td>Identifier management</td>
			<td>Identifier management: Multiple forms of certification<br />
			Withdrawn: Incorporated into IA-12(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(04)</td>
			<td>Identifier management</td>
			<td>Identifier management: Identify user status<br />
			Manage individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteristic identifying individual status].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(05)</td>
			<td>Identifier management</td>
			<td>Identifier management: Dynamic management<br />
			Manage individual identifiers dynamically in accordance with [Assignment: organization-defined dynamic identifier policy].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(06)</td>
			<td>Identifier management</td>
			<td>Identifier management: Cross-organization management<br />
			Coordinate with the following external organizations for cross-organization management of identifiers: [Assignment: organization-defined external organizations].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(07)</td>
			<td>Identifier management</td>
			<td>Identifier management: In-person registration<br />
			Withdrawn: Incorporated into IA-12(04).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(08)</td>
			<td>Identifier management</td>
			<td>Identifier management: Pairwise pseudonymous identifiers<br />
			Generate pairwise pseudonymous identifiers.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(09)</td>
			<td>Identifier management</td>
			<td>Identifier management: Attribute maintenance and protection<br />
			Maintain the attributes for each uniquely identified individual, device, or service in [Assignment: organization-defined protected central storage].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(400)</td>
			<td>Identifier management</td>
			<td>Identifier management: Biometrics protection<br />
			Maintain adequate protection for biometrics in accordance with privacy regulations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>04(401)</td>
			<td>Identifier management</td>
			<td>Identifier management: Biometrics integrity<br />
			Ensure the integrity of collected biometrics.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05</td>
			<td>Authenticator management</td>
			<td>Manage system authenticators by:
			<ol class="lst-upr-alph"><li>verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator</li>
				<li>establishing initial authenticator content for any authenticators issued by the organization</li>
				<li>ensuring that authenticators have sufficient strength of mechanism for their intended use</li>
				<li>establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators</li>
				<li>changing default authenticators prior to first use</li>
				<li>changing or refreshing authenticators [Assignment: organization-defined time period by authenticator type] or when [Assignment: organization-defined events] occur</li>
				<li>protecting authenticator content from unauthorized disclosure and modification</li>
				<li>requiring individuals to take, and having devices implement, specific controls to protect authenticators</li>
				<li>changing authenticators for group or role accounts when membership to those accounts changes</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(01)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Password-based authentication<br />
			For password-based authentication:
			<ol class="lst-lwr-alph"><li>maintain a list of commonly used, expected, or compromised passwords and update the list [Assignment: organization-defined frequency] and when organizational passwords are suspected to have been compromised directly or indirectly</li>
				<li>when users create or update passwords, verify that the passwords are not found on the list of commonly used, expected, or compromised passwords in IA-05(01)a</li>
				<li>transmit passwords only over cryptographically protected channels</li>
				<li>store passwords using an approved salted key derivation function, preferably using a keyed hash</li>
				<li>require immediate selection of a new password upon account recovery</li>
				<li>allow user selection of long passwords and passphrases, including spaces and all printable characters</li>
				<li>employ automated tools to assist the user in selecting strong password authenticators</li>
				<li>enforce the following composition and complexity rules: [Assignment: organization-defined composition and complexity rules]</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(02)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Public key-based authentication
			<ol class="lst-lwr-alph"><li>For public key-based authentication:
				<ol><li>enforce authorized access to the corresponding private key</li>
					<li>map the authenticated identity to the account of the individual or group</li>
				</ol></li>
				<li>When public key infrastructure (PKI) is used:
				<ol><li>validate certificates by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information</li>
					<li>implement a local cache of revocation data to support path discovery and validation</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(03)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: In-person or trusted third-party registration<br />
			Withdrawn: Incorporated into IA-12(04).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(04)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Automated support for password strength determination<br />
			Withdrawn: Incorporated into IA-05(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(05)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Change authenticators prior to delivery<br />
			Require developers and installers of system components to provide unique authenticators or change default authenticators prior to delivery and installation.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(06)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Protection of authenticators<br />
			Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(07)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: No embedded unencrypted static authenticators<br />
			Ensure that unencrypted static authenticators are not embedded in applications or other forms of static storage.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(08)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Multiple system accounts<br />
			Implement [Assignment: organization-defined security controls] to manage the risk of compromise due to individuals having accounts on multiple systems.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(09)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Federated credential management<br />
			Use the following external organizations to federate credentials: [Assignment: organization-defined external organizations].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>[<abbr title="Shared Services Canada">SSC</abbr>]</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(10)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Dynamic credential binding<br />
			Bind identities and authenticators dynamically using the following rules: [Assignment: organization-defined binding rules].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(11)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Hardware token-based authentication<br />
			Withdrawn: Incorporated into IA-02(01) and IA-02(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(12)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Biometric authentication performance<br />
			For biometric-based authentication, employ mechanisms that satisfy the following biometric quality requirements [Assignment: organization-defined biometric quality requirements].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(13)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Expiration of cached authenticators<br />
			Prohibit the use of cached authenticators after [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(14)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Managing content of <abbr title="public key infrastructure">PKI</abbr> trust stores<br />
			For <abbr title="public key infrastructure">PKI</abbr>-based authentication, employ an organization-wide methodology for managing the content of <abbr title="public key infrastructure">PKI</abbr> trust stores installed across all platforms, including networks, operating systems, browsers, and applications.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(15)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Identity, credential and authentication assurance levels compliant products and services<br />
			Use only products and services for identity, credential, authentication and access management that are compliant with the required assurance levels.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(16)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: In-person or trusted external party authenticator issuance<br />
			Require that the issuance of [Assignment: organization-defined types of and/or specific authenticators] be conducted [Selection (one): in person; by a trusted external party] before [Assignment: organization-defined registration authority] with authorization by [Assignment: organization-defined personnel or roles].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(17)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Presentation attack detection for biometric authenticators<br />
			Employ presentation attack detection mechanisms for biometric-based authentication.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>05(18)</td>
			<td>Authenticator management</td>
			<td>Authenticator management: Password managers
			<ol class="lst-lwr-alph"><li>Employ [Assignment: organization-defined password managers] to generate and manage passwords.</li>
				<li>Protect the passwords using [Assignment: organization-defined controls].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>06</td>
			<td>Authentication feedback</td>
			<td>Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation and use by unauthorized individuals.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>07</td>
			<td>Cryptographic module authentication</td>
			<td>Implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, Orders in Council, directives, policies, regulations, standards, and guidelines for such authentication.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08(01)</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Identification and authentication (non-organizational users): Acceptance of <abbr title="public key infrastructure">PKI</abbr>-based credentials from other agencies<br />
			Accept and electronically verify <abbr title="public key infrastructure">PKI</abbr>-based credentials from other GC departments and agencies.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08(02)</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Identification and authentication (non-organizational users): Acceptance of external authenticators
			<ol class="lst-lwr-alph"><li>Accept only external authenticators that are compliant with ITSP.30.031-appropriate level of assurance.</li>
				<li>Document and maintain a list of accepted external authenticators.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08(03)</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Identification and authentication (non-organizational users): Use of federal identity, credential, and access management (<abbr title="Federal identity, credential, and access management">FICAM</abbr>)-approved products Withdrawn: Incorporated into IA-08(02) and specific to the <abbr title="United States">US</abbr>.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08(04)</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Identification and authentication (non-organizational users): Use of defined profiles<br />
			Conform to the following profiles for identity management [Assignment: organization-defined identity management profiles].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08(05)</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Identification and authentication (non-organizational users): Acceptance of personal identity verification (<abbr title="Personal Identity Verification">PIV</abbr>)-I credentials<br />
			Accept and verify federated or <abbr title="public key infrastructure">PKI</abbr> credentials that meet [Assignment: organization-defined policy].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08(06)</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Identification and authentication (non-organizational users): Disassociability<br />
			Implement the following measures to disassociate user attributes or identifier assertion relationships among individuals, credential service providers, and relying parties: [Assignment: organization-defined measures].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>08(400)</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>Identification and authentication (non-organizational users): Identity and credential assurance<br />
			Withdrawn: Incorporated into IA-05(15).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>09</td>
			<td>Service identification and authentication</td>
			<td>Uniquely identify and authenticate [Assignment: organization-defined system services and applications] before establishing communications with devices, users, or other services or applications.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>09(01)</td>
			<td>Service identification and authentication</td>
			<td>Service identification and authentication: Information exchange<br />
			Withdrawn: Incorporated into IA-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>09(02)</td>
			<td>Service identification and authentication</td>
			<td>Service identification and authentication: Transmission of decisions<br />
			Withdrawn: Incorporated into IA-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>10</td>
			<td>Adaptive authentication</td>
			<td>Require individuals accessing the system to employ [Assignment: organization-defined supplemental authentication techniques or mechanisms] under specific [Assignment: organization-defined circumstances or situations].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>11</td>
			<td>Re-authentication</td>
			<td>Require users to re-authenticate when [Assignment: organization-defined circumstances or situations requiring re-authentication].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>12</td>
			<td>Identity proofing</td>
			<td>
			<ol class="lst-upr-alph"><li>Identity proof users that require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines.</li>
				<li>Resolve user identities to a unique individual.</li>
				<li>Collect, validate, and verify identity evidence.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>12(01)</td>
			<td>Identity proofing</td>
			<td>Identity proofing: Supervisor authorization<br />
			Require that the registration process to receive an account for logical access includes supervisor or sponsor authorization.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>12(02)</td>
			<td>Identity proofing</td>
			<td>Identity proofing: Identity evidence<br />
			Require evidence of individual identification be presented to the registration authority.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>12(03)</td>
			<td>Identity proofing</td>
			<td>Identity proofing: Identity evidence validation and verification<br />
			Require that the presented identity evidence be validated and verified through [Assignment: organizational defined methods of validation and verification].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>12(04)</td>
			<td>Identity proofing</td>
			<td>Identity proofing: In-person validation and verification<br />
			Require that the validation and verification of identity evidence be conducted in person before a designated registration authority.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>12(05)</td>
			<td>Identity proofing</td>
			<td>Identity proofing: Address confirmation Require that a [Selection (one): registration code; notice of proofing] be delivered through an out-of-band channel to verify the users address (physical or digital) of record.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>This control is recommended for users external to the organization.</td>
		</tr><tr><td>IA</td>
			<td>12(06)</td>
			<td>Identity proofing</td>
			<td>Identity proofing: Accept externally proofed identities<br />
			Accept externally proofed identities at [Assignment: organization-defined identity assurance level].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>13</td>
			<td>Identity providers and authorization servers</td>
			<td>Employ identity providers and authorization servers to manage user, device, and non-person entity (NPE) identities, attributes, and access rights supporting authentication and authorization decisions in accordance with [Assignment: organization-defined identification and authentication policy] using [Assignment: organization-defined mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>13(01)</td>
			<td>Identity providers and authorization servers</td>
			<td>Identity providers and authorization servers: Protection of cryptographic keys<br />
			Cryptographic keys that protect access tokens are generated, managed, and protected from disclosure and misuse.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>13(02)</td>
			<td>Identity providers and authorization servers</td>
			<td>Identity providers and authorization servers: Verification of identity assertions and access tokens<br />
			The source and integrity of identity assertions and access tokens are verified before granting access to system and information resources.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IA</td>
			<td>13(03)</td>
			<td>Identity providers and authorization servers</td>
			<td>Identity providers and authorization servers: Token management<br />
			In accordance with [Assignment: organization-defined identification and authentication policy], assertions and access tokens are:
			<ol class="lst-lwr-alph"><li>generated</li>
				<li>issued</li>
				<li>refreshed</li>
				<li>revoked</li>
				<li>time-restricted</li>
				<li>audience-restricted</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.8">Table 4.8: Incident response</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>IR</td>
			<td>01</td>
			<td>Incident response policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] incident response policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the incident response policy and the associated incident response controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the incident response policy and procedures.</li>
				<li>Review and update the current incident response:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>02</td>
			<td>Incident response training</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide incident response training to system users consistent with assigned roles and responsibilities:
				<ol><li>within [Assignment: organization-defined time period] of assuming an incident response role or responsibility or acquiring system access</li>
					<li>when required by system changes</li>
					<li>[Assignment: organization-defined frequency] thereafter</li>
				</ol></li>
				<li>Review and update incident response training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>02(01)</td>
			<td>Incident response training</td>
			<td>Incident response training: Simulated events<br />
			Incorporate simulated events into incident response training to facilitate the required response by personnel in crisis situations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>02(02)</td>
			<td>Incident response training</td>
			<td>Incident response training: Automated training environments<br />
			Provide an incident response training environment using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>02(03)</td>
			<td>Incident response training</td>
			<td>Incident response training: Privacy breach<br />
			Provide incident response training on how to identify and respond to a privacy breach, including the organization’s process for reporting a privacy breach.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>03</td>
			<td>Incident response testing</td>
			<td>Test the effectiveness of the incident response capability for the system [Assignment: organization-defined frequency] using the following tests: [Assignment: organization-defined tests].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>03(01)</td>
			<td>Incident response testing</td>
			<td>Incident response testing: Automated testing<br />
			Test the incident response capability using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>03(02)</td>
			<td>Incident response testing</td>
			<td>Incident response testing: Coordination with related plans<br />
			Coordinate incident response testing with organizational elements responsible for related plans.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>03(03)</td>
			<td>Incident response testing</td>
			<td>Incident response testing: Continuous improvement<br />
			Use qualitative and quantitative data from testing to:
			<ol class="lst-lwr-alph"><li>determine the effectiveness of incident response processes</li>
				<li>continuously improve incident response processes</li>
				<li>provide incident response measures and metrics that are accurate, consistent, and in a reproducible format</li>
				<li>identify trends to facilitate the identification of underlying patterns with respect to information-handling practices to prevent further breaches</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04</td>
			<td>Incident handling</td>
			<td>
			<ol class="lst-upr-alph"><li>Implement an incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery;</li>
				<li>Coordinate incident handling activities with contingency planning activities;</li>
				<li>Incorporate lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implement the resulting changes accordingly; and</li>
				<li>Ensure the rigor, intensity, scope, and results of incident handling activities are comparable and predictable across the organization.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(01)</td>
			<td>Incident handling</td>
			<td>Incident handling: Automated incident handling processes<br />
			Support the incident handling process using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(02)</td>
			<td>Incident handling</td>
			<td>Incident handling: Dynamic reconfiguration<br />
			Include the following types of dynamic reconfiguration for [Assignment: organization-defined system components] as part of the incident response capability: [Assignment: organization-defined types of dynamic reconfiguration].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(03)</td>
			<td>Incident handling</td>
			<td>Incident handling: Continuity of operations<br />
			Identify [Assignment: organization-defined classes of incidents] and take the following actions in response to those incidents to ensure continuation of organizational mission and business functions: [Assignment: organization-defined actions to take in response to classes of incidents].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(04)</td>
			<td>Incident handling</td>
			<td>Incident handling: Information correlation<br />
			Correlate incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(05)</td>
			<td>Incident handling</td>
			<td>Incident handling: Automatic disabling of system<br />
			Implement a configurable capability to automatically disable the system if [Assignment: organization-defined security violations] are detected.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(06)</td>
			<td>Incident handling</td>
			<td>Incident handling: Insider threats<br />
			Implement an incident handling capability for incidents involving insider threats.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(07)</td>
			<td>Incident handling</td>
			<td>Incident handling: insider threats - Intra-organization coordination<br />
			Coordinate an incident handling capability for insider threats that includes the following organizational entities [Assignment: organization-defined entities].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(08)</td>
			<td>Incident handling</td>
			<td>Incident handling: Correlation with external organizations<br />
			Coordinate with [Assignment: organization-defined external organizations] to correlate and share [Assignment: organization-defined incident information] to achieve a cross-organization perspective on incident awareness and more effective incident responses.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>[<abbr title="Shared Services Canada">SSC</abbr>, <abbr title="Treasury Board Secretariat">TBS</abbr>, Cyber Centre]</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(09)</td>
			<td>Incident handling</td>
			<td>Incident handling: Dynamic response capability<br />
			Employ [Assignment: organization-defined dynamic response capabilities] to respond to incidents.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(10)</td>
			<td>Incident handling</td>
			<td>Incident handling: Supply chain coordination<br />
			Coordinate incident handling activities involving supply chain events with other organizations involved in the supply chain.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(11)</td>
			<td>Incident handling</td>
			<td>Incident handling: Integrated incident response team<br />
			Establish and maintain an integrated incident response team that can be deployed to any location identified by the organization in [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(12)</td>
			<td>Incident handling</td>
			<td>Incident handling: Malicious code and forensic analysis<br />
			Analyze malicious code and/or other residual artifacts remaining in the system after the incident.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(13)</td>
			<td>Incident handling</td>
			<td>Incident handling: Behaviour analysis<br />
			Analyze anomalous or suspected adversarial behaviour in or related to [Assignment: organization-defined environments or resources].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(14)</td>
			<td>Incident handling</td>
			<td>Incident handling: Security operations center<br />
			Establish and maintain a security operations center.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>04(15)</td>
			<td>Incident handling</td>
			<td>Incident handling: Public relations, reputation repair, and notification
			<ol class="lst-lwr-alph"><li>Manage public relations associated with an incident.</li>
				<li>Employ measures to repair the reputation of the organization.</li>
				<li>If applicable, notify individuals whose personal information has been compromised.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>05</td>
			<td>Incident monitoring</td>
			<td>Track and document incidents.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>05(01)</td>
			<td>Incident monitoring</td>
			<td>Incident monitoring: Automated tracking, data collection, and analysis<br />
			Track incidents and collect and analyze incident information using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>06</td>
			<td>Incident reporting</td>
			<td>
			<ol class="lst-upr-alph"><li>Require personnel to report suspected incidents to the organizational incident response capability within [Assignment: organization-defined time period].</li>
				<li>Report incident information to [Assignment: organization-defined authorities].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>06(01)</td>
			<td>Incident reporting</td>
			<td>Incident reporting: Automated reporting<br />
			Report incidents using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>06(02)</td>
			<td>Incident reporting</td>
			<td>Incident reporting: Vulnerabilities related to incidents<br />
			Report system vulnerabilities associated with reported incidents to [Assignment: organization-defined personnel or roles].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>06(03)</td>
			<td>Incident reporting</td>
			<td>Incident reporting: Supply chain coordination<br />
			Provide incident information to the provider of the product or service and other organizations involved in the supply chain or supply chain governance for systems or system components related to the incident.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>07</td>
			<td>Incident response assistance</td>
			<td>Provide an incident response support resource, integral to the organizational incident response capability, that offers advice and assistance to users of the system for the handling and reporting of incidents.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>07(01)</td>
			<td>Incident response assistance</td>
			<td>Incident response assistance: Automation support for availability of information and support<br />
			Increase the availability of incident response information and support using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>07(02)</td>
			<td>Incident response assistance</td>
			<td>Incident response assistance: Coordination with external providers
			<ol class="lst-lwr-alph"><li>Establish a direct, cooperative relationship between the organization’s incident response capability and external providers of a system protection capability.</li>
				<li>Identify organizational incident response team members to the external providers.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>08</td>
			<td>Incident response plan</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop an incident response plan that:
				<ol><li>provides the organization with a roadmap for implementing its incident response capability</li>
					<li>describes the structure and organization of the incident response capability</li>
					<li>provides a high-level approach for how the incident response capability fits into the overall organization</li>
					<li>meets the unique requirements of the organization which relate to mission, size, structure, and functions</li>
					<li>defines reportable incidents</li>
					<li>provides metrics for measuring the incident response capability within the organization</li>
					<li>defines the resources and management support needed to effectively maintain and mature an incident response capability</li>
					<li>addresses the sharing of incident information</li>
					<li>is reviewed and approved by [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency]</li>
					<li>explicitly designates responsibility for incident response to [Assignment: organization-defined entities, personnel, or roles]</li>
				</ol></li>
				<li>Distribute copies of the incident response plan to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements].</li>
				<li>Update the incident response plan to address system and organizational changes or problems encountered during plan implementation, execution, or testing.</li>
				<li>Communicate incident response plan changes to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements].</li>
				<li>Protect the incident response plan from unauthorized disclosure and modification.</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>08(01)</td>
			<td>Incident response plan</td>
			<td>Incident response plan: Privacy breaches<br />
			For privacy breaches involving personal information, include the following in the incident response plan:
			<ol class="lst-lwr-alph"><li>a process to determine if notice to individuals or other organizations, including oversight organizations, is needed</li>
				<li>an assessment process to determine the extent of the harm, embarrassment, inconvenience, or unfairness to affected individuals and any mechanisms to mitigate such harms</li>
				<li>identification of applicable privacy requirements</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>09</td>
			<td>Information spillage response</td>
			<td>Respond to information spills by:
			<ol class="lst-upr-alph"><li>assigning [Assignment: organization-defined personnel or roles] with responsibility for responding to information spills</li>
				<li>identifying the specific information involved in the system contamination</li>
				<li>alerting [Assignment: organization-defined personnel or roles] of the information spill using a method of communication not associated with the spill</li>
				<li>isolating the contaminated system or system component</li>
				<li>eradicating the information from the contaminated system or component</li>
				<li>identifying other systems or system components that may have been subsequently contaminated</li>
				<li>performing the following additional actions: [Assignment: organization-defined actions]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>This control should be selected by <abbr title="Government of Canada">GC</abbr> departments and agencies that have systems categorized higher than Protected B.</td>
		</tr><tr><td>IR</td>
			<td>09(01)</td>
			<td>Information spillage response</td>
			<td>Information spillage response: Responsible personnel<br />
			Withdrawn: Incorporated into IR-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>IR</td>
			<td>09(02)</td>
			<td>Information spillage response</td>
			<td>Information spillage response: Training<br />
			Provide information spillage response training [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>This control should be selected by <abbr title="Government of Canada">GC</abbr> departments and agencies that have systems categorized higher than Protected B.</td>
		</tr><tr><td>IR</td>
			<td>09(03)</td>
			<td>Information spillage response</td>
			<td>Information spillage response: Post-spill operations<br />
			Implement the following procedures to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions: [Assignment: organization-defined procedures].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>This control should be selected by <abbr title="Government of Canada">GC</abbr> departments and agencies that have systems categorized higher than Protected B.</td>
		</tr><tr><td>IR</td>
			<td>09(04)</td>
			<td>Information spillage response</td>
			<td>Information spillage response: Exposure to unauthorized personnel<br />
			Employ the following controls for personnel exposed to information not within assigned access authorizations: [Assignment: organization-defined controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>This control should be selected by <abbr title="Government of Canada">GC</abbr> departments and agencies that have systems categorized higher than Protected B.</td>
		</tr><tr><td>IR</td>
			<td>10</td>
			<td>Integrated information security analysis team</td>
			<td>Withdrawn: Moved to IR-04(11).</td>
			<td>Control</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.9">Table 4.9: Maintenance</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>MA</td>
			<td>01</td>
			<td>System maintenance policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] maintenance policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the maintenance policy and the associated maintenance controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the maintenance policy and procedures.</li>
				<li>Review and update the current maintenance:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>02</td>
			<td>Controlled maintenance</td>
			<td>
			<ol class="lst-upr-alph"><li>Schedule, document, and review records of maintenance, repair, and replacement on system components in accordance with manufacturer or vendor specifications and/or organizational requirements.</li>
				<li>Approve and monitor all maintenance activities, whether performed onsite or remotely and whether the system or system components are serviced onsite or removed to another location.</li>
				<li>Require that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the system or system components from organizational facilities for offsite maintenance, repair, or replacement.</li>
				<li>Sanitize equipment to remove the following information from associated media prior to removal from organizational facilities for offsite maintenance, repair, or replacement: [Assignment: organization-defined information].</li>
				<li>Check all potentially impacted controls to verify that the controls are still functioning properly following maintenance, repair, or replacement actions.</li>
				<li>Include the following information in organizational maintenance records: [Assignment: organization-defined information].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>02(01)</td>
			<td>Controlled maintenance</td>
			<td>Controlled maintenance: Record content<br />
			Withdrawn: Incorporated into MA-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>02(02)</td>
			<td>Controlled maintenance</td>
			<td>Controlled maintenance: Automated maintenance activities
			<ol class="lst-lwr-alph"><li>Schedule, conduct, and document maintenance, repair, and replacement actions for the system using [Assignment: organization-defined automated mechanisms].</li>
				<li>Produce up-to-date, accurate, and complete records of all maintenance, repair, and replacement actions requested, scheduled, in process, and completed.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>03</td>
			<td>Maintenance tools</td>
			<td>
			<ol class="lst-upr-alph"><li>Approve, control, and monitor the use of system maintenance tools.</li>
				<li>Review previously approved system maintenance tools [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>03(01)</td>
			<td>Maintenance tools</td>
			<td>Maintenance tools: Inspect tools<br />
			Inspect the maintenance tools used by maintenance personnel for improper or unauthorized modifications.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>03(02)</td>
			<td>Maintenance tools</td>
			<td>Maintenance tools: Inspect media<br />
			Check media containing diagnostic and test programs for malicious code before the media are used in the system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>03(03)</td>
			<td>Maintenance tools</td>
			<td>Maintenance tools: Prevent unauthorized removal<br />
			Prevent the unauthorized removal of maintenance equipment containing organizational or personal information by:
			<ol class="lst-lwr-alph"><li>verifying that no organizational or personal information is contained on the equipment</li>
				<li>sanitizing or destroying the equipment</li>
				<li>retaining the equipment within the facility</li>
				<li>obtaining an exemption from [Assignment: organization-defined personnel or roles] explicitly authorizing removal of the equipment from the facility</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>03(04)</td>
			<td>Maintenance tools</td>
			<td>Maintenance tools: Restricted tool use<br />
			Restrict the use of maintenance tools to authorized personnel only.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>03(05)</td>
			<td>Maintenance tools</td>
			<td>Maintenance tools: Execution with privilege<br />
			Monitor the use of maintenance tools that execute with increased privilege.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>03(06)</td>
			<td>Maintenance tools</td>
			<td>Maintenance tools: Software updates and patches<br />
			Inspect maintenance tools to ensure the latest software updates and patches are installed.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04</td>
			<td>Non-local maintenance</td>
			<td>
			<ol class="lst-upr-alph"><li>Approve and monitor non-local maintenance and diagnostic activities.</li>
				<li>Allow the use of non-local maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the system.</li>
				<li>Employ strong authentication in the establishment of non-local maintenance and diagnostic sessions.</li>
				<li>Maintain records for non-local maintenance and diagnostic activities.</li>
				<li>Terminate session and network connections when non-local maintenance is completed.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04(01)</td>
			<td>Non-local maintenance</td>
			<td>Non-local maintenance: Logging and review
			<ol class="lst-lwr-alph"><li>Log [Assignment: organization-defined audit events] for non-local maintenance and diagnostic sessions.</li>
				<li>Review the audit records of the maintenance and diagnostic sessions to detect anomalous behavior.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04(02)</td>
			<td>Non-local maintenance</td>
			<td>Non-local maintenance: Document non-local maintenance<br />
			Withdrawn: Incorporated into MA-01 and MA-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04(03)</td>
			<td>Non-local maintenance</td>
			<td>Non-local maintenance: Comparable security and sanitization
			<ol class="lst-lwr-alph"><li>Require that non-local maintenance and diagnostic services be performed from a system that implements a security capability comparable to the capability implemented on the system being serviced.</li>
				<li>Remove the component to be serviced from the system prior to non-local maintenance or diagnostic services; sanitize the component (for organizational information); and, after the service is performed, inspect and sanitize the component (for potentially malicious software) before reconnecting the component to the system.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04(04)</td>
			<td>Non-local maintenance</td>
			<td>Non-local maintenance: Authentication and separation of maintenance sessions<br />
			Protect non-local maintenance sessions by:
			<ol class="lst-lwr-alph"><li>employing [Assignment: organization-defined authenticators that are replay resistant]</li>
				<li>separating the maintenance sessions from other network sessions with the system by either:
				<ol><li>physically separated communications paths</li>
					<li>logically separated communications paths</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04(05)</td>
			<td>Non-local maintenance</td>
			<td>Non-local maintenance: Approvals and notifications
			<ol class="lst-lwr-alph"><li>Require the approval of each non-local maintenance session by [Assignment: organization-defined personnel or roles].</li>
				<li>Notify the following personnel or roles of the date and time of planned non-local maintenance: [Assignment: organization-defined personnel or roles].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04(06)</td>
			<td>Non-local maintenance</td>
			<td>Non-local maintenance: Cryptographic protection<br />
			Implement the following cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications: [Assignment: organization-defined cryptographic mechanisms].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>04(07)</td>
			<td>Non-local maintenance</td>
			<td>Non-local maintenance: Disconnect verification<br />
			Verify session and network connection termination after the completion of non-local maintenance and diagnostic sessions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>05</td>
			<td>Maintenance personnel</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish a process for maintenance personnel authorization and maintain a list of authorized maintenance organizations or personnel.</li>
				<li>Verify that non-escorted personnel performing maintenance on the system possess the required access authorizations.</li>
				<li>Designate organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>05(01)</td>
			<td>Maintenance personnel</td>
			<td>Maintenance personnel: Individuals without appropriate access
			<ol class="lst-lwr-alph"><li>Implement procedures for the use of maintenance personnel that lack appropriate security clearances, that include the following requirements:
				<ol><li>maintenance personnel who do not have the needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified</li>
					<li>prior to initiating maintenance or diagnostic activities by personnel who do not have the needed access authorizations, clearances, or formal access approvals, all volatile information storage components within the system are sanitized and all non-volatile storage media are removed or physically disconnected from the system and secured</li>
				</ol></li>
				<li>Develop and implement [Assignment: organization-defined alternate controls] in the event a system component cannot be sanitized, removed, or disconnected from the system.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>05(02)</td>
			<td>Maintenance personnel</td>
			<td>Maintenance personnel: Security clearances for classified systems<br />
			Verify that personnel performing maintenance and diagnostic activities on a system processing, storing, or transmitting classified information possess security clearances and formal access approvals for at least the highest classification level and for compartments of information on the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>05(03)</td>
			<td>Maintenance personnel</td>
			<td>Maintenance personnel: Citizenship requirements for classified systems<br />
			Verify that personnel performing maintenance and diagnostic activities on a system processing, storing, or transmitting classified information are Canadian citizens.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>05(04)</td>
			<td>Maintenance personnel</td>
			<td>Maintenance personnel: Foreign nationals<br />
			Ensure that:
			<ol class="lst-lwr-alph"><li>foreign nationals with appropriate security clearances are used to conduct maintenance and diagnostic activities on classified systems only when the systems are jointly owned and operated by Canadian and foreign allied governments, or owned and operated solely by foreign allied governments</li>
				<li>approvals, consents, and detailed operational conditions regarding the use of foreign nationals to conduct maintenance and diagnostic activities on classified systems are fully documented within memoranda of agreement</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>05(05)</td>
			<td>Maintenance personnel</td>
			<td>Maintenance personnel: Non-system maintenance<br />
			Ensure that non-escorted personnel performing maintenance activities not directly associated with the system but in the physical proximity of the system, have required access authorizations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>06</td>
			<td>Timely maintenance</td>
			<td>Obtain maintenance support and/or spare parts for [Assignment: organization-defined system components] within [Assignment: organization-defined time period] of failure.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>06(01)</td>
			<td>Timely maintenance</td>
			<td>Timely maintenance: Preventive maintenance<br />
			Perform preventive maintenance on [Assignment: organization-defined system components] at [Assignment: organization-defined time intervals].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>06(02)</td>
			<td>Timely maintenance</td>
			<td>Timely maintenance: Predictive maintenance<br />
			Perform predictive maintenance on [Assignment: organization-defined system components] at [Assignment: organization-defined time intervals].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>06(03)</td>
			<td>Timely maintenance</td>
			<td>Timely maintenance: Automated support for predictive maintenance<br />
			Transfer predictive maintenance data to a maintenance management system using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MA</td>
			<td>07</td>
			<td>Field maintenance</td>
			<td>Restrict or prohibit field maintenance on [Assignment: organization-defined systems or system components] to [Assignment: organization-defined trusted maintenance facilities].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.10">Table 4.10: Media protection</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>MP</td>
			<td>01</td>
			<td>Media protection policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] media protection policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the media protection policy and the associated media protection controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the media protection policy and procedures.</li>
				<li>Review and update the current media protection:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>02</td>
			<td>Media access</td>
			<td>Restrict access to [Assignment: organization-defined types of digital and/or non-digital media] to [Assignment: organization-defined personnel or roles].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>02(01)</td>
			<td>Media access</td>
			<td>Media access: Automated restricted access<br />
			Withdrawn: Incorporated into MP-04(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>02(02)</td>
			<td>Media access</td>
			<td>Media access: Cryptographic protection<br />
			Withdrawn: Incorporated into SC-28(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>03</td>
			<td>Media marking</td>
			<td>
			<ol class="lst-upr-alph"><li>Mark system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information.</li>
				<li>Exempt [Assignment: organization-defined types of system media] from marking if the media remain within [Assignment: organization-defined controlled areas].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>04</td>
			<td>Media storage</td>
			<td>
			<ol class="lst-upr-alph"><li>Physically control and securely store [Assignment: organization-defined types of digital and/or non-digital media] within [Assignment: organization-defined controlled areas].</li>
				<li>Protect system media types defined in MP-04A until the media are destroyed or sanitized using approved equipment, techniques, and procedures.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>04(01)</td>
			<td>Media storage</td>
			<td>Media storage: Cryptographic protection<br />
			Withdrawn: Incorporated into SC-28(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>04(02)</td>
			<td>Media storage</td>
			<td>Media storage: Automated restricted access<br />
			Restrict access to media storage areas and log access attempts and access granted using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>05</td>
			<td>Media transport</td>
			<td>
			<ol class="lst-upr-alph"><li>Protect and control [Assignment: organization-defined types of system media] during transport outside of controlled areas using [Assignment: organization-defined controls].</li>
				<li>Maintain accountability for system media during transport outside of controlled areas.</li>
				<li>Document activities associated with the transport of system media.</li>
				<li>Restrict the activities associated with the transport of system media to authorized personnel.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>05(01)</td>
			<td>Media transport</td>
			<td>Media transport: Protection outside of controlled areas<br />
			Withdrawn: Incorporated into MP-05.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>05(02)</td>
			<td>Media transport</td>
			<td>Media transport: Documentation of activities<br />
			Withdrawn: Incorporated into MP-05.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>05(03)</td>
			<td>Media transport</td>
			<td>Media transport: Custodians<br />
			Employ an identified custodian during transport of system media outside of controlled areas.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>05(04)</td>
			<td>Media transport</td>
			<td>Media transport: Cryptographic protection<br />
			Withdrawn: Incorporated into SC-28(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06</td>
			<td>Media sanitization</td>
			<td>
			<ol class="lst-upr-alph"><li>Sanitize [Assignment: organization-defined system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures].</li>
				<li>Employ sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(01)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Review, approve, track, document, and verify<br />
			Review, approve, track, document, and verify media sanitization and disposal actions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(02)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Equipment testing<br />
			Test sanitization equipment and procedures [Assignment: organization-defined frequency] to ensure that the intended sanitization is being achieved.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(03)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Non-destructive techniques<br />
			Apply non-destructive sanitization techniques to portable storage devices prior to connecting such devices to the system under the following circumstances: [Assignment: organization-defined circumstances requiring sanitization of portable storage devices].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(04)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Protected information<br />
			Withdrawn: Incorporated into MP-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(05)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Classified information<br />
			Withdrawn: Incorporated into MP-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(06)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Media destruction<br />
			Withdrawn: Incorporated into MP-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(07)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Dual authorization<br />
			Enforce dual authorization for the sanitization of [Assignment: organization-defined system media].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>06(08)</td>
			<td>Media sanitization</td>
			<td>Media sanitization: Remote purging or wiping of information<br />
			Provide the capability to purge or wipe information from [Assignment: organization-defined systems or system components] [Selection: remotely; under the following conditions: [Assignment: organization-defined conditions]].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>[lost, stolen, upon termination of employment]</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>07</td>
			<td>Media use</td>
			<td>
			<ol class="lst-upr-alph"><li>[Selection (one): Restrict; Prohibit] the use of [Assignment: organization-defined types of system media] on [Assignment: organization-defined systems or system components] using [Assignment: organization-defined controls].</li>
				<li>Prohibit the use of portable storage devices in organizational systems when such devices have no identifiable owner.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>07(01)</td>
			<td>Media use</td>
			<td>Media use: Prohibit use without owner<br />
			Withdrawn: Incorporated into MP-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>07(02)</td>
			<td>Media use</td>
			<td>Media use: Prohibit use of sanitization-resistant media<br />
			Prohibit the use of sanitization-resistant media in organizational systems.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>08</td>
			<td>Media downgrading</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish [Assignment: organization-defined system media downgrading process] that includes employing downgrading mechanisms with strength and integrity commensurate with the security category or classification of the information.</li>
				<li>Verify that the system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information.</li>
				<li>Identify [Assignment: organization-defined system media requiring downgrading].</li>
				<li>Downgrade the identified system media using the established process.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>08(01)</td>
			<td>Media downgrading</td>
			<td>Media downgrading: Documentation of process<br />
			Document system media downgrading actions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>08(02)</td>
			<td>Media downgrading</td>
			<td>Media downgrading: Equipment testing<br />
			Test downgrading equipment and procedures [Assignment: organization-defined frequency] to ensure that downgrading actions are being achieved.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>08(03)</td>
			<td>Media downgrading</td>
			<td>Media downgrading: Protected information<br />
			Downgrade system media containing protected information prior to public release.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>MP</td>
			<td>08(04)</td>
			<td>Media downgrading</td>
			<td>Media downgrading: Classified information<br />
			Downgrade system media containing classified information prior to release to individuals without required access authorizations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.11">Table 4.11: Physical and environmental protection</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>PE</td>
			<td>01</td>
			<td>Physical and environmental protection policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] physical and environmental protection policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the physical and environmental protection policy and the associated physical and environmental protection controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures</li>
				<li>Review and update the current physical and environmental protection:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>02</td>
			<td>Physical access authorizations</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, approve, and maintain a list of individuals with authorized access to the facility where the system resides.</li>
				<li>Issue authorization credentials for facility access.</li>
				<li>Review the access list detailing authorized facility access by individuals [Assignment: organization-defined frequency].</li>
				<li>Remove individuals from the facility access list when access is no longer required.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>02(01)</td>
			<td>Physical access authorizations</td>
			<td>Physical access authorizations: Access by position and role<br />
			Authorize physical access to the facility where the system resides based on position or role.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>02(02)</td>
			<td>Physical access authorizations</td>
			<td>Physical access authorizations: Two forms of identification<br />
			Require two forms of identification from the following forms of identification for visitor access to the facility where the system resides: [Assignment: organization-defined list of acceptable forms of identification].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>02(03)</td>
			<td>Physical access authorizations</td>
			<td>Physical access authorizations: Restrict unescorted access<br />
			Restrict unescorted access to the facility where the system resides to personnel with [Selection (one or more): security clearances for all information contained within the system; formal access authorizations for all information contained within the system; need for access to all information contained within the system; [Assignment: organization-defined physical access authorizations]].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>02(400)</td>
			<td>Physical access authorizations</td>
			<td>Physical access authorizations: Identification card requirements<br />
			Ensure identification cards meet requirements prior to issuance.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03</td>
			<td>Physical access control</td>
			<td>
			<ol class="lst-upr-alph"><li>Enforce physical access authorizations at [Assignment: organization-defined entry and exit points to the facility where the system resides] by:
				<ol><li>verifying individual access authorizations before granting access to the facility</li>
					<li>controlling ingress and egress to the facility using [Selection (one or more): [Assignment: organization-defined physical access control systems or devices]; guards].</li>
				</ol></li>
				<li>Maintain physical access audit logs for [Assignment: organization-defined entry or exit points].</li>
				<li>Control access to areas within the facility designated as publicly accessible by implementing the following controls: [Assignment: organization-defined physical access controls].</li>
				<li>Escort visitors and control visitor activity [Assignment: organization-defined circumstances requiring visitor escorts and control of visitor activity].</li>
				<li>Secure keys, access cards, combinations, safes, cipher locks, and other physical access devices.</li>
				<li>Inventory [Assignment: organization-defined physical access devices] every [Assignment: organization-defined frequency].</li>
				<li>Change combinations and keys [Assignment: organization-defined frequency] and/or when keys are lost, or combinations are compromised, or when individuals possessing the keys or combinations are transferred or terminated.</li>
				<li>Remove the access card identifier from the access list or database [Assignment: organization-defined frequency] when the access card is lost, misplaced, stolen, or when the individual possessing the card is transferred or terminated.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>According to the <abbr title="Treasury Board Secretariat">TBS</abbr> Policy on Government Security and <abbr title="Royal Canadian Mounted Police">RCMP</abbr> GCPSG-006 Access Management Guide, access to sensitive information and areas must be limited. A physical Operations Zone is the minimum required where sensitive <abbr title="Government of Canada">GC</abbr> information is processed or stored. A TRA must be performed to ensure the appropriate level of physical security to protect Protected B information and information systems processing and storing <abbr title="Protected B">PB</abbr> data. This zone is an area where access is limited to personnel who work there and to properly-escorted visitors by an employee with a valid reliability status; it must be indicated by a recognizable perimeter and monitored periodically.</td>
		</tr><tr><td>PE</td>
			<td>03(01)</td>
			<td>Physical access control</td>
			<td>Physical access control: System access<br />
			Enforce physical access authorizations to the system in addition to the physical access controls for the facility at [Assignment: organization-defined physical spaces containing one or more components of the system].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(02)</td>
			<td>Physical access control</td>
			<td>Physical access control: Facility and systems<br />
			Perform security checks [Assignment: organization-defined frequency] at the physical perimeter of the facility or system for exfiltration of information or removal of system components.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(03)</td>
			<td>Physical access control</td>
			<td>Physical access control: Continuous guards<br />
			Employ guards to control [Assignment: organization-defined physical access points] to the facility where the system resides 24 hours per day, 7 days per week.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(04)</td>
			<td>Physical access control</td>
			<td>Physical access control: Lockable casings<br />
			Use lockable physical casings to protect [Assignment: organization-defined system components] from unauthorized physical access.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(05)</td>
			<td>Physical access control</td>
			<td>Physical access control: Tamper protection<br />
			Employ [Assignment: organization-defined anti-tamper technologies] to [Selection (one or more): detect; prevent] physical tampering or alteration of [Assignment: organization-defined hardware components] within the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(06)</td>
			<td>Physical access control</td>
			<td>Physical access control: Facility penetration testing<br />
			Withdrawn: Incorporated into CA-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(07)</td>
			<td>Physical access control</td>
			<td>Physical access control: Physical barriers<br />
			Limit access using physical barriers.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(08)</td>
			<td>Physical access control</td>
			<td>Physical access control: Access control vestibules<br />
			Employ access control vestibules at [Assignment: organization-defined locations within the facility].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>03(400)</td>
			<td>Physical access control</td>
			<td>Physical access control: Security inspections<br />
			Conduct security inspections in facilities where sensitive or valuable information or assets are handled or stored, or in facilities supporting critical services or activities.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td><abbr title="Government of Canada">GC</abbr> specific.</td>
		</tr><tr><td>PE</td>
			<td>04</td>
			<td>Access control for transmission</td>
			<td>Control physical access to [Assignment: organization-defined system distribution and transmission lines] within organizational facilities using [Assignment: organization-defined security controls].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>05</td>
			<td>Access control for output devices</td>
			<td>Control physical access to output from [Assignment: organization-defined output devices] to prevent unauthorized individuals from obtaining the output.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>05(01)</td>
			<td>Access control for output devices</td>
			<td>Access control for output devices: Access to output by authorized individuals<br />
			Withdrawn: Incorporated into PE-05.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>05(02)</td>
			<td>Access control for output devices</td>
			<td>Access control for output devices: Link to individual identity<br />
			Link individual identity to receipt of output from output devices.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>05(03)</td>
			<td>Access control for output devices</td>
			<td>Access control for output devices: Marking output devices<br />
			Withdrawn: Incorporated into PE-22.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>06</td>
			<td>Monitoring physical access</td>
			<td>
			<ol class="lst-upr-alph"><li>Monitor physical access to the facility where the system resides to detect and respond to physical security incidents.</li>
				<li>Review physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment: organization-defined events or potential indications of events].</li>
				<li>Coordinate results of reviews and investigations with the organizational incident response capability.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>06(01)</td>
			<td>Monitoring physical access</td>
			<td>Monitoring physical access: Intrusion alarms and surveillance equipment<br />
			Monitor physical access to the facility where the system resides using physical intrusion alarms and surveillance equipment.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>06(02)</td>
			<td>Monitoring physical access</td>
			<td>Monitoring physical access: Automated intrusion recognition and responses<br />
			Recognize [Assignment: organization-defined classes or types of intrusions] and initiate [Assignment: organization-defined response actions] using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>06(03)</td>
			<td>Monitoring physical access</td>
			<td>Monitoring physical access: Video surveillance
			<ol class="lst-lwr-alph"><li>Employ video surveillance of [Assignment: organization-defined operational areas].</li>
				<li>Review video recordings [Assignment: organization-defined frequency].</li>
				<li>Retain video recordings for [Assignment: organization-defined time period].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>06(04)</td>
			<td>Monitoring physical access</td>
			<td>Monitoring physical access: Monitoring physical access to systems<br />
			Monitor physical access to the system in addition to the physical access monitoring of the facility at [Assignment: organization-defined physical spaces containing one or more components of the system].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>07</td>
			<td>Visitor control</td>
			<td>Withdrawn: Incorporated into PE-02 and PE-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>08</td>
			<td>Visitor access records</td>
			<td>
			<ol class="lst-upr-alph"><li>Maintain visitor access records to the facility where the system resides for [Assignment: organization-defined time period].</li>
				<li>Review visitor access records [Assignment: organization-defined frequency].</li>
				<li>Report anomalies in visitor access records to [Assignment: organization-defined personnel].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>08(01)</td>
			<td>Visitor access records</td>
			<td>Visitor access records: Automated records maintenance and review<br />
			Maintain and review visitor access records using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>08(02)</td>
			<td>Visitor access records</td>
			<td>Visitor access records: Physical access records<br />
			Withdrawn: Incorporated into PE-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>08(03)</td>
			<td>Visitor access records</td>
			<td>Visitor access records: limit personal information elements<br />
			Limit personal information contained in visitor access records to the following elements identified in the privacy risk assessment: [Assignment: organization-defined elements].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>09</td>
			<td>Power equipment and cabling</td>
			<td>Protect power equipment and power cabling for the system from damage and destruction.</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>09(01)</td>
			<td>Power equipment and cabling</td>
			<td>Power equipment and cabling: Redundant cabling<br />
			Employ redundant power cabling paths that are physically separated by [Assignment: organization-defined distance].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>09(02)</td>
			<td>Power equipment and cabling</td>
			<td>Power equipment and cabling: Automatic voltage controls<br />
			Employ automatic voltage controls for [Assignment: organization-defined critical system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>10</td>
			<td>Emergency shutoff</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide the capability of shutting off power to [Assignment: organization-defined system or individual system components] in emergency situations.</li>
				<li>Place emergency shutoff switches or devices in [Assignment: organization-defined location by system or system component] to facilitate access for authorized personnel.</li>
				<li>Protect emergency power shutoff capability from unauthorized activation.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>10(01)</td>
			<td>Emergency shutoff</td>
			<td>Emergency shutoff: Accidental / unauthorized activation<br />
			Withdrawn: Incorporated into PE-10.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>11</td>
			<td>Emergency power</td>
			<td>Provide an uninterruptible power supply to facilitate [Selection (one or more): an orderly shutdown of the system; transition of the system to long-term alternate power] in the event of a primary power source loss.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>11(01)</td>
			<td>Emergency power</td>
			<td>Emergency power: Alternate power supply - minimal operational capability<br />
			Provide an alternate power supply for the system that is activated [Selection (one): manually; automatically] and that can maintain minimally required operational capability in the event of an extended loss of the primary power source.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>11(02)</td>
			<td>Emergency power</td>
			<td>Emergency power: Alternate power supply - self-contained<br />
			Provide an alternate power supply for the system that is activated [Selection (one): manually; automatically] and that is:
			<ol class="lst-lwr-alph"><li>self-contained</li>
				<li>not reliant on external power generation</li>
				<li>capable of maintaining [Selection (one): minimally required operational capability; full operational capability] in the event of an extended loss of the primary power source</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>12</td>
			<td>Emergency lighting</td>
			<td>Employ and maintain automatic emergency lighting for the system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>12(01)</td>
			<td>Emergency lighting</td>
			<td>Emergency lighting: Essential missions and business functions<br />
			Provide emergency lighting for all areas within the facility supporting essential mission and business functions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>13</td>
			<td>Fire protection</td>
			<td>Employ and maintain fire detection and suppression systems that are supported by an independent energy source.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>13(01)</td>
			<td>Fire protection</td>
			<td>Fire protection: Detection systems - automatic activation and notification<br />
			Employ fire detection systems that activate automatically and notify [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders] in the event of a fire.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>13(02)</td>
			<td>Fire protection</td>
			<td>Fire protection: Suppression systems - automatic activation and notification
			<ol class="lst-lwr-alph"><li>Employ fire suppression systems that activate automatically and notify [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders].</li>
				<li>Employ an automatic fire suppression capability when the facility is not staffed on a continuous basis.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>13(03)</td>
			<td>Fire protection</td>
			<td>Fire protection: Automatic fire suppression<br />
			Withdrawn: Incorporated into PE-13(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>13(04)</td>
			<td>Fire protection</td>
			<td>Fire protection: Inspections<br />
			Ensure that the facility undergoes [Assignment: organization-defined frequency] fire protection inspections by authorized and qualified inspectors and identified deficiencies are resolved within [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>13(400)</td>
			<td>Fire protection</td>
			<td>Fire protection: Emergency services<br />
			Ensure that firefighting water capacity and effective response times of emergency services are considered when developing safeguarding strategies.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td><abbr title="Government of Canada">GC</abbr> specific</td>
		</tr><tr><td>PE</td>
			<td>14</td>
			<td>Environmental controls</td>
			<td>
			<ol class="lst-upr-alph"><li>Maintain [Selection (one or more): temperature; humidity; pressure; radiation; [Assignment: organization-defined environmental control]] levels within the facility where the system resides at [Assignment: organization-defined acceptable levels].</li>
				<li>Monitor environmental control levels [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>14(01)</td>
			<td>Environmental controls</td>
			<td>Environmental controls: Automatic controls<br />
			Employ the following automatic environmental controls in the facility to prevent fluctuations potentially harmful to the system: [Assignment: organization-defined automatic environmental controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>14(02)</td>
			<td>Environmental controls</td>
			<td>Environmental controls: Monitoring with alarms and notifications<br />
			Employ environmental control monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment to [Assignment: organization-defined personnel or roles].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>15</td>
			<td>Water damage protection</td>
			<td>Protect the system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>15(01)</td>
			<td>Water damage protection</td>
			<td>Water damage protection: Automation support<br />
			Detect the presence of water near the system and alert [Assignment: organization-defined personnel or roles] using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>16</td>
			<td>Delivery and removal</td>
			<td>
			<ol class="lst-upr-alph"><li>Authorize and control [Assignment: organization-defined types of system components] entering and exiting the facility.</li>
				<li>Maintain records of the system components.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>17</td>
			<td>Alternate work site</td>
			<td>
			<ol class="lst-upr-alph"><li>Determine and document the [Assignment: organization-defined alternate work sites] allowed for use by employees.</li>
				<li>Employ the following controls at alternate work sites: [Assignment: organization-defined controls].</li>
				<li>Assess the effectiveness of controls at alternate work sites.</li>
				<li>Provide a means for employees to communicate with information security and privacy personnel in case of incidents.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>18</td>
			<td>Location of system components</td>
			<td>Position system components within the facility to minimize potential damage from [Assignment: organization-defined physical and environmental hazards] and to minimize the opportunity for unauthorized access.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>18(01)</td>
			<td>Location of system components</td>
			<td>Location of system components: Facility site<br />
			Withdrawn: Moved to PE-23.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>19</td>
			<td>Information leakage</td>
			<td>Protect the system from information leakage due to electromagnetic signals emanations.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>19(01)</td>
			<td>Information leakage</td>
			<td>Information leakage: National emissions policies and procedures<br />
			Protect system components, associated data communications, and networks in accordance with national emissions security (EMSEC) policies and procedures based on the security category or classification of the information.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>20</td>
			<td>Asset monitoring and tracking</td>
			<td>Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>21</td>
			<td>Electromagnetic pulse protection</td>
			<td>Employ [Assignment: organization-defined protective measures] against electromagnetic pulse damage for [Assignment: organization-defined systems and system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>22</td>
			<td>Component marking</td>
			<td>Mark [Assignment: organization-defined system hardware components] indicating the impact level or classification level of the information permitted to be processed, stored, or transmitted by the hardware component.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>23</td>
			<td>Facility location</td>
			<td>
			<ol class="lst-upr-alph"><li>Plan the location or site of the facility where the system resides considering physical and environmental hazards.</li>
				<li>For existing facilities, consider the physical and environmental hazards in the organizational risk management strategy.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PE</td>
			<td>400</td>
			<td>Remote and telework environments</td>
			<td>
			<ol class="lst-upr-alph"><li>Assess physical security of remote or telework environments.</li>
				<li>Apply appropriate protection and storage requirements for information and assets.</li>
				<li>Use approved security equipment and electronic devices in accordance with the categorization of material.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td><abbr title="Government of Canada">GC</abbr> specific.</td>
		</tr><tr><td>PE</td>
			<td>400(01)</td>
			<td>Remote and telework environments</td>
			<td>Remote and telework environments: Physical information and assets storage<br />
			Store physical information and assets in accordance with <abbr title="Royal Canadian Mounted Police">RCMP</abbr> guidance and departmentally established security practices.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td><abbr title="Government of Canada">GC</abbr> specific.</td>
		</tr><tr><td>PE</td>
			<td>400(02)</td>
			<td>Remote and telework environments</td>
			<td>Remote and telework environments: International remote/telework<br />
			Allow requests for remote/telework from international locations only under exceptional circumstances.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td><abbr title="Government of Canada">GC</abbr> specific.</td>
		</tr><tr><td>PE</td>
			<td>401</td>
			<td>Security operations centre</td>
			<td>Establish and maintain a Security Operations Centre (SOC) to protect the organization’s people, property, assets, and information, through physical and technical surveillance and monitoring.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.12">Table 4.12: Planning</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>PL</td>
			<td>01</td>
			<td>Security planning policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] planning policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, jurisprudence, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the planning policy and the associated planning controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the planning policy and procedures.</li>
				<li>Review and update the current planning:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>02</td>
			<td>System security and privacy plans</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop security and privacy plans for the system that:
				<ol><li>are consistent with the organization’s enterprise architecture</li>
					<li>explicitly define the constituent system components</li>
					<li>describe the operational context of the system in terms of mission and business processes</li>
					<li>identify the individuals that fulfill system roles and responsibilities</li>
					<li>identify the information types processed, stored, and transmitted by the system</li>
					<li>provide the security categorization of the system, including supporting rationale</li>
					<li>describe any specific threats to the system that are of concern to the organization</li>
					<li>provide the results of a privacy risk assessment for systems handling personal information</li>
					<li>describe the operational environment for the system and any dependencies on or connections to other systems or system components</li>
					<li>provide an overview of the security and privacy requirements for the system</li>
					<li>identify any relevant control baselines or overlays, if applicable</li>
					<li>describe the controls in place or planned for meeting the security and privacy requirements, including a rationale for any tailoring decisions</li>
					<li>include risk determinations for security and privacy architecture and design decisions</li>
					<li>include security- and privacy-related activities affecting the system that require planning and coordination with [Assignment: organization-defined individuals or groups]</li>
					<li>are reviewed and approved by the authorizing official or designated representative prior to plan implementation</li>
				</ol><ol start="400"><li>document the business purposes for the processing of personal information</li>
					<li>define retention and disposition standards for personal information stored within the system</li>
				</ol></li>
				<li>Distribute copies of the plans and communicate subsequent changes to the plans to [Assignment: organization-defined personnel or roles].</li>
				<li>Review the plans [Assignment: organization-defined frequency].</li>
				<li>Update the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments.</li>
				<li>Protect the plans from unauthorized disclosure and modification.</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>02(01)</td>
			<td>System security and privacy plans</td>
			<td>System security and privacy plans: Concept of operations<br />
			Withdrawn: Incorporated into PL-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>02(02)</td>
			<td>System security and privacy plans</td>
			<td>System security and privacy plans: Functional architecture<br />
			Withdrawn: Incorporated into PL-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>02(03)</td>
			<td>System security and privacy plans</td>
			<td>System security and privacy plans: Plan / coordinate<br />
			Withdrawn: Incorporated into PL-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>03</td>
			<td>System security plan update</td>
			<td>Withdrawn: Incorporated into PL-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>04</td>
			<td>Rules of behaviour</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish and provide to individuals requiring access to the system the rules that describe their responsibilities and expected behaviour for information and system usage, security, and privacy.</li>
				<li>Receive a documented acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the system.</li>
				<li>Review and update the rules of behaviour [Assignment: organization-defined frequency].</li>
				<li>Require individuals who have acknowledged a previous version of the rules of behaviour to read and re-acknowledge [Selection (one or more): [Assignment: organization-defined frequency]; when the rules are revised or updated].</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>04(01)</td>
			<td>Rules of behaviour</td>
			<td>Rules of behaviour: Social media and external site/ application usage restriction<br />
			Include in the rules of behaviour restrictions on:
			<ol class="lst-lwr-alph"><li>use of social media, social networking sites, and external sites/applications</li>
				<li>posting organizational information on public websites</li>
				<li>use of organization-provided identifiers (for example, email addresses) and authentication secrets (for example, passwords) for creating accounts on external sites/applications</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>05</td>
			<td>Privacy impact assessment</td>
			<td>Withdrawn: Incorporated into RA-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>06</td>
			<td>Security-related activity planning</td>
			<td>Withdrawn: Incorporated into PL-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>07</td>
			<td>Concepts of operation</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop a Concept of Operations (CONOPS) for the system describing how the organization intends to operate the system from the perspective of information security and privacy.</li>
				<li>Review and update the <abbr title="Concept of Operations">CONOPS</abbr> [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>08</td>
			<td>Security and privacy architectures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop security and privacy architectures for the system that describe:
				<ol><li>the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information</li>
					<li>the requirements and approach to be taken for handling personal information to minimize any privacy risk to individuals</li>
					<li>how the architectures are integrated into and support the enterprise architecture</li>
					<li>any assumptions about, and dependencies on, external systems and services</li>
				</ol></li>
				<li>Review and update the architectures [Assignment: organization-defined frequency] to reflect changes in the enterprise architecture.</li>
				<li>Reflect planned architecture changes in security and privacy plans, <abbr title="Concept of Operations">CONOPS</abbr>, criticality analysis, organizational procedures, and procurements and acquisitions.</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>08(01)</td>
			<td>Security and privacy architectures</td>
			<td>Security and privacy architectures: Defence-in-depth<br />
			Design the security and privacy architectures for the system using a defence-in-depth approach that:
			<ol class="lst-lwr-alph"><li>allocates [Assignment: organization-defined controls] to [Assignment: organization-defined locations and architectural layers]</li>
				<li>ensures that the allocated controls operate in a coordinated and mutually reinforcing manner</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>08(02)</td>
			<td>Security and privacy architectures</td>
			<td>Security and privacy architectures: Supplier diversity<br />
			Require that [Assignment: organization-defined controls] allocated to [Assignment: organization-defined locations and architectural layers] are obtained from different suppliers.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>09</td>
			<td>Central management</td>
			<td>Centrally manage [Assignment: organization-defined controls and related processes].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>10</td>
			<td>Baseline selection</td>
			<td>Select a control baseline for the system.</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PL</td>
			<td>11</td>
			<td>Baseline tailoring</td>
			<td>Tailor the selected control baseline by applying specified tailoring actions.</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.13">Table 4.13: Program management</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>PM</td>
			<td>01</td>
			<td>Information security program plan</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop and disseminate an organization-wide information security program plan that:
				<ol><li>provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements</li>
					<li>includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
					<li>reflects the coordination among organizational entities responsible for information security</li>
					<li>is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and Canada</li>
				</ol></li>
				<li>Review and update the organization-wide information security program plan [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].</li>
				<li>Protect the information security program plan from unauthorized disclosure and modification.</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>02</td>
			<td>Information security program leadership role</td>
			<td>Appoint a senior official in the department’s security governance with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>03</td>
			<td>Information security and privacy resources</td>
			<td>
			<ol class="lst-upr-alph"><li>Include the resources needed to implement the information security and privacy programs in capital planning and investment requests and document all exceptions to this requirement.</li>
				<li>Prepare documentation required for addressing information security and privacy programs in capital planning and investment requests in accordance with applicable laws, Orders in Council, directives, policies, regulations, standards.</li>
				<li>Make the planned information security and privacy resources available for expenditure.</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>04</td>
			<td>Plan of action and milestones process</td>
			<td>
			<ol class="lst-upr-alph"><li>Implement a process to ensure that plans of action and milestones for the information security, privacy, and supply chain risk management programs and associated organizational systems:
				<ol><li>are developed and maintained</li>
					<li>document the remedial information security, privacy, and supply chain risk management actions to adequately respond to risk to organizational operations and assets, individuals, other organizations, and Canada</li>
					<li>are reported in accordance with established reporting requirements</li>
				</ol></li>
				<li>Review plans of action and milestones for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>05</td>
			<td>System and program inventory</td>
			<td>Develop and update [Assignment: organization-defined frequency] an inventory of organizational systems and programs.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>05(01)</td>
			<td>System and program inventory</td>
			<td>System and program inventory: Inventory of personal information<br />
			Establish, maintain, and update [Assignment: organization-defined frequency] an inventory of all systems, programs, applications, and projects that process personal information.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>06</td>
			<td>Measures of performance</td>
			<td>Develop, monitor, and report on the results of information security and privacy measures of performance.</td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>07</td>
			<td>Enterprise architecture</td>
			<td>Develop and maintain an enterprise architecture with consideration for information security, privacy, and the resulting risk to organizational operations and assets, individuals, other organizations, and Canada.</td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>07(01)</td>
			<td>Enterprise architecture</td>
			<td>Enterprise architecture: Offloading<br />
			Offload [Assignment: organization-defined non-essential functions or services] to other systems, system components, or an external provider.</td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>08</td>
			<td>Critical infrastructure plan</td>
			<td>Address information security and privacy issues in the development, documentation, and updating of a critical infrastructure and key resources protection plan.</td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>09</td>
			<td>Risk management strategy</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop a comprehensive strategy to manage the:
				<ol><li>security risks to organizational operations and assets, individuals, other organizations, and Canada associated with the operation and use of organizational systems</li>
					<li>privacy risks to individuals resulting from the authorized handling of personal information</li>
				</ol></li>
				<li>Implement the risk management strategy consistently across the organization.</li>
				<li>Review and update the risk management strategy [Assignment: organization-defined frequency] or as required, to address organizational changes.</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>10</td>
			<td>Authorization process</td>
			<td>
			<ol class="lst-upr-alph"><li>Manage the security and privacy state of organizational systems and the environments in which those systems operate through authorization processes.</li>
				<li>Designate individuals to fulfill specific roles and responsibilities within the organizational risk management process.</li>
				<li>Integrate the authorization processes into an organization-wide risk management program.</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>11</td>
			<td>Mission and business process definition</td>
			<td>
			<ol class="lst-upr-alph"><li>Define organizational mission and business processes with consideration for information security and privacy protection and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and Canada.</li>
				<li>Determine information protection and personal information handling needs arising from the defined mission and business processes.</li>
				<li>Review and revise the mission and business processes [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>12</td>
			<td>Insider threat program</td>
			<td>Implement an insider threat program that includes a cross-discipline insider threat incident handling team.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>13</td>
			<td>Security and privacy workforce</td>
			<td>Establish a security and privacy workforce development and improvement program.</td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>14</td>
			<td>Testing, training, and monitoring</td>
			<td>
			<ol class="lst-upr-alph"><li>Implement a process for ensuring that organizational plans for conducting security and privacy testing, training, and monitoring activities associated with organizational systems:
				<ol><li>are developed and maintained</li>
					<li>continue to be executed</li>
				</ol></li>
				<li>Review testing, training, and monitoring plans for consistency with the organizational security and privacy risk management strategy and organization-wide priorities for risk response actions.</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>15</td>
			<td>Security and privacy groups and associations</td>
			<td>Establish and institutionalize contact with selected groups and associations within the security and privacy communities to:
			<ol class="lst-upr-alph"><li>facilitate ongoing security and privacy education and training for organizational personnel</li>
				<li>maintain currency with recommended security and privacy practices, techniques, and technologies</li>
				<li>share current security and privacy information, including threats, vulnerabilities, and incidents</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>16</td>
			<td>Threat awareness program</td>
			<td>Implement a threat awareness program that includes a cross-organization information-sharing capability for threat intelligence.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>16(01)</td>
			<td>Threat awareness program</td>
			<td>Threat awareness program: Automated means for sharing threat intelligence<br />
			Employ automated mechanisms to maximize the effectiveness of sharing threat intelligence information.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>17</td>
			<td>Protecting controlled information on outsourced external systems</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish policy and procedures to ensure that requirements for the protection of controlled information that is processed, stored, or transmitted on external systems, are implemented in accordance with applicable laws, Orders in Council, directives, policies, regulations, and standards.</li>
				<li>Review and update the policy and procedures [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>18</td>
			<td>Privacy program plan</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop and disseminate an organization-wide privacy program plan that provides an overview of the organization’s privacy program, and:
				<ol><li>includes a description of the structure of the service delivery program for privacy and the resources dedicated to the privacy program</li>
					<li>provides an overview of the requirements for the privacy program and a description of the privacy program management controls and common controls in place or planned for meeting those requirements</li>
					<li>includes the role of the appropriate privacy senior official or executive, describes the formal delegation of authority from the Deputy Head, and identifies and assigns the roles of other privacy officials and staff and their responsibilities</li>
					<li>describes management commitment, compliance requirements, and the strategic goals and objectives of the privacy program</li>
					<li>reflects coordination among organizational entities responsible for the different aspects of privacy</li>
					<li>is approved by a senior official with responsibility and accountability for the privacy risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and Canada</li>
				</ol></li>
				<li>Update the plan [Assignment: organization-defined frequency] and address changes in the application of federal privacy laws based on jurisprudence and policy and organizational changes and problems identified during plan implementation or privacy control assessments.</li>
			</ol><ol class="lst-upr-alph" start="27"><li>Ensure the privacy program plan is communicated and made available to personnel responsible for implementing the plan.</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>19</td>
			<td>Privacy program leadership role</td>
			<td>Appoint an appropriate privacy senior official or executive with the authority, mission, accountability, and resources to coordinate, develop, and implement, applicable privacy requirements and manage privacy risks through the organization-wide privacy program.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>20</td>
			<td>Communication of key privacy services</td>
			<td>Maintain a central resource webpage on the organization’s principal public website that serves as a central source of information about the organization’s privacy services and that:
			<ol class="lst-upr-alph"><li>ensures that the public has access to a list of programs and services that collect and use personal information via Info Source</li>
				<li>ensures that organizational privacy policies, practices and resources are published in the Annual Report to Parliament on the Administration of the <em>Privacy Act</em></li>
				<li>communicates publicly facing email addresses and/or phone lines to enable the public to provide feedback and/or direct questions to privacy offices regarding privacy practices</li>
			</ol><ol class="lst-upr-alph" start="27"><li>includes summaries of completed Privacy Impact Assessments</li>
				<li>includes direction to individuals about how to file a request to access their personal information, how to file a formal records correction and how to file a formal complaint, if they choose to do so</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>20(01)</td>
			<td>Communication of key privacy services</td>
			<td>Communication of key privacy services: Privacy policies on websites, applications, and digital services<br />
			Develop and post privacy policies on all external-facing websites, mobile applications, and other digital services, if the privacy of websites visitors could be affected. Ensure that policies:
			<ol class="lst-lwr-alph"><li>are written in plain language and organized in a way that is easy to understand and navigate</li>
				<li>provide information needed by the public to make an informed decision about whether and how to interact with the organization</li>
				<li>are updated whenever the organization makes a substantive change to the practices it describes and includes a time/date stamp to inform the public of the date of the most recent changes</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>21</td>
			<td>Maintain a record of disclosures</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish procedures for, and maintain a record of disclosures of personal information including the:
				<ol><li>date and details of the disclosure</li>
					<li>position and address, or other contact information of the individual or organization to which the disclosure was made</li>
				</ol></li>
				<li>Keep a record of disclosures for the length of the time the personal information is maintained or as required by organization’s information management standards.</li>
				<li>Make the record of disclosure available to the individual to whom the personal information relates, upon request, unless the disclosure meets the exemptions cited in the <em>Privacy Act</em>.</li>
			</ol><ol class="lst-upr-alph" start="27"><li>Establish a contract, information sharing agreement or information sharing arrangement to document appropriate safeguards prior to any disclosure of personal information to another federal program or to another public or private sector entity.</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>22</td>
			<td>Personal information quality management</td>
			<td>Develop and document organization-wide policies and procedures for:
			<ol class="lst-upr-alph"><li>reviewing for the accuracy, relevance, timeliness, and completeness of personal information across the information lifecycle</li>
				<li>implementing records correction process that facilitates correcting or deleting inaccurate or outdated personal information</li>
				<li>implementing records correction process that facilitates disseminating notice of corrected personal information when the incorrect information has been disclosed previously</li>
			</ol><ol class="lst-upr-alph" start="27"><li>ensuring that collection procedures adhere to the requirements of applicable legislation</li>
				<li>documenting any changes or modifications to the information, including the date and sources of the information change</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>23</td>
			<td>Data governance committee</td>
			<td>Establish a data governance committee consisting of [Assignment: organization-defined roles] with [Assignment: organization-defined responsibilities].</td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>24</td>
			<td>Data integrity board</td>
			<td>Establish a data integrity board to:
			<ol class="lst-upr-alph"><li>review proposals to conduct or participate in a matching program</li>
				<li>conduct an annual review of all matching programs in which the organization has participated</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>25</td>
			<td>Minimization of personal information used in testing, training, and research</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and implement policies and procedures that address the use of personal information for internal testing, training, and research.</li>
				<li>Limit or minimize the amount of personal information used for internal testing, training, and research purposes.</li>
				<li>Authorize the use of personal information in internal testing, training, and research when the required result cannot be achieved without the use of the personal information.</li>
				<li>Review and update policies and procedures [Assignment: organization-defined frequency].</li>
			</ol><ol class="lst-upr-alph"><li>Restrict the disclosure of datasets containing personal information to external contractors, wherever possible.</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>26</td>
			<td>Complaint management</td>
			<td>Implement a process for receiving and responding to complaints, concerns, or questions from individuals about the organizational security and privacy practices that includes:
			<ol class="lst-upr-alph"><li>mechanisms that are easy to use and readily accessible by the public</li>
				<li>all information necessary for successfully filing complaints</li>
				<li>tracking mechanisms to ensure all complaints received are reviewed and addressed within [Assignment: organization-defined time period]</li>
				<li>acknowledgement of receipt of complaints, concerns, or questions from individuals within [Assignment: organization-defined time period]</li>
				<li>response, with discretion, to complaints, concerns, or questions from individuals within [Assignment: organization-defined time period]</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>27</td>
			<td>Privacy reporting</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop [Assignment: organization-defined privacy reports] and disseminate to:
				<ol><li>[Assignment: organization-defined oversight bodies] to demonstrate accountability with statutory, regulatory, and policy privacy mandates</li>
					<li>[Assignment: organization-defined officials] and other personnel with responsibility for monitoring privacy program compliance</li>
				</ol></li>
				<li>Review and update privacy reports [Assignment: organization-defined frequency].</li>
			</ol><ol class="lst-upr-alph" start="27"><li>Federal departments and agencies are required to report details related to the administration of the <em>Privacy Act</em> to both Parliament and <abbr title="Treasury Board Secretariat">TBS</abbr>, as per section 72 of the <em>Privacy Act</em>.</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>28</td>
			<td>Risk framing</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify and document:
				<ol><li>assumptions affecting risk assessments, risk responses, and risk monitoring</li>
					<li>constraints affecting risk assessments, risk responses, and risk monitoring</li>
					<li>priorities and trade-offs considered by the organization for managing risk</li>
					<li>organizational risk tolerance</li>
				</ol></li>
				<li>Distribute the results of risk framing activities to [Assignment: organization-defined personnel].</li>
				<li>Review and update risk framing considerations [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>29</td>
			<td>Risk management program leadership roles</td>
			<td>
			<ol class="lst-upr-alph"><li>Appoint a senior accountable official for risk management to align organizational information security and privacy management processes with strategic, operational, and budgetary planning processes.</li>
				<li>Establish a risk executive (function) to view and analyze risk from an organization-wide perspective and ensure management of risk is consistent across the organization.</li>
			</ol></td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>30</td>
			<td>Supply chain risk management strategy</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop an organization-wide strategy for managing supply chain risks associated with the development, acquisition, maintenance, and disposal of systems, system components, and system services.</li>
				<li>Implement the supply chain risk management strategy consistently across the organization.</li>
				<li>Review and update the supply chain risk management strategy on [Assignment: organization-defined frequency] or as required, to address organizational changes.</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>30(01)</td>
			<td>Supply chain risk management strategy</td>
			<td>Supply chain risk management strategy: Suppliers of critical or mission-essential items<br />
			Identify, prioritize, and assess suppliers of critical or mission-essential technologies, products, and services.</td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>31</td>
			<td>Continuous monitoring strategy</td>
			<td>Develop an organization-wide continuous monitoring strategy and implement continuous monitoring programs that include:
			<ol class="lst-upr-alph"><li>the establishment of the following organization-wide metrics to be monitored: [Assignment: organization-defined metrics]</li>
				<li>the establishment of [Assignment: organization-defined monitoring frequencies] and [Assignment: organization-defined assessment frequencies] for control effectiveness</li>
				<li>ongoing monitoring of organizationally-defined metrics in accordance with the continuous monitoring strategy</li>
				<li>correlation and analysis of information generated by control assessments and monitoring</li>
				<li>response actions to address results of the analysis of control assessment and monitoring information</li>
				<li>reporting on the security and privacy status of organizational systems to [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency]</li>
			</ol></td>
			<td>Activity</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PM</td>
			<td>32</td>
			<td>Purposing</td>
			<td>Analyze [Assignment: organization-defined systems or systems components] supporting mission essential services or functions to ensure that the information resources are being used consistent with their intended purpose.</td>
			<td>Control</td>
			<td>Deployed organization-wide. Not associated with baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.14">Table 4.14: Personnel security</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>PS</td>
			<td>01</td>
			<td>Personnel security policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] personnel security policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the personnel security policy and the associated personnel security controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the personnel security policy and procedures.</li>
				<li>Review and update the current personnel security:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>02</td>
			<td>Position security analysis</td>
			<td>
			<ol class="lst-upr-alph"><li>Determine the security screening requirements of all organizational positions.</li>
				<li>Establish screening criteria for individuals filling those positions.</li>
				<li>Review and update position security screening requirement [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>03</td>
			<td>Personnel screening</td>
			<td>
			<ol class="lst-upr-alph"><li>Screen individuals prior to authorizing access to the system.</li>
				<li>Rescreen individuals in accordance with [Assignment: organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of rescreening].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>03(01)</td>
			<td>Personnel screening</td>
			<td>Personnel screening: Classified information<br />
			Verify that individuals accessing a system processing, storing, or transmitting classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>03(02)</td>
			<td>Personnel screening</td>
			<td>Personnel screening: Formal indoctrination<br />
			Verify that individuals accessing a system processing, storing, or transmitting types of classified information that require formal indoctrination, are formally indoctrinated for all the relevant types of information to which they have access on the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>03(03)</td>
			<td>Personnel screening</td>
			<td>Personnel screening: Information requiring special protective measures<br />
			Verify that individuals accessing a system that processes, stores, or transmits information requiring special protection:
			<ol class="lst-lwr-alph"><li>have valid access authorizations that are demonstrated by assigned official government duties</li>
				<li>satisfy [Assignment: organization-defined additional personnel screening criteria]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>03(04)</td>
			<td>Personnel screening</td>
			<td>Personnel screening: Citizenship requirements<br />
			Verify that individuals accessing a system that processes, stores, or transmits [Assignment: organization-defined information types] meet [Assignment: organization-defined citizenship requirements].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>04</td>
			<td>Personnel termination</td>
			<td>Upon termination of individual employment:
			<ol class="lst-upr-alph"><li>disable system access within [Assignment: organization-defined time period]</li>
				<li>terminate or revoke any authenticators and credentials associated with the individual</li>
				<li>conduct exit interviews that include a discussion of [Assignment: organization-defined information security topics]</li>
				<li>retrieve all security-related, organizational system-related property</li>
				<li>retain access to organizational information and systems formerly controlled by the terminated individual</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>04(01)</td>
			<td>Personnel termination</td>
			<td>Personnel termination: Post-employment requirements
			<ol class="lst-lwr-alph"><li>Notify terminated individuals of applicable, legally binding post-employment requirements for the protection of organizational information.</li>
				<li>Require terminated individuals to sign an acknowledgment of post-employment requirements as part of the organizational termination process.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>04(02)</td>
			<td>Personnel termination</td>
			<td>Personnel termination: Automated actions<br />
			Use [Assignment: organization-defined automated mechanisms] to [Selection (one or more): notify [Assignment: organization-defined personnel or roles] of individual termination actions; disable access to system resources].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>04(400)</td>
			<td>Personnel termination</td>
			<td>Personnel termination: Permanently bound to secrecy<br />
			Forward data on the form Record of a Person in a Scheduled Department or Agency Under the Security of Information Act (SOIA) to the Canadian Security Intelligence Service (CSIS).</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>05</td>
			<td>Personnel transfer</td>
			<td>
			<ol class="lst-upr-alph"><li>Review and confirm ongoing operational need for current logical and physical access authorizations to systems and facilities when individuals are reassigned or transferred to other positions within the organization.</li>
				<li>Initiate [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defined time period following the formal transfer action].</li>
				<li>Modify access authorization as needed to correspond with any changes in operational need due to reassignment or transfer.</li>
				<li>Notify [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>05(400)</td>
			<td>Personnel transfer</td>
			<td>Personnel transfer: Security clearance
			<ol class="lst-lwr-alph"><li>Accept the security status or clearance of the individual when the required one is at the same or lesser level previously granted.</li>
				<li>Redo the security screening when:
				<ol><li>the results are over five years old</li>
					<li>there is evidence to suggest that the security screening was not done in accordance with the <abbr title="Treasury Board Secretariat">TBS</abbr> Standard on Security Screening</li>
					<li>there is a security waiver attached to the status or clearance</li>
					<li>law enforcement inquiries or security assessments results have been removed from the individual’s file</li>
					<li>there is adverse information in the individual’s file that may pose a security risk to the receiving department or agency</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>06</td>
			<td>Access agreements</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop and document access agreements for organizational systems.</li>
				<li>Review and update the access agreements [Assignment: organization-defined frequency].</li>
				<li>Verify that individuals requiring access to organizational information and systems:
				<ol><li>sign appropriate access agreements prior to being granted access</li>
					<li>re-sign access agreements to maintain access to organizational systems when access agreements have been updated or [Assignment: organization-defined frequency]</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>06(01)</td>
			<td>Access agreements</td>
			<td>Access agreements: Information requiring special protection<br />
			Withdrawn: Incorporated into PS-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>06(02)</td>
			<td>Access agreements</td>
			<td>Access agreements: Classified information requiring special protection<br />
			Verify that access to classified information requiring special protection is granted only to individuals who:
			<ol class="lst-lwr-alph"><li>have a valid access authorization that is demonstrated by assigned official government duties</li>
				<li>satisfy associated personnel security criteria</li>
				<li>have read, understood, and signed a non-disclosure agreement</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>06(03)</td>
			<td>Access agreements</td>
			<td>Access agreements: Post-employment requirements
			<ol class="lst-lwr-alph"><li>Notify individuals of applicable, legally binding post-employment requirements for protection of organizational information.</li>
				<li>Require individuals to sign an acknowledgment of these requirements, if applicable, as part of granting initial access to covered information.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>07</td>
			<td>External personnel security</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish personnel security requirements, including security roles and responsibilities for external providers.</li>
				<li>Require external providers to comply with personnel security policies and procedures established by the organization.</li>
				<li>Document personnel security requirements.</li>
				<li>Require external providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges, or who have system privileges within [Assignment: organization-defined time period].</li>
				<li>Monitor provider compliance with personnel security requirements.</li>
			</ol><ol class="lst-upr-alph" start="27"><li>The organization ensures security screening of private-sector organizations and individuals who have access to Protected and Classified information, assets, and facilities in accordance with the <abbr title="Treasury Board Secretariat">TBS</abbr> Standard on Security Screening.</li>
				<li>The organization explicitly defines government oversight and end-user roles and responsibilities relative to third-party-provided services in accordance with the <abbr title="Treasury Board Secretariat">TBS</abbr> Directive on Security Management, Appendix F: Mandatory Procedures for Security in Contracts and Other Arrangements Control.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>08</td>
			<td>Personnel sanctions</td>
			<td>
			<ol class="lst-upr-alph"><li>Employ a formal sanctions process for individuals who fail to comply with established information security and privacy policies and procedures.</li>
				<li>Notify [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PS</td>
			<td>09</td>
			<td>Position descriptions</td>
			<td>Incorporate security and privacy roles and responsibilities into organizational position descriptions.</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.15">Table 4.15: Personal information handling and transparency</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>PT</td>
			<td>01</td>
			<td>Personal information handling and transparency policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): organization-level; mission/business process-level; system-level] privacy policy and personal information handling procedures that:
					<ol class="lst-lwr-alph"><li>addresses objectives, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance obligations</li>
						<li>is consistent with applicable laws, jurisprudence, directives, regulations, policies, directives, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the privacy policy and procedures for personal information handling and the associated personal information handling and transparency controls</li>
				</ol></li>
				<li>Delegate responsibility to [Assignment: organization-defined official] to develop, document, and communicate personal information handling and transparency policy and procedures.</li>
				<li>Review and update personal information handling and transparency:
				<ol><li>privacy policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>personal information handling procedures, including transparency requirements [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>02</td>
			<td>Authority to collect and use personal information</td>
			<td>
			<ol class="lst-upr-alph"><li>Determine and document the [Assignment: organization-defined authority] that permits the [Assignment: organization-defined collection and use] of personal information.</li>
				<li>Restrict the [Assignment: organization-defined collection and use] of personal information to only that which is authorized.</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>02(01)</td>
			<td>Authority to collect and use personal information</td>
			<td>Authority to collect and use personal information: Data tagging<br />
			Attach data tags containing [Assignment: organization-defined authorized handling] to [Assignment: organization-defined elements of personal information].</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>02(02)</td>
			<td>Authority to collect and use personal information</td>
			<td>Authority to collect and use personal information: Automation<br />
			Manage enforcement of the authorized handling of personal information using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>03</td>
			<td>Personal information handling uses and disclosures</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify and document the [Assignment: organization-defined use(s) and disclosure(s)] associated with collections of personal information.</li>
				<li>Describe the purpose(s) of collection in the privacy notices and policies of the program activity or organization.</li>
				<li>Restrict the [Assignment: organization-defined use(s) and disclosure(s)] of personal information to only that which is compatible with the identified purpose(s) or permissible under the <em>Privacy Act</em>.</li>
				<li>Monitor changes in handling personal information and implement [Assignment: organization-defined mechanisms] to ensure that any changes are made in accordance with [Assignment: identified legislative requirements].</li>
			</ol><ol class="lst-upr-alph" start="27"><li>Update the <abbr title="personal information bank">PIB</abbr> and notify the Office of the Privacy commissioner (OPC) and <abbr title="Treasury Board Secretariat">TBS</abbr> of the new use or disclosure.</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>03(01)</td>
			<td>Personal information handling uses and disclosures</td>
			<td>Personal information handling uses and disclosures: Data tagging<br />
			Attach data tags containing the following purposes to [Assignment: organization-defined elements of personal information]: [Assignment: organization-defined handling purposes].</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>03(02)</td>
			<td>Personal information handling uses and disclosures</td>
			<td>Personal information handling uses and disclosures: Automation<br />
			Track handling purposes of personal information using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>04</td>
			<td>Consent</td>
			<td>
			<ol class="lst-upr-alph"><li>Ensure that consent is obtained in writing or is otherwise adequately documented, including information such as the date and time of consent.</li>
				<li>In the federal government, implement [Assignment: organization-defined tools or mechanisms] for individuals to provide informed consent to the secondary uses or indirect collection of their personal information. Consent must include:
				<ol><li>the purpose of the consent</li>
					<li>the specific personal information elements involved</li>
					<li>in the case of indirect collection, the sources that will be asked to provide the information, as well as the reason for making the collection indirectly</li>
					<li>uses or disclosures that are not consistent with the original purpose of the collection and for which consent is being sought</li>
					<li>any consequences that may result from withholding consent</li>
					<li>any alternatives to providing consent</li>
				</ol></li>
				<li>In the private sector, implement [Assignment: organization-defined tools or mechanisms] for individuals to provide meaningful consent to the collection, use and disclosure of their personal information.</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>04(01)</td>
			<td>Consent</td>
			<td>Consent: Tailored consent Government of Canada<br />
			Provide [Assignment: organization-defined mechanisms] to allow individuals to tailor handling permissions to selected elements of personal information.</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>04(02)</td>
			<td>Consent</td>
			<td>Consent: Timely consent<br />
			Present [Assignment: organization-defined consent mechanisms] to individuals at [Assignment: organization-defined frequency] and in conjunction with [Assignment: organization-defined personal information handling].</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>04(03)</td>
			<td>Consent</td>
			<td>Consent: Revocation<br />
			Implement [Assignment: organization-defined tools or mechanisms] for individuals to revoke consent to the handling of their personal information.</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>04(400)</td>
			<td>Consent</td>
			<td>Consent: Tailored consent private sector<br />
			Provide [Assignment: organization-defined mechanisms] to allow individuals to tailor handling permissions to selected elements of personal information.</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>05</td>
			<td>Privacy notice</td>
			<td>Provide notice to individuals about the collection of their personal information that includes:
			<ol class="lst-upr-alph"><li>the legal authority for the collection of personal information</li>
				<li>any legal or administrative consequences of refusing to provide the personal information</li>
				<li>the rights of access to, correction, and protection of personal information</li>
				<li>a warning that system usage may be monitored, recorded, and subject to audit and includes:
				<ol><li>a statement explaining the regular monitoring practices of electronic networks</li>
					<li>a statement that electronic networks will be monitored for work-related purposes</li>
					<li>a statement that special monitoring may be permitted without notice in instances where illegal or other unacceptable use is suspected</li>
				</ol></li>
				<li>an explanation of how the information will be used</li>
				<li>the right to file a complaint with the Privacy Commissioner of Canada regarding the institution’s handling of the individual’s personal information</li>
				<li>the relevant <abbr title="personal information bank">PIB</abbr> reference, if applicable</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>05(01)</td>
			<td>Privacy notice</td>
			<td>Privacy notice: Timely privacy notice statements<br />
			Present notice of personal information handling to individuals at the time that the individual provides personal information [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>05(02)</td>
			<td>Privacy notice</td>
			<td>Privacy notice: Privacy notice statements<br />
			Include privacy notice statements on forms that collect information which will be maintained in a Personal Information Bank (PIB).</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>06</td>
			<td>Personal information banks</td>
			<td>Program activities that collect personal information must register and publish a <abbr title="personal information bank">PIB</abbr> if that information has been used, is being used, or is available for use for an administrative purpose or if it is organized or intended to be retrieved by the name of an individual or by an identifying number, symbol or other particular assigned to an individual. [Assignment: organization-defined roles or personnel] are responsible for:
			<ol class="lst-upr-alph"><li>registering or submitting new or significantly modified <abbr title="personal information bank">PIB</abbr>s in accordance with <abbr title="Treasury Board Secretariat">TBS</abbr> Directive on Privacy Practices, using the Personal Information Bank Submission form provided by <abbr title="Treasury Board Secretariat">TBS</abbr></li>
				<li>publishing <abbr title="personal information bank">PIB</abbr>s on the relevant institution’s Info Source webpage and updating this information once a year</li>
				<li>keeping <abbr title="personal information bank">PIB</abbr>s accurate, up-to-date, and scoped in accordance with policy</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>06(01)</td>
			<td>Personal information banks</td>
			<td>Personal information banks: Consistent uses and disclosures<br />
			Review all consistent uses published in the <abbr title="personal information bank">PIB</abbr> at [Assignment: organization-defined frequency] to ensure continued accuracy, and to ensure that consistent uses continue to be compatible with the purpose for which the information was collected.</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>06(02)</td>
			<td>Personal information banks</td>
			<td>Personal information banks: Exempt banks<br />
			Review all <abbr title="personal information bank">PIB</abbr>s that were designated as exempt banks under section 18 of the <em>Privacy Act</em> [Assignment: organization-defined frequency] to ensure they remain appropriate and necessary in accordance with law.</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>07</td>
			<td>Particularly sensitive personal information</td>
			<td>Apply [Assignment: organization-defined handling conditions] for particularly sensitive personal information.</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>07(01)</td>
			<td>Particularly sensitive personal information</td>
			<td>Particularly sensitive personal information: Social insurance numbers<br />
			When a program or activity collects, uses, or discloses social insurance numbers (SINs):
			<ol class="lst-lwr-alph"><li>ensure there is express authority for the collection and use of the <abbr title="social insurance numbers">SIN</abbr></li>
				<li>provide notice, at the point of collection, regarding the authority to collect as well as the anticipated use or disclosures of the <abbr title="social insurance numbers">SIN</abbr></li>
				<li>ensure the collection and use of <abbr title="social insurance numbers">SIN</abbr> is included in the associated <abbr title="personal information bank">PIB</abbr>, if appropriate</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>07(02)</td>
			<td>Particularly sensitive personal information</td>
			<td>Particularly sensitive personal information: Canadian Charter of Rights and Freedoms<br />
			Restrict the handling of information describing how any individual exercises rights guaranteed by the Canadian Charter of Rights and Freedoms unless there is lawful authority or is within the scope of an authorized law-enforcement activity.</td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>07(400)</td>
			<td>Particularly sensitive personal information</td>
			<td>Particularly sensitive personal information: Private sector<br />
			When collecting, using, or disclosing particularly sensitive personal information, private sector organizations should:
			<ol class="lst-lwr-alph"><li>determine the form of consent to use, considering the sensitivity of information</li>
				<li>protect personal information with [Assignment: organization-defined tools or mechanisms] appropriate to the sensitivity of information</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>PT</td>
			<td>08</td>
			<td>Data matching requirements</td>
			<td>When a program activity seeks to collect, use, or disclose personal information for the purpose of conducting a data matching activity:
			<ol class="lst-upr-alph"><li>ensure the authority exists to collect, use, or disclose the personal information for the purpose of data matching</li>
				<li>develop and enter into an information sharing agreement or information sharing arrangement for the purpose of data matching</li>
				<li>verify that the [Selection (one): notice to the individual; consent obtained from the individual] identifies that the information will be used for data matching activities</li>
				<li>verify that the associated <abbr title="personal information bank">PIB</abbr> identifies that the information will be used for data-matching activities</li>
			</ol></td>
			<td>Control</td>
			<td>Not allocated to baseline.</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.16">Table 4.16: Risk assessment</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>RA</td>
			<td>01</td>
			<td>Risk assessment policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): organization-level; Mission/business process-level; System-level] risk assessment policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the risk assessment policy and the associated risk assessment controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the risk assessment policy and procedures.</li>
				<li>Review and update the current risk assessment:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>01(400)</td>
			<td>Risk assessment policy and procedures</td>
			<td>Risk assessment policy and procedures: Privacy impact assessments<br />
			Develop a privacy impact assessment (PIA) process and associated procedures that:
			<ol class="lst-lwr-alph"><li>is established by Heads of <abbr title="Government of Canada">GC</abbr> institutions</li>
				<li>considers the responsibility within the institution for establishing personal information banks (PIBs)</li>
				<li>is commensurate with the severity of potential injuries related to the privacy invasiveness of the institution's programs or activities</li>
				<li>ensures the <abbr title="privacy impact assessment">PIA</abbr> is completed by the appropriate privacy senior official or executive holding responsibility within the institution for new or substantially modified programs or activities</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>02</td>
			<td>Security categorization</td>
			<td>
			<ol class="lst-upr-alph"><li>Categorize the system and information it processes, stores, and transmits.</li>
				<li>Document the security categorization results, including supporting rationale, in the security plan for the system.</li>
				<li>Verify that the authorizing official or authorizing official’s designated representative reviews and approves the security categorization decision.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>02(01)</td>
			<td>Security categorization</td>
			<td>Security categorization: Impact-level prioritization<br />
			Conduct an impact-level prioritization of organizational systems to obtain additional granularity on system impact levels.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>03</td>
			<td>Risk assessment</td>
			<td>
			<ol class="lst-upr-alph"><li>Conduct a risk assessment, including:
				<ol><li>identifying threats to and vulnerabilities in the system</li>
					<li>determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it handles, stores, or transmits, and any related information</li>
					<li>determining the likelihood and impact of adverse effects on individuals arising from the handling of personal information</li>
				</ol></li>
				<li>Integrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-level risk assessments.</li>
				<li>Document risk assessment results in [Selection (one): security and privacy plans; risk assessment report; [Assignment: organization-defined document]].</li>
				<li>Review risk assessment results [Assignment: organization-defined frequency].</li>
				<li>Disseminate risk assessment results to [Assignment: organization-defined personnel or roles].</li>
				<li>Update the risk assessment [Assignment: organization-defined frequency] or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>03(01)</td>
			<td>Risk assessment</td>
			<td>Risk assessment: Supply chain risk assessment
			<ol class="lst-lwr-alph"><li>Assess supply chain risks associated with [Assignment: organization-defined systems, system components, and system services].</li>
				<li>Update the supply chain risk assessment [Assignment: organization-defined frequency], when there are significant changes to the relevant supply chain, or when changes to the system, environments of operation, or other conditions may necessitate a change in the supply chain.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>03(02)</td>
			<td>Risk assessment</td>
			<td>Risk assessment: Use of all-source intelligence<br />
			Use all-source intelligence to assist in the analysis of risk.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>03(03)</td>
			<td>Risk assessment</td>
			<td>Risk assessment: Dynamic threat awareness<br />
			Determine the current cyber threat environment on an ongoing basis using [Assignment: organization-defined means].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>03(04)</td>
			<td>Risk assessment</td>
			<td>Risk assessment: Predictive cyber analytics<br />
			Employ the following advanced automation and analytics capabilities to predict and identify risks to [Assignment: organization-defined systems or system components]: [Assignment: organization-defined advanced automation and analytics capabilities].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>04</td>
			<td>Risk assessment update</td>
			<td>Withdrawn: Incorporated into RA-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>
			<ol class="lst-upr-alph"><li>Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system are identified and reported.</li>
				<li>Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
				<ol><li>enumerating platforms, software flaws, and improper configurations</li>
					<li>formatting checklists and test procedures</li>
					<li>measuring vulnerability impact</li>
				</ol></li>
				<li>Analyze vulnerability scan reports and results from vulnerability monitoring.</li>
				<li>Remediate legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an organizational assessment of risk.</li>
				<li>Share information obtained from the vulnerability monitoring process and control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other systems.</li>
				<li>Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(01)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Update tool capability<br />
			Withdrawn: Incorporated into RA-05.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(02)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Update vulnerabilities to be scanned<br />
			Update the system vulnerabilities to be scanned [Selection (one or more): [Assignment: organization-defined frequency]; prior to a new scan; when new vulnerabilities are identified and reported].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(03)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Breadth and depth of coverage<br />
			Define the breadth and depth of vulnerability scanning coverage.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(04)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Discoverable information<br />
			Determine information about the system that is discoverable and take [Assignment: organization-defined corrective actions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(05)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Privileged access<br />
			Implement privileged access authorization to [Assignment: organization-defined system components] for [Assignment: organization-defined vulnerability scanning activities].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(06)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Automated trend analyses<br />
			Compare the results of multiple vulnerability scans using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(07)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Automated detection and notification of unauthorized components Withdrawn: Incorporated into CM-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(08)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Review historic audit logs<br />
			Review historic audit logs to determine if a vulnerability identified in a [Assignment: organization-defined system] has been previously exploited within an [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(09)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Penetration testing and analyses<br />
			Withdrawn: Incorporated into CA-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(10)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Correlate scanning information<br />
			Correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability and multi-hop attack vectors.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>05(11)</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>Vulnerability monitoring and scanning: Public disclosure program<br />
			Establish a public reporting channel for receiving reports of vulnerabilities in organizational systems and system components.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>06</td>
			<td>Technical surveillance countermeasures survey</td>
			<td>Employ a technical surveillance countermeasures survey at [Assignment: organization-defined locations] [Selection (one or more): [Assignment: organization-defined frequency]; when the following events or indicators occur: [Assignment: organization-defined events or indicators]].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>07</td>
			<td>Risk response</td>
			<td>Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>08</td>
			<td>Privacy impact assessments</td>
			<td>Conduct <abbr title="privacy impact assessment">PIA</abbr>s for systems, programs or other activities when:
			<ol class="lst-upr-alph"><li>designing, developing or procuring means of handling personal information</li>
				<li>initiating a new collection of personal information</li>
			</ol>
			 

			<ol class="lst-upr-alph" start="27"><li>making substantial modifications to existing systems, programs or activities where personal information is handled</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>09</td>
			<td>Criticality analysis</td>
			<td>Identify critical system components and functions by performing a criticality analysis for [Assignment: organization-defined systems, system components, or system services] at [Assignment: organization-defined decision points in the system development lifecycle].</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>RA</td>
			<td>10</td>
			<td>Threat hunting</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish and maintain a cyber threat hunting capability to:
				<ol><li>search for indicators of compromise in organizational systems</li>
					<li>detect, track, and disrupt threats that evade existing controls</li>
				</ol></li>
				<li>Employ the threat hunting capability [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.17">Table 4.17: System and services acquisition</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>SA</td>
			<td>01</td>
			<td>System and services acquisition policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] system and services acquisition policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the system and services acquisition policy and the associated system and services acquisition controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures.</li>
				<li>Review and update the current system and services acquisition:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>02</td>
			<td>Allocation of resources</td>
			<td>
			<ol class="lst-upr-alph"><li>Determine the high-level information security and privacy requirements for the system or system service in mission and business process planning.</li>
				<li>Determine, document, and allocate the resources required to protect the system or system service as part of the organizational capital planning and investment control process.</li>
				<li>Establish a discrete line item for information security and privacy in organizational programming and budgeting documentation.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>03</td>
			<td>System development lifecycle</td>
			<td>
			<ol class="lst-upr-alph"><li>Acquire, develop, and manage the system using [Assignment: organization-defined system development lifecycle] that incorporates information security and privacy considerations.</li>
				<li>Define and document information security and privacy roles and responsibilities throughout the system development lifecycle.</li>
				<li>Identify individuals having information security and privacy roles and responsibilities.</li>
				<li>Integrate the organizational information security and privacy risk management process into system development lifecycle activities.</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>03(01)</td>
			<td>System development lifecycle</td>
			<td>System development lifecycle: Manage pre-production environment<br />
			Protect system pre-production environments commensurate with risk throughout the system development lifecycle for the system, system component, or system service.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>03(02)</td>
			<td>System development lifecycle</td>
			<td>System development lifecycle: Use of live or operational data
			<ol class="lst-lwr-alph"><li>Approve, document, and control the use of live data in pre-production environments for the system, system component, or system service.</li>
				<li>Protect pre-production environments for the system, system component, or system service at the same impact or classification level as any live data in use within the pre-production environments.</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>03(03)</td>
			<td>System development lifecycle</td>
			<td>System development lifecycle: Technology refresh<br />
			Plan for and implement a technology refresh schedule for the system throughout the system development lifecycle.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04</td>
			<td>Acquisition process</td>
			<td>Include the following requirements, descriptions, and criteria, explicitly or by reference, using [Selection (one or more): standardized contract language; [Assignment: organization-defined contract language]] in the acquisition contract for the system, system component, or system service:
			<ol class="lst-upr-alph"><li>security and privacy functional requirements</li>
				<li>strength of mechanism requirements</li>
				<li>security and privacy assurance requirements</li>
				<li>controls needed to satisfy the security and privacy requirements</li>
				<li>security and privacy documentation requirements</li>
				<li>requirements for protecting security and privacy documentation</li>
				<li>a description of the system development environment and the environment in which the system is intended to operate</li>
				<li>the allocation of responsibility or identification of parties responsible for information security, privacy, and supply chain risk management</li>
				<li>acceptance criteria</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(01)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Functional properties of controls<br />
			Require the developer of the system, system component, or system service to provide a description of the functional properties of the controls to be implemented.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(02)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Design and implementation information for controls<br />
			Require the developer of the system, system component, or system service to provide design and implementation information for the controls that includes: [Selection (one or more): security-relevant external system interfaces; high-level design; low-level design; source code or hardware schematics; [Assignment: organization-defined design and implementation information]] at [Assignment: organization-defined level of detail].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(03)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Development methods, techniques, and practices<br />
			Require the developer of the system, system component, or system service to demonstrate the use of a system development lifecycle process that includes:
			<ol class="lst-lwr-alph"><li>[Assignment: organization-defined systems engineering methods]</li>
				<li>[Selection (one or more): [Assignment: organization-defined systems security engineering methods]; [Assignment: organization-defined privacy engineering methods]]</li>
				<li>[Assignment: organization-defined software development methods; testing, evaluation, assessment, verification, and validation methods; and quality control processes]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(04)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Assignment of components to systems<br />
			Withdrawn: Incorporated into CM-08(09).</td>
			<td>Control</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(05)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: System, component, and service configurations<br />
			Require the developer of the system, system component, or system service to:
			<ol class="lst-lwr-alph"><li>deliver the system, component, or service with [Assignment: organization-defined security configurations] implemented</li>
				<li>use the configurations as the default for any subsequent system, component, or service reinstallation or upgrade</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(06)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Use of cyber security products
			<ol class="lst-lwr-alph"><li>Employ only government off-the-shelf or commercial off-the-shelf (COTS) cyber security and cyber security-enabled information technology (IT) products that compose a Cyber Centre-approved solution to protect classified information when the networks used to transmit the information are at a lower classification level than the information being transmitted.</li>
				<li>Ensure that these products have been evaluated or validated by the Cyber Centre or in accordance with Cyber Centre-approved procedures.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(07)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Canadian Common Criteria Program (CCCP)-approved protection profiles
			<ol class="lst-lwr-alph"><li>Limit the use of commercially provided cyber security and cyber security-enabled <abbr title="information technology">IT</abbr> products to those products that have been successfully evaluated against a <abbr title="Canadian Common Criteria Program">CCCP</abbr>-recognized protection profile for a specific technology type, if such a profile exists.</li>
				<li>If no <abbr title="Canadian Common Criteria Program">CCCP</abbr>-recognized protection profile exists for a specific technology type but a commercially provided <abbr title="information technology">IT</abbr> product relies on cryptographic functionality to enforce its security policy, require that the cryptographic module is Federal Information Processing Standard (FIPS)-validated or <abbr title="Canadian Common Criteria Program">CCCP</abbr>-recognized.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(08)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Continuous monitoring plan for controls<br />
			Require the developer of the system, system component, or system service to produce a plan for continuous monitoring of control effectiveness that is consistent with the continuous monitoring program of the organization.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(09)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Functions, ports, protocols, and services in use<br />
			Require the developer of the system, system component, or system service to identify the functions, ports, protocols, and services intended for organizational use.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(10)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Use of approved digital credential products<br />
			Employ only <abbr title="information technology">IT</abbr> products that are recommended by the Cyber Centre for digital credentials capability implemented within organizational systems.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(11)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: System of records<br />
			Include [Assignment: organization-defined <em>Privacy Act</em> requirements] in the acquisition contract for the operation of a system of records on behalf of an organization to accomplish an organizational mission or function.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>04(12)</td>
			<td>Acquisition process</td>
			<td>Acquisition process: Data ownership
			<ol class="lst-lwr-alph"><li>Include organizational data ownership requirements in the acquisition contract.</li>
				<li>Require all data to be removed from the contractor’s system and returned to the organization within [Assignment: organization-defined time frame].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>05</td>
			<td>System documentation</td>
			<td>
			<ol class="lst-upr-alph"><li>Obtain or develop administrator documentation for the system, system component, or system service that describes:
				<ol><li>secure configuration, installation, and operation of the system, component, or service</li>
					<li>effective use and maintenance of security and privacy functions and mechanisms</li>
					<li>known vulnerabilities regarding configuration and use of administrative or privileged functions</li>
				</ol></li>
				<li>Obtain or develop user documentation for the system, system component, or system service that describes:
				<ol><li>user-accessible security and privacy functions and mechanisms and how to effectively use those functions and mechanisms</li>
					<li>methods for user interaction, which enable individuals to use the system, component, or service in a more secure manner and protect individual privacy</li>
					<li>user responsibilities in maintaining the security of the system, component, or service and privacy of individuals</li>
				</ol></li>
				<li>Document attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or non-existent and take [Assignment: organization-defined actions] in response.</li>
				<li>Distribute documentation to [Assignment: organization-defined personnel or roles].</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>05(01)</td>
			<td>System documentation</td>
			<td>System documentation: Functional properties of security controls<br />
			Withdrawn: Incorporated into SA-04(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>05(02)</td>
			<td>System documentation</td>
			<td>System documentation: Security-relevant external system interfaces<br />
			Withdrawn: Incorporated into SA-04(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>05(03)</td>
			<td>System documentation</td>
			<td>System documentation: High-level design<br />
			Withdrawn: Incorporated into SA-04(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>05(04)</td>
			<td>System documentation</td>
			<td>System documentation: Low-level design<br />
			Withdrawn: Incorporated into SA-04(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>05(05)</td>
			<td>System documentation</td>
			<td>System documentation: Source code<br />
			Withdrawn: Incorporated into SA-04(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>06</td>
			<td>Software usage restrictions</td>
			<td>Withdrawn: Incorporated into CM-10 and SI-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>07</td>
			<td>User-installed software</td>
			<td>Withdrawn: Incorporated into CM-11 and SI-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08</td>
			<td>Security and privacy engineering principles</td>
			<td>Apply the following systems security and privacy engineering principles in the specification, design, development, implementation, and modification of the system and system components: [Assignment: organization-defined systems security and privacy engineering principles].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(01)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Clear abstractions<br />
			Implement the security design principle of clear abstractions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(02)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Least common mechanism<br />
			Implement the security design principle of least common mechanism in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(03)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Modularity and layering<br />
			Implement the security design principles of modularity and layering in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(04)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Partially ordered dependencies<br />
			Implement the security design principle of partially ordered dependencies in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(05)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Efficiently mediated access<br />
			Implement the security design principle of efficiently mediated access in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(06)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Minimized sharing<br />
			Implement the security design principle of minimized sharing in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(07)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Reduced complexity<br />
			Implement the security design principle of reduced complexity in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(08)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Secure evolvability<br />
			Implement the security design principle of secure evolvability in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(09)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Trusted components<br />
			Implement the security design principle of trusted components in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(10)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Hierarchical trust<br />
			Implement the security design principle of hierarchical trust in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(11)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Inverse modification threshold<br />
			Implement the security design principle of inverse modification threshold in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(12)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Hierarchical protection<br />
			Implement the security design principle of hierarchical protection in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(13)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Minimized security elements<br />
			Implement the security design principle of minimized security elements in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(14)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Least privilege<br />
			Implement the security design principle of least privilege in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(15)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Predicate permission<br />
			Implement the security design principle of predicate permission in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(16)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Self-reliant trustworthiness<br />
			Implement the security design principle of self-reliant trustworthiness in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(17)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Secure distributed composition<br />
			Implement the security design principle of secure distributed composition in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(18)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Trusted communications channels<br />
			Implement the security design principle of trusted communications channels in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(19)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Continuous protection<br />
			Implement the security design principle of continuous protection in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(20)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Secure metadata management<br />
			Implement the security design principle of secure metadata management in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(21)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Self-analysis<br />
			Implement the security design principle of self-analysis in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(22)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Accountability and traceability<br />
			Implement the security design principle of accountability and traceability in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(23)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Secure defaults<br />
			Implement the security design principle of secure defaults in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(24)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Secure failure and recovery<br />
			Implement the security design principle of secure failure and recovery in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(25)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Economic security<br />
			Implement the security design principle of economic security in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(26)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Performance security<br />
			Implement the security design principle of performance security in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(27)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Human factored security<br />
			Implement the security design principle of human factored security in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(28)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Acceptable security<br />
			Implement the security design principle of acceptable security in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(29)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Repeatable and documented procedures<br />
			Implement the security design principle of repeatable and documented procedures in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(30)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Procedural rigour<br />
			Implement the security design principle of procedural rigour in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(31)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Secure system modification<br />
			Implement the security design principle of secure system modification in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(32)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Sufficient documentation<br />
			Implement the security design principle of sufficient documentation in [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(33)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Minimization<br />
			Implement the privacy principle of minimization using [Assignment: organization-defined processes].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>08(400)</td>
			<td>Security and privacy engineering principles</td>
			<td>Security and privacy engineering principles: Licensed and certified engineers<br />
			Employ licensed and certified security engineers that assume responsibility for the specification, design, development, and implementation of information system security and privacy solutions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09</td>
			<td>External system services</td>
			<td>
			<ol class="lst-upr-alph"><li>Require that providers of external system services comply with organizational security and privacy requirements and employ the following controls: [Assignment: organization-defined controls].</li>
				<li>Define and document organizational oversight and user roles and responsibilities with regard to external system services.</li>
				<li>Employ the following processes, methods, and techniques to monitor control compliance by external service providers on an ongoing basis: [Assignment: organization-defined processes, methods, and techniques].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(01)</td>
			<td>External system services</td>
			<td>External system services: Risk assessments and organizational approvals
			<ol class="lst-lwr-alph"><li>Conduct an organizational risk assessment prior to acquiring or outsourcing information security services.</li>
				<li>Verify that the acquisition or outsourcing of dedicated information security services is approved by [Assignment: organization-defined personnel or roles].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(02)</td>
			<td>External system services</td>
			<td>External information systems: Identification of functions, ports, protocols, and services<br />
			Require providers of the following external system services to identify the functions, ports, protocols, and other services required for the use of such services: [Assignment: organization-defined external system services].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(03)</td>
			<td>External system services</td>
			<td>External system services: Establish and maintain trust relationship with providers<br />
			Establish, document, and maintain trust relationships with external service providers based on the following requirements, properties, factors, or conditions: [Assignment: organization-defined security and privacy requirements, properties, factors, or conditions defining acceptable trust relationships].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(04)</td>
			<td>External system services</td>
			<td>External system services: Consistent interests of consumers and providers<br />
			Take the following actions to verify that the interests of [Assignment: organization-defined external service providers] are consistent with and reflect organizational interests: [Assignment: organization-defined actions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(05)</td>
			<td>External system services</td>
			<td>External system services: Processing, storage, and service location<br />
			Restrict the location of [Selection (one or more): information processing; information or data; system services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(06)</td>
			<td>External system services</td>
			<td>External system services: Organization-controlled cryptographic keys<br />
			Maintain exclusive control of cryptographic keys for encrypted material stored or transmitted through an external system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(07)</td>
			<td>External system services</td>
			<td>External system services: Organization-controlled integrity checking<br />
			Provide the capability to check the integrity of information while it resides in the external system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>09(08)</td>
			<td>External system services</td>
			<td>External system services: Processing and storage location — within Canada<br />
			Restrict the geographic location of information processing and data storage to facilities located within in the legal jurisdictional boundary of Canada.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10</td>
			<td>Developer configuration management</td>
			<td>Require the developer of the system, system component, or system service to:
			<ol class="lst-upr-alph"><li>perform configuration management during system, component, or service [Selection (one or more): design; development; implementation; operation; disposal]</li>
				<li>document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management]</li>
				<li>implement only organization-approved changes to the system, component, or service</li>
				<li>document approved changes to the system, component, or service and the potential security and privacy impacts of such changes</li>
				<li>track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel]</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10(01)</td>
			<td>Developer configuration management</td>
			<td>Developer configuration management: Software and firmware integrity verification<br />
			Require the developer of the system, system component, or system service to enable integrity verification of software and firmware components.</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10(02)</td>
			<td>Developer configuration management</td>
			<td>Developer configuration management: Alternative configuration management processes<br />
			Provide an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10(03)</td>
			<td>Developer configuration management</td>
			<td>Developer configuration management: Hardware integrity verification<br />
			Require the developer of the system, system component, or system service to enable integrity verification of hardware components.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10(04)</td>
			<td>Developer configuration management</td>
			<td>Developer configuration management: Trusted generation<br />
			Require the developer of the system, system component, or system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions, source code, and object code with previous versions.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10(05)</td>
			<td>Developer configuration management</td>
			<td>Developer configuration management: Mapping integrity for version control<br />
			Require the developer of the system, system component, or system service to maintain the integrity of the mapping between the master build data describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10(06)</td>
			<td>Developer configuration management</td>
			<td>Developer configuration management: Trusted distribution<br />
			Require the developer of the system, system component, or system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>10(07)</td>
			<td>Developer configuration management</td>
			<td>Developer configuration management: Security and privacy representatives<br />
			Require [Assignment: organization-defined security and privacy representatives] to be included in the [Assignment: organization-defined configuration change management and control process].</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>1 [<abbr title="Shared Services Canada">SSC</abbr>, <abbr title="Treasury Board Secretariat">TBS</abbr> and Cyber Centre]<br />
			2 [<abbr title="Shared Services Canada">SSC</abbr> projects and services serving multiple departments]</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11</td>
			<td>Developer testing and evaluation</td>
			<td>At all post-design stages of the system development lifecycle, require the developer of the system, system component, or system service to:
			<ol class="lst-upr-alph"><li>develop and implement a plan for ongoing security and privacy control assessments</li>
				<li>perform [Selection (one or more): unit; integration; system; regression] testing/evaluation [Assignment: organization-defined frequency] at [Assignment: organization-defined depth and coverage]</li>
				<li>produce evidence of the execution of the assessment plan and the results of the testing and evaluation</li>
				<li>implement a verifiable flaw remediation process</li>
				<li>correct flaws identified during testing and evaluation</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(01)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Static code analysis<br />
			Require the developer of the system, system component, or system service to employ static code analysis tools to identify common flaws and document the results of the analysis.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(02)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Threat modeling and vulnerability analyses<br />
			Require the developer of the system, system component, or system service to perform threat modelling and vulnerability analyses during development and the subsequent testing and evaluation of the system, component, or service that:
			<ol class="lst-lwr-alph"><li>uses the following contextual information: [Assignment: organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels]</li>
				<li>employs the following tools and methods: [Assignment: organization-defined tools and methods]</li>
				<li>conducts the modelling and analyses at the following level of rigour: [Assignment: organization-defined breadth and depth of modelling and analyses]</li>
				<li>produces evidence that meets the following acceptance criteria: [Assignment: organization-defined acceptance criteria]</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(03)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Independent verification of assessment plans and evidence
			<ol class="lst-lwr-alph"><li>Require an independent agent satisfying [Assignment: organization-defined independence criteria] to verify the correct implementation of the developer security and privacy assessment plans and the evidence produced during testing and evaluation.</li>
				<li>Verify that the independent agent is provided with sufficient information to complete the verification process or granted the authority to obtain such information.</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(04)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Manual code reviews<br />
			Require the developer of the system, system component, or system service to perform a manual code review of [Assignment: organization-defined specific code] using the following processes, procedures, and/or techniques: [Assignment: organization-defined processes, procedures, and/or techniques].</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(05)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Penetration testing<br />
			Require the developer of the system, system component, or system service to perform penetration testing:
			<ol class="lst-lwr-alph"><li>at the following level of rigour: [Assignment: organization-defined breadth and depth of testing]</li>
				<li>under the following constraints: [Assignment: organization-defined constraints]</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(06)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Attack surface reviews<br />
			Require the developer of the system, system component, or system service to perform attack surface reviews.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(07)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Verify scope of testing and evaluation<br />
			Require the developer of the system, system component, or system service to verify that the scope of testing and evaluation provides complete coverage of the required controls at the following level of rigour: [Assignment: organization-defined breadth and depth of testing and evaluation].</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(08)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Dynamic code analysis<br />
			Require the developer of the system, system component, or system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>11(09)</td>
			<td>Developer testing and evaluation</td>
			<td>Developer testing and evaluation: Interactive application security testing<br />
			Require the developer of the system, system component, or system service to employ interactive application security testing tools to identify flaws and document the results.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12</td>
			<td>Supply chain protection</td>
			<td>Withdrawn: Moved to SR Family.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(01)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Acquisition strategies / tools / methods<br />
			Withdrawn: Moved to SR-05.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(02)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Supplier reviews<br />
			Withdrawn: Moved to SR-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(03)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Trusted shipping and warehousing<br />
			Withdrawn: Incorporated into SR-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(04)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Diversity of suppliers<br />
			Withdrawn: Incorporated into SR-03(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(05)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Limitation of harm<br />
			Withdrawn: Incorporated into SR-03(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(06)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Minimizing procurement time<br />
			Withdrawn: Incorporated into SR-05(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(07)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Assessments prior to selection / acceptance / update<br />
			Withdrawn: Moved to SR-05(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(08)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Use of all-source intelligence<br />
			Withdrawn: Incorporated into RA-03(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(09)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Operations security<br />
			Withdrawn: Moved to SR-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(10)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Validate as genuine and not altered<br />
			Withdrawn: Moved to SR-04(03).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(11)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Penetration testing / analysis of elements, processes, and actors<br />
			Withdrawn: Moved to SR-06(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(12)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Inter-organizational agreements<br />
			Withdrawn: Moved to SR-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(13)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Critical information system components<br />
			Withdrawn: Incorporated into MA-06 and RA-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(14)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Identity and traceability<br />
			Withdrawn: Moved to SR-04(01) and SR-04(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>12(15)</td>
			<td>Supply chain protection</td>
			<td>Supply chain protection: Processes to address weaknesses or deficiencies<br />
			Withdrawn: Incorporated into SR-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>13</td>
			<td>Trustworthiness</td>
			<td>Withdrawn: Incorporated into SA-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>14</td>
			<td>Criticality analysis</td>
			<td>Withdrawn: Incorporated into RA-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>14(01)</td>
			<td>Criticality analysis</td>
			<td>Criticality analysis: Critical components with no viable alternative sourcing<br />
			Withdrawn: Incorporated into SA-20.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15</td>
			<td>Development process, standards, and tool</td>
			<td>
			<ol class="lst-upr-alph"><li>Require the developer of the system, system component, or system service to follow a documented development process that:
				<ol><li>explicitly addresses security and privacy requirements</li>
					<li>identifies the standards and tools used in the development process</li>
					<li>documents the specific tool options and tool configurations used in the development process</li>
					<li>documents, manages, and ensures the integrity of changes to the process and/or tools used in development</li>
				</ol></li>
				<li>Review the development process, standards, tools, tool options, and tool configurations [Assignment: organization-defined frequency] to determine if the process, standards, tools, tool options, and tool configurations selected and employed can satisfy the following security and privacy requirements: [Assignment: organization-defined security and privacy requirements].</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(01)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Quality metrics<br />
			Require the developer of the system, system component, or system service to:
			<ol class="lst-lwr-alph"><li>define quality metrics at the beginning of the development process</li>
				<li>provide evidence of meeting the quality metrics [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined program review milestones]; upon delivery]</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(02)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Security and privacy control traceability tools<br />
			Require the developer of the system, system component, or system service to select and employ security and privacy controls traceability tools for use during the development process.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(03)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Criticality analysis<br />
			Require the developer of the system, system component, or system service to perform a criticality analysis:
			<ol class="lst-lwr-alph"><li>at the following decision points in the system development lifecycle: [Assignment: organization-defined decision points in the system development lifecycle]</li>
				<li>at the following level of rigour: [Assignment: organization-defined breadth and depth of criticality analysis]</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(04)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Threat modeling / vulnerability analysis<br />
			Withdrawn: Incorporated into SA-11(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(05)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Attack surface reduction<br />
			Require the developer of the system, system component, or system service to reduce attack surfaces to [Assignment: organization-defined thresholds].</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(06)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Continuous improvement<br />
			Require the developer of the system, system component, or system service to implement an explicit process to continuously improve the development process.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(07)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Automated vulnerability analysis<br />
			Require the developer of the system, system component, or system service [Assignment: organization-defined frequency] to:
			<ol class="lst-lwr-alph"><li>perform an automated vulnerability analysis using [Assignment: organization-defined tools]</li>
				<li>determine the exploitation potential for discovered vulnerabilities</li>
				<li>determine potential risk mitigations for delivered vulnerabilities</li>
				<li>deliver the outputs of the tools and results of the analysis to [Assignment: organization-defined personnel or roles]</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(08)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Reuse of threat and vulnerability information<br />
			Require the developer of the system, system component, or system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(09)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Use of live data Withdrawn: Incorporated into SA-03(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(10)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Incident response plan<br />
			Require the developer of the system, system component, or system service to provide, implement, and test an incident response plan.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(11)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tools: Archive system or component<br />
			Require the developer of the system or system component to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security and privacy review.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>15(12)</td>
			<td>Development process, standards, and tool</td>
			<td>Development process, standards, and tool: Minimize personal information<br />
			Require the developer of the system or system component to minimize the use of personal information in development and test environments.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>16</td>
			<td>Developer provided training</td>
			<td>Require the developer of the system, system component, or system service to provide the following training on the correct use and operation of the implemented security and privacy functions, controls, and/or mechanisms: [Assignment: organization-defined training].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Require the developer of the system, system component, or system service to produce a design specification and security and privacy architecture that:
			<ol class="lst-upr-alph"><li>is consistent with the organization’s security and privacy architecture that is an integral part the organization’s enterprise architecture</li>
				<li>accurately and completely describes the required security and privacy functionality and the allocation of controls among physical and logical components</li>
				<li>expresses how individual security and privacy functions, mechanisms, and services work together to provide required security and privacy capabilities and a unified approach to protection</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(01)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Formal policy model<br />
			Require the developer of the system, system component, or system service to:
			<ol class="lst-lwr-alph"><li>produce, as an integral part of the development process, a formal policy model describing the [Assignment: organization-defined elements of organizational security and privacy policy] to be enforced</li>
				<li>prove that the formal policy model is internally consistent and sufficient to enforce the defined elements of the organizational security and privacy policy when implemented</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(02)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Security-relevant components<br />
			Require the developer of the system, system component, or system service to:
			<ol class="lst-lwr-alph"><li>define security-relevant hardware, software, and firmware</li>
				<li>provide a rationale that the definition for security-relevant hardware, software, and firmware is complete</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(03)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Formal correspondence<br />
			Require the developer of the system, system component, or system service to:
			<ol class="lst-lwr-alph"><li>produce, as an integral part of the development process, a formal top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions, error messages, and effects</li>
				<li>show, via proof to the extent feasible with additional informal demonstration as necessary, that the formal top-level specification is consistent with the formal policy model</li>
				<li>show, via informal demonstration, that the formal top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware</li>
				<li>show that the formal top-level specification is an accurate description of the implemented security-relevant hardware, software, and firmware</li>
				<li>describe the security-relevant hardware, software, and firmware mechanisms not addressed in the formal top-level specification but strictly internal to the security-relevant hardware, software, and firmware</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(04)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Informal correspondence<br />
			Require the developer of the system, system component, or system service to:
			<ol class="lst-lwr-alph"><li>produce, as an integral part of the development process, an informal descriptive top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions, error messages, and effects</li>
				<li>show, via [Selection (one): informal demonstration; convincing argument with formal methods as feasible], that the descriptive top-level specification is consistent with the formal policy model</li>
				<li>show, via informal demonstration, that the descriptive top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware</li>
				<li>show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant hardware, software, and firmware</li>
				<li>describe the security-relevant hardware, software, and firmware mechanisms not addressed in the descriptive top-level specification but strictly internal to the security-relevant hardware, software, and firmware</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(05)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Conceptually simple design<br />
			Require the developer of the system, system component, or system service to:
			<ol class="lst-lwr-alph"><li>design and structure the security-relevant hardware, software, and firmware to use a complete, conceptually simple protection mechanism with precisely defined semantics</li>
				<li>internally structure the security-relevant hardware, software, and firmware with specific regard for this mechanism</li>
			</ol></td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(06)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Structure for testing<br />
			Require the developer of the system, system component, or system service to structure security-relevant hardware, software, and firmware to facilitate testing.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(07)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Structure for least privilege<br />
			Require the developer of the system, system component, or system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(08)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Orchestration<br />
			Design [Assignment: organization-defined critical systems or system components] with coordinated behaviour to implement the following capabilities: [Assignment: organization-defined capabilities, by system or component].</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>17(09)</td>
			<td>Developer security and privacy architecture and design</td>
			<td>Developer security and privacy architecture and design: Design diversity<br />
			Use different designs for [Assignment: organization-defined critical systems or system components] to satisfy a common set of requirements or to provide equivalent functionality.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>18</td>
			<td>Tamper resistance and detection</td>
			<td>Withdrawn: Moved to SR-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>18(01)</td>
			<td>Tamper resistance and detection</td>
			<td>Tamper resistance and detection: Multiple phases of <abbr title="software development life cycle">SDLC</abbr><br />
			Withdrawn: Moved to SR-09(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>18(02)</td>
			<td>Tamper resistance and detection</td>
			<td>Tamper resistance and detection: Inspection of information systems, components, or devices<br />
			Withdrawn: Moved to SR-10.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>19</td>
			<td>Component authenticity</td>
			<td>Withdrawn: Moved to SR-11.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>19(01)</td>
			<td>Component authenticity</td>
			<td>Component authenticity: Anti-counterfeit training<br />
			Withdrawn: Moved to SR-11(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>19(02)</td>
			<td>Component authenticity</td>
			<td>Component authenticity: Configuration control for component service / repair<br />
			Withdrawn: Moved to SR-11(02).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>19(03)</td>
			<td>Component authenticity</td>
			<td>Component authenticity: Component disposal<br />
			Withdrawn: Moved to SR-12.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>19(04)</td>
			<td>Component authenticity</td>
			<td>Component authenticity: Anti-counterfeit scanning<br />
			Withdrawn: Moved to SR-11(03).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>20</td>
			<td>Customized development of critical components</td>
			<td>Reimplement or custom develop the following critical system components: [Assignment: organization-defined critical system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>21</td>
			<td>Developer screening</td>
			<td>Require that the developer of [Assignment: organization-defined system, system component, or system service]:
			<ol class="lst-upr-alph"><li>has appropriate access authorizations as determined by assigned [Assignment: organization-defined official government duties]</li>
				<li>satisfies the following additional personnel screening criteria: [Assignment: organization-defined additional personnel screening criteria]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>21(01)</td>
			<td>Developer screening</td>
			<td>Developer screening: Validation of screening<br />
			Withdrawn: Incorporated into SA-21.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>22</td>
			<td>Unsupported system components</td>
			<td>
			<ol class="lst-upr-alph"><li>Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer.</li>
				<li>Provide the following options for alternative sources for continued support for unsupported components [Selection (one or more): in-house support; [Assignment: organization-defined support from external providers]].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>22(01)</td>
			<td>Unsupported system components</td>
			<td>Unsupported system components: Alternative sources for continued support<br />
			Withdrawn: Incorporated into SA-22.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>23</td>
			<td>Specialization</td>
			<td>Employ [Selection (one or more): design; modification; augmentation; reconfiguration] on [Assignment: organization-defined systems or system components] supporting mission-essential services or functions to increase the robustness in those systems or components.</td>
			<td>Activity</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Require the organizational business function to conduct a sovereignty and jurisdiction threat and risk assessment process at the [Selection (one or more): organization-level, mission/business-level, system-level] that:
			<ol class="lst-upr-alph"><li>conducts an injury assessment to determine the maximum potential injuries that may be suffered due to external legal compulsion of the business functions or information assets by:
				<ol><li>considering the business needs for security including any laws or regulations which require that data not be disclosed or compromised</li>
					<li>updating the security categorization of the business functions or information assets</li>
					<li>documenting the negative consequences of legal compulsion</li>
				</ol></li>
				<li>performs jurisdiction-specific threat assessment that establishes a likelihood of being targeted</li>
				<li>undertakes a vulnerability assessment to evaluate the potential means by which the external jurisdiction could exploit the business functions or information assets</li>
				<li>completes a jurisdiction-specific risk assessment</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(01)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Threat and risk assessment<br />
			Require the organization to perform threat and risk assessments in relation to data sovereignty, considering its jurisdiction and by which surfaces legal compulsion may be effective.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(02)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Legal and contractual assessment<br />
			Require the organization to perform threat and risk assessments in relation to data sovereignty, considering its jurisdiction and by which surfaces legal compulsion may be effective.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(03)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Business process attribute marking<br />
			Ensure business processes receive the intended handling with respect to legal jurisdiction.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(04)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Protection of data at rest<br />
			Prevent data from residing in any other legal jurisdiction.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(05)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Protection of data in transit<br />
			Prevent data from transiting through any other legal jurisdiction.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(06)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Protection of data in use<br />
			Prevent data from being used in any other legal jurisdiction.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(07)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Protection against extraterritorial compulsion<br />
			Prevent business functions from being compromised by individuals or corporations that are being compelled by a different legal jurisdiction.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(08)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Protection of business lifecycle<br />
			Prevent business functions from being compromised by lifecycle attacks embedded via legal compulsion in or from a different legal jurisdiction.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SA</td>
			<td>400(09)</td>
			<td>Sovereignty and jurisdiction</td>
			<td>Sovereignty and jurisdiction: Public ownership<br />
			Prevent business functions from being compromised by ownership transfer of lifecycle functions to a different legal jurisdiction.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.18">Table 4.18: System and communications protection</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>SC</td>
			<td>01</td>
			<td>System and communications protection policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] system and communications protection policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the system and communications protection policy and the associated system and communications protection controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the system and communications protection policy and procedures.</li>
				<li>Review and update the current system and communications protection:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>02</td>
			<td>Separation of system and user functionality</td>
			<td>Separate user functionality, including user interface services, from system management functionality.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>02(01)</td>
			<td>Separation of system and user functionality</td>
			<td>Separation of system and user functionality: Interfaces for non-privileged users<br />
			Prevent the presentation of system management functionality at interfaces to non-privileged users.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>02(02)</td>
			<td>Separation of system and user functionality</td>
			<td>Separation of system and user functionality: Disassociability<br />
			Store state information from applications and software separately.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>03</td>
			<td>Security function isolation</td>
			<td>Isolate security functions from non-security functions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>03(01)</td>
			<td>Security function isolation</td>
			<td>Security function isolation: Hardware separation<br />
			Employ hardware separation mechanisms to implement security function isolation.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>03(02)</td>
			<td>Security function isolation</td>
			<td>Security function isolation: Access and flow control functions<br />
			Isolate security functions enforcing access and information flow control from non-security functions and from other security functions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>03(03)</td>
			<td>Security function isolation</td>
			<td>Security function isolation: Minimize non-security functionality<br />
			Minimize the number of non-security functions included within the isolation boundary containing security functions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>03(04)</td>
			<td>Security function isolation</td>
			<td>Security function isolation: Module coupling and cohesiveness<br />
			Implement security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>03(05)</td>
			<td>Security function isolation</td>
			<td>Security function isolation: Layered structures<br />
			Implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>04</td>
			<td>Information in shared system resources</td>
			<td>Prevent unauthorized and unintended information transfer via shared system resources.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>04(01)</td>
			<td>Information in shared system resources</td>
			<td>Information in shared system resources: Security levels<br />
			Withdrawn: Incorporated into SC-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>04(02)</td>
			<td>Information in shared system resources</td>
			<td>Information in shared system resources: Multilevel or periods processing<br />
			Prevent unauthorized information transfer via shared resources in accordance with [Assignment: organization-defined procedures] when system processing explicitly switches between different information classification levels or security categories.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>05</td>
			<td>Denial-of-service protection</td>
			<td>
			<ol class="lst-upr-alph"><li>[Selection (one): Protect against; Limit] the effects of the following types of denial-of-service events: [Assignment: organization-defined types of denial-of-service events].</li>
				<li>Employ the following controls to achieve the denial-of-service objective: [Assignment: organization-defined controls by type of denial-of-service event].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>05(01)</td>
			<td>Denial-of-service protection</td>
			<td>Denial-of-service protection: Restrict ability to attack other systems<br />
			Restrict the ability of individuals to launch the following denial-of-service attacks against other systems: [Assignment: organization-defined denial-of-service attacks].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>05(02)</td>
			<td>Denial-of-service protection</td>
			<td>Denial-of service-protection: Capacity, bandwidth, and redundancy<br />
			Manage capacity, bandwidth, or other redundancy to limit the effects of information flooding denial-of-service attacks.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>05(03)</td>
			<td>Denial-of-service protection</td>
			<td>Denial-of-service protection: Detection and monitoring
			<ol class="lst-lwr-alph"><li>Employ the following monitoring tools to detect indicators of denial-of-service attacks against, or launched from, the system: [Assignment: organization-defined monitoring tools].</li>
				<li>Monitor the following system resources to determine if sufficient resources exist to prevent effective denial-of-service attacks: [Assignment: organization-defined system resources].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>06</td>
			<td>Resource availability</td>
			<td>Protect the availability of resources by allocating [Assignment: organization-defined resources] by [Selection (one or more): priority; quota; [Assignment: organization-defined controls]].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07</td>
			<td>Boundary protection</td>
			<td>
			<ol class="lst-upr-alph"><li>Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system.</li>
				<li>Implement subnetworks for publicly accessible system components that are [Selection (one): physically; logically] separated from internal organizational networks.</li>
				<li>Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(01)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Physically separated subnetworks<br />
			Withdrawn: Incorporated into SC-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(02)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Public access<br />
			Withdrawn: Incorporated into SC-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(03)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Access points<br />
			Limit the number of external network connections to the system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(04)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: External telecommunications services
			<ol class="lst-lwr-alph"><li>Implement a managed interface for each external telecommunication service.</li>
				<li>Establish a traffic flow policy for each managed interface.</li>
				<li>Protect the confidentiality and integrity of the information being transmitted across each interface.</li>
				<li>Document each exception to the traffic flow policy with a supporting mission or business need and the duration of that need.</li>
				<li>Review exceptions to the traffic flow policy [Assignment: organization-defined frequency] and remove exceptions that are no longer supported by an explicit mission or business need.</li>
				<li>Prevent unauthorized exchange of control plane traffic with external networks.</li>
				<li>Publish information to enable remote networks to detect unauthorized control plane traffic from internal networks.</li>
				<li>Filter unauthorized control plane traffic from external networks.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(05)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: deny by default - Allow by exception<br />
			Deny network communications traffic by default and allow network communications traffic by exception [Selection (one or more): at managed interfaces; for [Assignment: organization-defined systems]].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(06)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Response to recognized failures<br />
			Withdrawn: Incorporated into SC-07(18).</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(07)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Split tunnelling for remote devices<br />
			Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using [Assignment: organization-defined safeguards].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(08)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Route traffic to authenticated proxy servers<br />
			Route [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(09)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Restrict threatening outgoing communications traffic
			<ol class="lst-lwr-alph"><li>Detect and deny outgoing communications traffic posing a threat to external systems.</li>
				<li>Audit the identity of internal users associated with denied communications.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(10)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Prevent exfiltration
			<ol class="lst-lwr-alph"><li>Prevent the exfiltration of information.</li>
				<li>Conduct exfiltration tests [Assignment: organization-defined frequency].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(11)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Restrict incoming communications traffic<br />
			Only allow incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(12)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Host-based protection<br />
			Implement [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined system components].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(13)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Isolation of security tools, mechanisms, and support components<br />
			Isolate [Assignment: organization-defined information security tools, mechanisms, and support components] from other internal system components by implementing physically separate subnetworks with managed interfaces to other components of the system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(14)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Protects against unauthorized physical connections<br />
			Protect against unauthorized physical connections at [Assignment: organization-defined managed interfaces].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(15)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Network privileged accesses<br />
			Route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(16)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Prevent discovery of system components<br />
			Prevent the discovery of specific system components that represent a managed interface.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(17)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Automated enforcement of protocol formats<br />
			Enforce adherence to protocol formats.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(18)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Fail secure<br />
			Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(19)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Block communication from non-organizationally configured hosts<br />
			Block inbound and outbound communications traffic between [Assignment: organization-defined communication clients] that are independently configured by end users and external service providers.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(20)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Dynamic isolation and segregation<br />
			Provide the capability to dynamically isolate [Assignment: organization-defined system components] from other system components.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(21)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Isolation of system components<br />
			Employ boundary protection mechanisms to isolate [Assignment: organization-defined system components] supporting [Assignment: organization-defined missions and/or business functions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(22)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Separate subnets for connecting to different security domains<br />
			Implement separate network addresses to connect to systems in different security domains.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(23)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Disable sender feedback on protocol validation failure<br />
			Disable feedback to senders on protocol format validation failure.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(24)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Personal information<br />
			For systems that handle personal information:
			<ol class="lst-lwr-alph"><li>apply the following handling rules to data elements of personal information: [Assignment: organization-defined handling rules]</li>
				<li>monitor for permitted handling at the external interfaces to the system and at key internal boundaries within the system</li>
				<li>document each handling exception</li>
				<li>review and remove exceptions that are no longer supported</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(25)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Unclassified national security system connections<br />
			Prohibit the direct connection of [Assignment: organization-defined unclassified national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(26)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Classified national security system connections<br />
			Prohibit the direct connection of a classified national security system to an external network without the use of [Assignment: organization-defined boundary protection device].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(27)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Unclassified non-national security system connections<br />
			Prohibit the direct connection of [Assignment: organization-defined unclassified non-national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(28)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Connections to public networks<br />
			Prohibit the direct connection of [Assignment: organization-defined system] to a public network.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>07(29)</td>
			<td>Boundary protection</td>
			<td>Boundary protection: Separate subnets to isolate functions<br />
			Implement [Selection (one): physically; logically] separate subnetworks to isolate the following critical system components and functions: [Assignment: organization-defined critical system components and functions].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>08</td>
			<td>Transmission confidentiality and integrity</td>
			<td>Protect the [Selection (one or more): confidentiality; integrity] of transmitted information.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>08(01)</td>
			<td>Transmission confidentiality and integrity</td>
			<td>Transmission confidentiality and integrity: Cryptographic protection<br />
			Implement cryptographic mechanisms to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>08(02)</td>
			<td>Transmission confidentiality and integrity</td>
			<td>Transmission confidentiality and integrity: Pre- and post-transmission handling<br />
			Maintain the [Selection (one or more): confidentiality; integrity] of information during preparation for transmission and during reception.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>08(03)</td>
			<td>Transmission confidentiality and integrity</td>
			<td>Transmission confidentiality and integrity: Cryptographic protection for message externals<br />
			Implement cryptographic mechanisms to protect message externals unless otherwise protected by [Assignment: organization-defined alternative physical controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>08(04)</td>
			<td>Transmission confidentiality and integrity</td>
			<td>Transmission confidentiality and integrity: Conceal or randomize communications<br />
			Implement cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by [Assignment: organization-defined alternative physical controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>08(05)</td>
			<td>Transmission confidentiality and integrity</td>
			<td>Transmission confidentiality and integrity: Protected distribution system<br />
			Implement [Assignment: organization-defined protected distribution system] to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>09</td>
			<td>Transmission confidentiality</td>
			<td>Withdrawn: Incorporated into SC-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>10</td>
			<td>Network disconnect</td>
			<td>Terminate the network connection associated with a communications session at the end of the session or after [Assignment: organization-defined time period] of inactivity.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>11</td>
			<td>Trusted path</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide a [Selection (one): physically; logically] isolated trusted communications path for communications between the user and the trusted components of the system.</li>
				<li>Permit users to invoke the trusted communications path for communications between the user and the following security functions of the system, including at a minimum, authentication and re-authentication: [Assignment: organization-defined security functions].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>11(01)</td>
			<td>Trusted path</td>
			<td>Trusted path: Irrefutable communications path
			<ol class="lst-lwr-alph"><li>Provide a trusted communications path that is irrefutably distinguishable from other communications paths.</li>
				<li>Initiate the trusted communications path for communications between the [Assignment: organization-defined security functions] of the system and the user.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>12</td>
			<td>Cryptographic key establishment and management</td>
			<td>Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>12(01)</td>
			<td>Cryptographic key establishment and management</td>
			<td>Cryptographic key establishment and management: Availability<br />
			Maintain availability of information in the event of the loss of cryptographic keys by users.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>12(02)</td>
			<td>Cryptographic key establishment and management</td>
			<td>Cryptographic key establishment and management: Symmetric keys<br />
			Produce, control, and distribute symmetric cryptographic keys using [Selection (one): <abbr title="Cryptographic Module Validation Program">CMVP</abbr>-validated; Cyber Centre-approved; prepositioned keying material] key management technology and processes.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>12(03)</td>
			<td>Cryptographic key establishment and management</td>
			<td>Cryptographic key establishment and management: Asymmetric keys<br />
			Produce, control, and distribute asymmetric cryptographic keys using [Selection (one): Cyber Centre-approved key management technology and processes; prepositioned keying material; Cyber Centre-approved or Cyber Centre-issued Medium Assurance Public Key Infrastructure (PKI) certificates; Cyber Centre-approved or Cyber Centre-issued Medium Hardware Assurance <abbr title="Public Key Infrastructure">PKI</abbr> certificates and hardware security tokens that protect the user’s private key; certificates issued in accordance with organization-defined requirements].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>12(04)</td>
			<td>Cryptographic key establishment and management</td>
			<td>Cryptographic key establishment and management: <abbr title="Public Key Infrastructure">PKI</abbr> certificates<br />
			Withdrawn: Incorporated into SC-12(03).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>12(05)</td>
			<td>Cryptographic key establishment and management</td>
			<td>Cryptographic key establishment and management: PKI certificates / hardware tokens<br />
			Withdrawn: Incorporated into SC-12(03).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>12(06)</td>
			<td>Cryptographic key establishment and management</td>
			<td>Cryptographic key establishment and management: Physical control of keys<br />
			Maintain physical control of cryptographic keys when stored information is encrypted by external service providers.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13</td>
			<td>Cryptographic protection</td>
			<td>
			<ol class="lst-upr-alph"><li>Determine the [Assignment: organization-defined cryptographic uses].</li>
				<li>Implement the following types of cryptography required for each specified cryptographic use: [Assignment: organization-defined types of cryptography for each specified cryptographic use].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(01)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: <abbr title="Federal Information Processing Standard">FIPS</abbr>-validated cryptography<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(02)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: National Security Agency (NSA)-approved cryptography<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(03)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: Individuals without formal access approvals<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(04)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: Digital signatures<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(400)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: Protected A data in transit<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(401)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: Protected B data in transit<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(402)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: Protected C data in transit<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(403)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: Protected data at rest<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>13(404)</td>
			<td>Cryptographic protection</td>
			<td>Cryptographic protection: National security systems<br />
			Withdrawn: Incorporated into SC-13.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>14</td>
			<td>Public access protections</td>
			<td>Withdrawn: Incorporated into AC-02, AC-03, AC-05, AC-06, SI-03, SI-04, SI-05, SI-07, and SI-10.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>15</td>
			<td>Collaborative computing devices and applications</td>
			<td>
			<ol class="lst-upr-alph"><li>Prohibit remote activation of collaborative computing devices and applications with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed].</li>
				<li>Provide an explicit indication of use to users physically present at the devices.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>15(01)</td>
			<td>Collaborative computing devices and applications</td>
			<td>Collaborative computing devices and applications: Physical or logical disconnect<br />
			Provide [Selection (one or more): physical; logical] disconnect of collaborative computing devices in a manner that supports ease of use.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>15(02)</td>
			<td>Collaborative computing devices and applications</td>
			<td>Collaborative computing devices and applications: Blocking inbound / outbound communications traffic<br />
			Withdrawn: Incorporated into SC-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>15(03)</td>
			<td>Collaborative computing devices and applications</td>
			<td>Collaborative computing devices and applications: Disabling and removal in secure work areas<br />
			Disable or remove collaborative computing devices and applications from [Assignment: organization-defined systems or system components] in [Assignment: organization-defined secure work areas].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>15(04)</td>
			<td>Collaborative computing devices and applications</td>
			<td>Collaborative computing devices and applications: Explicitly indicate current participants<br />
			Provide an explicit indication of current participants in [Assignment: organization-defined online meetings and teleconferences].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>16</td>
			<td>Transmission of security and privacy attributes</td>
			<td>Associate [Assignment: organization-defined security and privacy attributes] with information exchanged between systems and between system components.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>16(01)</td>
			<td>Transmission of security and privacy attributes</td>
			<td>Transmission of security and privacy attributes: Integrity verification<br />
			Verify the integrity of transmitted security and privacy attributes.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>16(02)</td>
			<td>Transmission of security and privacy attributes</td>
			<td>Transmission of security and privacy attributes: Anti-spoofing mechanisms<br />
			Implement anti-spoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>16(03)</td>
			<td>Transmission of security and privacy attributes</td>
			<td>Transmission of security and privacy attributes: Cryptographic binding<br />
			Implement [Assignment: organization-defined mechanisms or techniques] to bind security and privacy attributes to transmitted information.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>17</td>
			<td>Public key infrastructure certificates</td>
			<td>
			<ol class="lst-upr-alph"><li>Issue public key certificates under an [Assignment: organization-defined certificate policy] or obtain public key certificates from an approved service provider; and</li>
				<li>Include only approved trust anchors in trust stores or certificate stores managed by the organization.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>18</td>
			<td>Mobile code</td>
			<td>
			<ol class="lst-upr-alph"><li>Define acceptable and unacceptable mobile code and mobile code technologies.</li>
				<li>Authorize, monitor, and control the use of mobile code within the system.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>18(01)</td>
			<td>Mobile code</td>
			<td>Mobile code: Identify unacceptable code and take corrective actions<br />
			Identify [Assignment: organization-defined unacceptable mobile code] and take [Assignment: organization-defined corrective actions].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>18(02)</td>
			<td>Mobile code</td>
			<td>Mobile code: Acquisition, development, and use<br />
			Verify that the acquisition, development, and use of mobile code to be deployed in the system meets [Assignment: organization-defined mobile code requirements].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>18(03)</td>
			<td>Mobile code</td>
			<td>Mobile code: Prevent downloading and execution<br />
			Prevent the download and execution of [Assignment: organization-defined unacceptable mobile code].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>18(04)</td>
			<td>Mobile code</td>
			<td>Mobile code: Prevent automatic execution<br />
			Prevent the automatic execution of mobile code in [Assignment: organization-defined software applications] and enforce [Assignment: organization-defined actions] prior to executing the code.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>18(05)</td>
			<td>Mobile code</td>
			<td>Mobile code: Allow execution only in confined environments<br />
			Allow execution of permitted mobile code only in confined virtual machine environments.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>19</td>
			<td>Voice over internet protocol</td>
			<td>
			<ol class="lst-upr-alph"><li>The organization establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.</li>
				<li>The organization authorizes, monitors, and controls the use of <abbr title="Voice over Internet Protocol ">VoIP</abbr> within the information system.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>19(400)</td>
			<td>Voice over internet protocol</td>
			<td>Voice over internet protocol: Protocol conversion<br />
			Unclassified VoIP is not permitted within classified facilities unless the VoIP is converted to plain old telephone systems (POTS) before exiting the facility boundary.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>19(401)</td>
			<td>Voice over internet protocol</td>
			<td>Voice over internet protocol: No public network access<br />
			Unclassified <abbr title="Voice over Internet Protocol ">VoIP</abbr> over a Local Area Network (LAN) with access to a public data network is not permitted within classified facilities.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>20</td>
			<td>Secure name / address resolution service (authoritative source)</td>
			<td>
			<ol class="lst-upr-alph"><li>Provide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.</li>
				<li>Provide the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>20(01)</td>
			<td>Secure name / address resolution service (authoritative source)</td>
			<td>Secure name / address resolution service (authoritative source): Child subspaces<br />
			Withdrawn: Incorporated into SC-20.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>20(02)</td>
			<td>Secure name / address resolution service (authoritative source)</td>
			<td>Secure name / address resolution service (authoritative source): Data origin and integrity<br />
			Provide data origin and integrity protection artifacts for internal name/address resolution queries.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>21</td>
			<td>Secure name / address resolution service (recursive or caching resolver)</td>
			<td>Request and perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>21(01)</td>
			<td>Secure name / address resolution service (recursive or caching resolver)</td>
			<td>Secure name / address resolution service (recursive or caching resolver): Data origin / integrity<br />
			Withdrawn: Incorporated into SC-21.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>22</td>
			<td>Architecture and provisioning for name / address resolution service</td>
			<td>Ensure the systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal and external role separation.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>23</td>
			<td>Session authenticity</td>
			<td>Protect the authenticity of communications sessions.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>23(01)</td>
			<td>Session authenticity</td>
			<td>Session authenticity: Invalidate session identifiers at logout<br />
			Invalidate session identifiers upon user logout or other session termination.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>23(02)</td>
			<td>Session authenticity</td>
			<td>Session authenticity: User-initiated logouts / message displays<br />
			Withdrawn: Incorporated into AC-12(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>23(03)</td>
			<td>Session authenticity</td>
			<td>Session authenticity: Unique system-generated session identifiers<br />
			Generate a unique session identifier for each session with [Assignment: organization-defined randomness requirements] and recognize only session identifiers that are system-generated.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>23(04)</td>
			<td>Session authenticity</td>
			<td>Session authenticity: Unique session identifiers with randomization<br />
			Withdrawn: Incorporated into SC-23(03).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>23(05)</td>
			<td>Session authenticity</td>
			<td>Session authenticity: Allowed certificate authorities<br />
			Only allow the use of [Assignment: organization-defined certificate authorities] for verification of the establishment of protected sessions.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>24</td>
			<td>Fail in known state</td>
			<td>Fail to a [Assignment: organization-defined known system state] for the following failures on the indicated components while preserving [Assignment: organization-defined system state information] in failure: [Assignment: list of organization-defined types of system failures on organization-defined system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>25</td>
			<td>Thin nodes</td>
			<td>Employ minimal functionality and information storage on the following system components: [Assignment: organization-defined system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>26</td>
			<td>Decoys</td>
			<td>Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>26(01)</td>
			<td>Decoys</td>
			<td>Decoys: Detection of malicious code<br />
			Withdrawn: Incorporated into SC-35.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>27</td>
			<td>Platform-independent applications</td>
			<td>Include within organizational systems the following platform independent applications: [Assignment: organization-defined platform-independent applications].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>28</td>
			<td>Protection of information at rest</td>
			<td>Protect the [Selection (one or more): confidentiality; integrity] of the following information at rest: [Assignment: organization-defined information at rest].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>28(01)</td>
			<td>Protection of information at rest</td>
			<td>Protection of information at rest: Cryptographic protection<br />
			Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of the following information at rest on [Assignment: organization-defined system components or media]: [Assignment: organization-defined information].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>28(02)</td>
			<td>Protection of information at rest</td>
			<td>Protection of information at rest: Offline storage<br />
			Remove the following information from online storage and store offline in a secure location: [Assignment: organization-defined information].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>28(03)</td>
			<td>Protection of information at rest</td>
			<td>Protection of information at rest: Cryptographic keys<br />
			Provide protected storage for cryptographic keys [Selection (one): [Assignment: organization-defined safeguards]; hardware-protected key store].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>29</td>
			<td>Heterogeneity</td>
			<td>Employ a diverse set of information technologies for the following system components in the implementation of the system: [Assignment: organization-defined system components].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>[cyber security devices and tools]</td>
			<td>In order to protect <abbr title="Protected B, medium integrity, medium availability">PBMM</abbr> against Td4 compromise using a single unknown system flaw (a 0-Day), disaggregate the business functions between systems that do not share a single-point-of-failure. For example, host one line-of-business database in Windows, and a different line-of-business database in Linux.</td>
		</tr><tr><td>SC</td>
			<td>29(01)</td>
			<td>Heterogeneity</td>
			<td>Heterogeneity: Virtualization techniques<br />
			Employ virtualization techniques to support the deployment of a diversity of operating systems and applications that are changed [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>30</td>
			<td>Concealment and misdirection</td>
			<td>Employ the following concealment and misdirection techniques for [Assignment: organization-defined systems] at [Assignment: organization-defined time periods] to confuse and mislead adversaries: [Assignment: organization-defined concealment and misdirection techniques].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>30(01)</td>
			<td>Concealment and misdirection</td>
			<td>Concealment and misdirection: Virtualization techniques<br />
			Withdrawn: Incorporated into SC-29(01).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>30(02)</td>
			<td>Concealment and misdirection</td>
			<td>Concealment and misdirection: Randomness<br />
			Employ [Assignment: organization-defined techniques] to introduce randomness into organizational operations and assets.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>30(03)</td>
			<td>Concealment and misdirection</td>
			<td>Concealment and misdirection: Randomness<br />
			Employ [Assignment: organization-defined techniques] to introduce randomness into organizational operations and assets.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>30(04)</td>
			<td>Concealment and misdirection</td>
			<td>Concealment and misdirection: Misleading information<br />
			Employ realistic, but misleading information in [Assignment: organization-defined system components] about its security state or posture.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>30(05)</td>
			<td>Concealment and misdirection</td>
			<td>Concealment and misdirection: Concealment of system components<br />
			Employ the following techniques to hide or conceal [Assignment: organization-defined system components]: [Assignment: organization-defined techniques].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>31</td>
			<td>Covert channel analysis</td>
			<td>
			<ol class="lst-upr-alph"><li>Perform a covert channel analysis to identify those aspects of communications within the system that are potential avenues for covert [Selection (one or more): storage; timing] channels.</li>
				<li>Estimate the maximum bandwidth of those channels.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>31(01)</td>
			<td>Covert channel analysis</td>
			<td>Covert channel analysis: Test covert channels for exploitability<br />
			Test a subset of the identified covert channels to determine the channels that are exploitable.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>31(02)</td>
			<td>Covert channel analysis</td>
			<td>Covert channel analysis: Maximum bandwidth<br />
			Reduce the maximum bandwidth for identified covert [Selection (one or more): storage; timing] channels to [Assignment: organization-defined values].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>31(03)</td>
			<td>Covert channel analysis</td>
			<td>Covert channel analysis: Measure bandwidth in operational environments<br />
			Measure the bandwidth of [Assignment: organization-defined subset of identified covert channels] in the operational environment of the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>32</td>
			<td>System partitioning</td>
			<td>Partition the system into [Assignment: organization-defined system components] residing in separate [Selection (one): physical; logical] domains or environments based on [Assignment: organization-defined circumstances for physical or logical separation of components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>32(01)</td>
			<td>System partitioning</td>
			<td>System partitioning: Separate physical domains for privileged functions<br />
			Partition privileged functions into separate physical domains.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>33</td>
			<td>Transmission preparation integrity</td>
			<td>Withdrawn: Incorporated into SC-08.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>34</td>
			<td>Non-modifiable executable programs</td>
			<td>For [Assignment: organization-defined system components], load and execute:
			<ol class="lst-upr-alph"><li>the operating environment from hardware-enforced, read-only media</li>
				<li>the following applications from hardware-enforced, read-only media: [Assignment: organization-defined applications]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>34(01)</td>
			<td>Non-modifiable executable programs</td>
			<td>Non-modifiable executable programs: No writable storage<br />
			Employ [Assignment: organization-defined system components] with no writeable storage that is persistent across component restart or power on/off.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>34(02)</td>
			<td>Non-modifiable executable programs</td>
			<td>Non-modifiable executable programs: Integrity protection and read-only media<br />
			Protect the integrity of information prior to storage on read-only media and control the media after such information has been recorded onto the media.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>34(03)</td>
			<td>Non-modifiable executable programs</td>
			<td>Non-modifiable executable programs: Hardware-based protection<br />
			Withdrawn: Moved to SC-51.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>35</td>
			<td>External malicious code identification</td>
			<td>Include system components that proactively seek to identify network-based malicious code or malicious websites.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>36</td>
			<td>Distributed processing and storage</td>
			<td>Distribute the following processing and storage components across multiple [Selection (one): physical locations; logical domains]: [Assignment: organization-defined processing and storage components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>36(01)</td>
			<td>Distributed processing and storage</td>
			<td>Distributed processing and storage: Polling techniques
			<ol class="lst-lwr-alph"><li>Employ polling techniques to identify potential faults, errors, or compromises to the following processing and storage components: [Assignment: organization-defined distributed processing and storage components].</li>
				<li>Take the following actions in response to identified faults, errors, or compromises: [Assignment: organization-defined actions].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>36(02)</td>
			<td>Distributed processing and storage</td>
			<td>Distributed processing and storage: Synchronization<br />
			Synchronize the following duplicate systems or system components: [Assignment: organization-defined duplicate systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>37</td>
			<td>Out-of-band channels</td>
			<td>Employ the following out-of-band channels for the physical delivery or electronic transmission of [Assignment: organization-defined information, system components, or devices] to [Assignment: organization-defined individuals or systems]: [Assignment: organization-defined out-of-band channels].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>37(01)</td>
			<td>Out-of-band channels</td>
			<td>Out-of-band channels: Ensure delivery and transmission<br />
			Employ [Assignment: organization-defined controls] to ensure that only [Assignment: organization-defined individuals or systems] receive the following information, system components, or devices: [Assignment: organization-defined information, system components, or devices].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>38</td>
			<td>Operations security</td>
			<td>Employ the following operations security controls to protect key organizational information throughout the system development lifecycle: [Assignment: organization-defined operations security controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>39</td>
			<td>Process isolation</td>
			<td>Maintain a separate execution domain for each executing system process.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>39(01)</td>
			<td>Process isolation</td>
			<td>Process isolation: Hardware separation<br />
			Implement hardware separation mechanisms to facilitate process isolation.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>39(02)</td>
			<td>Process isolation</td>
			<td>Process isolation: Separate execution domain per thread<br />
			Maintain a separate execution domain for each thread in [Assignment: organization-defined multi-threaded processing].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>40</td>
			<td>Wireless link protection</td>
			<td>Protect external and internal [Assignment: organization-defined wireless links] from the following signal parameter attacks: [Assignment: organization-defined types of signal parameter attacks or references to sources for such attacks].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>40(01)</td>
			<td>Wireless link protection</td>
			<td>Wireless link protection: Electromagnetic interference<br />
			Implement cryptographic mechanisms that achieve [Assignment: organization-defined level of protection] against the effects of intentional electromagnetic interference.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>40(02)</td>
			<td>Wireless link protection</td>
			<td>Wireless link protection: Reduce detection potential<br />
			Implement cryptographic mechanisms to reduce the detection potential of wireless links to [Assignment: organization-defined level of reduction].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>40(03)</td>
			<td>Wireless link protection</td>
			<td>Wireless link protection: Imitative or manipulative communications deception<br />
			Implement cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>40(04)</td>
			<td>Wireless link protection</td>
			<td>Wireless link protection: Signal parameter identification<br />
			Implement cryptographic mechanisms to prevent the identification of [Assignment: organization-defined wireless transmitters] by using the transmitter signal parameters.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>41</td>
			<td>Port and <abbr title="input/output">i/o</abbr> device access</td>
			<td>[Selection (one): Physically; Logically] disable or remove [Assignment: organization-defined connection ports or input/output devices] on the following systems or system components: [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>42</td>
			<td>Sensor capability and data</td>
			<td>
			<ol class="lst-upr-alph"><li>Prohibit [Selection (one or more): the use of devices possessing [Assignment: organization-defined environmental sensing capabilities] in [Assignment: organization-defined facilities, areas, or systems]; the remote activation of environmental sensing capabilities on organizational systems or system components with the following exceptions: [Assignment: organization-defined exceptions where remote activation of sensors is allowed]].</li>
				<li>Provide an explicit indication of sensor use to [Assignment: organization-defined group of users].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>42(01)</td>
			<td>Sensor capability and data</td>
			<td>Sensor capability and data: Reporting to authorized individuals or roles<br />
			Verify that the system is configured so that data or information collected by the [Assignment: organization-defined sensors] is only reported to authorized individuals or roles.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>42(02)</td>
			<td>Sensor capability and data</td>
			<td>Sensor capability and data: Authorized use<br />
			Employ the following measures so that data or information collected by [Assignment: organization-defined sensors] is only used for authorized purposes: [Assignment: organization-defined measures].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>42(03)</td>
			<td>Sensor capability and data</td>
			<td>Sensor capability and data: Prohibit use of devices<br />
			Withdrawn: Incorporated into SC-42.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>42(04)</td>
			<td>Sensor capability and data</td>
			<td>Sensor capability and data: Notice of collection<br />
			Employ the following measures to facilitate an individual’s awareness that personal information is being collected by [Assignment: organization-defined sensors]: [Assignment: organization-defined measures].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>42(05)</td>
			<td>Sensor capability and data</td>
			<td>Sensor capability and data: Collection minimization<br />
			Employ [Assignment: organization-defined sensors] that are configured to minimize the collection of information about individuals that is not needed.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>42(400)</td>
			<td>Sensor capability and data</td>
			<td>Sensor capability and data: Disablement in security/high security zone<br />
			Ensure that the organization disables all sensors on all devices when they are not approved to process information at the highest classification level in the security or high-security zone they are in.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>43</td>
			<td>Usage restrictions</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish usage restrictions and implementation guidelines for the following system components: [Assignment: organization-defined system components].</li>
				<li>Authorize, monitor, and control the use of such components within the system.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>44</td>
			<td>Detonation chambers</td>
			<td>Employ a detonation chamber capability within [Assignment: organization-defined system, system component, or location].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>45</td>
			<td>System time synchronization</td>
			<td>Synchronize system clocks within and between systems and system components.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>45(01)</td>
			<td>System time synchronization</td>
			<td>System time synchronization: Synchronization with authoritative time source
			<ol class="lst-lwr-alph"><li>Compare the internal system clocks [Assignment: organization-defined frequency] with [Assignment: organization-defined authoritative time source].</li>
				<li>Synchronize the internal system clocks to the authoritative time source when the time difference is greater than [Assignment: organization-defined time period].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>45(02)</td>
			<td>System time synchronization</td>
			<td>System time synchronization: Secondary authoritative time source
			<ol class="lst-lwr-alph"><li>Identify a secondary authoritative time source that is in a different geographic region than the primary authoritative time source.</li>
				<li>Synchronize the internal system clocks to the secondary authoritative time source if the primary authoritative time source is unavailable.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>46</td>
			<td>Cross domain policy enforcement</td>
			<td>Implement a policy enforcement mechanism [Selection (one): physically; logically] between the physical and/or network interfaces for the connecting security domains.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>46(400)</td>
			<td>Cross domain policy enforcement</td>
			<td>Cross domain policy enforcement: Manual data transfer<br />
			Limit the use of manual data transfer.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>47</td>
			<td>Alternate communications paths</td>
			<td>Establish [Assignment: organization-defined alternate communications paths] for system operations organizational command and control.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>48</td>
			<td>Sensor relocation</td>
			<td>Relocate [Assignment: organization-defined sensors and monitoring capabilities] to [Assignment: organization-defined locations] under the following conditions or circumstances: [Assignment: organization-defined conditions or circumstances].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>48(01)</td>
			<td>Sensor relocation</td>
			<td>Sensor relocation: Dynamic relocation of sensors or monitoring capabilities<br />
			Dynamically relocate [Assignment: organization-defined sensors and monitoring capabilities] to [Assignment: organization-defined locations] under the following conditions or circumstances: [Assignment: organization-defined conditions or circumstances].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>49</td>
			<td>Hardware-enforced separation and policy enforcement</td>
			<td>Implement hardware-enforced separation and policy enforcement mechanisms between [Assignment: organization-defined security domains].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>50</td>
			<td>Software-enforced separation and policy enforcement</td>
			<td>Implement software-enforced separation and policy enforcement mechanisms between [Assignment: organization-defined security domains].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>51</td>
			<td>Hardware-based protection</td>
			<td>
			<ol class="lst-upr-alph"><li>Employ hardware-based write-protect for [Assignment: organization-defined system firmware components].</li>
				<li>Implement specific procedures for [Assignment: organization-defined authorized individuals] to manually disable hardware write-protect for firmware modifications and re-enable the write-protect prior to returning to operational mode.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>400</td>
			<td>Entity source authentication</td>
			<td>The information system allows a message recipient to verify the claimed source identifier in a message.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>400(01)</td>
			<td>Entity source authentication</td>
			<td>Entity source authentication: Claimed identifier authentication<br />
			Authentication of the claimed identifier in the message is cryptographically based.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>400(02)</td>
			<td>Entity source authentication</td>
			<td>Entity source authentication: Digital signature<br />
			The organization employs Cryptographic Module Validation Program (CMVP)-certified cryptography for digital signature generation and verification.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>400(03)</td>
			<td>Entity source authentication</td>
			<td>Entity source authentication: Authentication implementation<br />
			The organization employs Cyber Centre-approved cryptography and protocols to implement the authentication.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SC</td>
			<td>401</td>
			<td>Unclassified telecommunications systems in secure facilities</td>
			<td>
			<ol class="lst-upr-alph"><li>Unclassified telecommunications systems in secure facilities must not pass/transmit sensitive audio discussions when they are idle and not in use. Additionally, these telecommunications systems must be configured to prevent external control or activation. The concepts of on-hook audio protection outlined in <abbr title="US Committee on National Security Systems Instruction">CNSSI</abbr> 5002 and 5006 must be incorporated into secure facilities’ telecommunications systems.</li>
				<li>Unclassified telephone systems and services must be configured to prevent technical exploitation or penetration. In addition, these systems must incorporate physical and software access controls to prevent disclosure or manipulation of system programming and stored data.</li>
				<li>The organization must ensure that the following specific requirements are applied to unclassified telecommunications systems:
				<ol><li>Provide on-hook audio protection by the use of <abbr title="US Committee on National Security Systems Instruction">CNSSI</abbr> 5006 equipment, <abbr title="US Committee on National Security Systems Instruction">CNSSI</abbr> 5006-approved disconnect devices, or equivalent <abbr title="US Committee on National Security Systems Instruction">CNSSI</abbr> 5002 system configuration</li>
					<li>Provide isolation by using a computerized telephone system (CTS) with control of software and hardware configuration control and of audit reports (such as station message detail reporting, call detail reporting, etc.). System programming will not include the ability to place, or keep, a handset off-hook. Configuration of the system must ensure that all on-hook and off-hook vulnerabilities are identified and mitigated</li>
					<li>Ensure that equipment used for the administration of telephone systems is installed inside an area where access is limited to authorized personnel. When local administration terminals (for a <abbr title="computerized telephone system">CTS</abbr>) are not or cannot be contained within the controlled area or safeguarded against unauthorized manipulation, then the use of <abbr title="US Committee on National Security Systems Instruction">CNSSI</abbr> 5006-approved telephone equipment must be required, regardless of the <abbr title="computerized telephone system">CTS</abbr> configuration</li>
					<li>Ensure that remote maintenance is not used outside the secure facility</li>
					<li>Ensure that speakerphones and audio-conferencing systems are not used on unclassified telecommunications systems in secure facilities. CSE may approve exceptions to this requirement when these systems have sufficient audio isolation from other classified discussion areas in the secure facility, and when there are established procedures to prevent inadvertent transmission of classified information</li>
					<li>Ensure that features used for voicemail or unified messaging services are configured to prevent unauthorized access to remote diagnostic ports or internal dial tone</li>
					<li>Ensure that telephone answering devices (TAD) and facsimile machines do not contain features that introduce security vulnerabilities, for example, remote room monitoring, remote programming, or other similar features that may permit off-premises access to room audio. Prior CSE approval is required before installation or use.</li>
				</ol></li>
				<li>All unclassified telecommunications systems and associated infrastructure must be electrically and physically isolated from any classified information/telecommunications systems in accordance with <abbr title="United States Committee on National Security Systems">CNSS</abbr> requirements or any other separation standards applied to the classified information system on site.</li>
				<li>The security requirements and installation guidelines contained in the <abbr title="US Committee on National Security Systems Instruction">CNSSI</abbr> 5000 shall be followed for VoIP systems installed in any physical security zone processing classified information.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.19">Table 4.19: System and information integrity</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>SI</td>
			<td>01</td>
			<td>System and information integrity policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] system and information integrity policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the system and information integrity policy and the associated system and information integrity controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the system and information integrity policy and procedures.</li>
				<li>Review and update the current system and information integrity:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>02</td>
			<td>Flaw remediation</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify, report, and correct system flaws.</li>
				<li>Test software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation.</li>
				<li>Install security-relevant software and firmware updates within [Assignment: organization-defined time period] of the release of the updates.</li>
				<li>Incorporate flaw remediation into the organizational configuration management process.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>02(01)</td>
			<td>Flaw remediation</td>
			<td>Flaw remediation: Central management<br />
			Withdrawn: Incorporated into PL-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>02(02)</td>
			<td>Flaw remediation</td>
			<td>Flaw remediation: Automated flaw remediation status<br />
			Determine if system components have applicable security-relevant software and firmware updates installed using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>02(03)</td>
			<td>Flaw remediation</td>
			<td>Flaw remediation: Time to remediate flaws and benchmarks for corrective actions
			<ol class="lst-lwr-alph"><li>Measure the time between flaw identification and flaw remediation.</li>
				<li>Establish the following benchmarks for taking corrective actions: [Assignment: organization-defined benchmarks].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>02(04)</td>
			<td>Flaw remediation</td>
			<td>Flaw remediation: Automated patch management tools<br />
			Withdrawn: Incorporated into SI-02.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>02(05)</td>
			<td>Flaw remediation</td>
			<td>Flaw remediation: Automatic software and firmware updates<br />
			Install [Assignment: organization-defined security-relevant software and firmware updates] automatically to [Assignment: organization-defined system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>02(06)</td>
			<td>Flaw remediation</td>
			<td>Flaw remediation: Removal of previous versions of software and firmware<br />
			Remove previous versions of [Assignment: organization-defined software and firmware components] after updated versions have been installed.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03</td>
			<td>Malicious code protection</td>
			<td>
			<ol class="lst-upr-alph"><li>Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code;</li>
				<li>Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures;</li>
				<li>Configure malicious code protection mechanisms to:
				<ol><li>Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files from external sources at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or executed in accordance with organizational policy; and</li>
					<li>[Selection (one or more): block malicious code; quarantine malicious code; take [Assignment: organization-defined action]]; and send alert to [Assignment: organization-defined personnel or roles] in response to malicious code detection; and</li>
				</ol></li>
				<li>Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>C. 1) frequency [at least every 30 days]<br />
			C. 2) selection [quarantine malicious code]</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(01)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Central management<br />
			Withdrawn: Incorporated into PL-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(02)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Automatic updates<br />
			Withdrawn: Incorporated into SI-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(03)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Non-privileged users<br />
			Withdrawn: Incorporated into AC-06(10).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(04)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Updates only by privileged users<br />
			Update malicious code protection mechanisms only when directed by a privileged user.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(05)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Portable storage devices<br />
			Withdrawn: Incorporated into MP-07.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(06)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Testing and verification
			<ol class="lst-lwr-alph"><li>Test malicious code protection mechanisms [Assignment: organization-defined frequency] by introducing known benign code into the system.</li>
				<li>Verify that the detection of the code and the associated incident reporting occur.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(07)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Non-signature-based detection<br />
			Withdrawn: Incorporated into SI-03.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(08)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Detect unauthorized commands
			<ol class="lst-lwr-alph"><li>Detect the following unauthorized operating system commands through the kernel application programming interface on [Assignment: organization-defined system hardware components]: [Assignment: organization-defined unauthorized operating system commands].</li>
				<li>[Selection (one or more): issue a warning; audit the command execution; prevent the execution of the command].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(09)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Authenticate remote commands<br />
			Withdrawn: Moved to AC-17(10).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>03(10)</td>
			<td>Malicious code protection</td>
			<td>Malicious code protection: Malicious code analysis
			<ol class="lst-lwr-alph"><li>Employ the following tools and techniques to analyze the characteristics and behaviour of malicious code: [Assignment: organization-defined tools and techniques].</li>
				<li>Incorporate the results from malicious code analysis into organizational incident response and flaw remediation processes.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04</td>
			<td>System monitoring</td>
			<td>
			<ol class="lst-upr-alph"><li>Monitor the system to detect:
				<ol><li>attacks and indicators of potential attacks in accordance with the following monitoring objectives: [Assignment: organization-defined monitoring objectives]</li>
					<li>unauthorized local, network, and remote connections</li>
				</ol></li>
				<li>Identify unauthorized use of the system through the following techniques and methods: [Assignment: organization-defined techniques and methods].</li>
				<li>Invoke internal monitoring capabilities or deploy monitoring devices:
				<ol><li>strategically within the system to collect organization-determined essential information</li>
					<li>at ad hoc locations within the system to track specific types of transactions of interest to the organization</li>
				</ol></li>
				<li>Analyze detected events and anomalies.</li>
				<li>Adjust the level of system monitoring activity when there is a change in risk to organizational operations and assets, individuals, other organizations, or Canada.</li>
				<li>Obtain legal opinion regarding system monitoring activities.</li>
				<li>Provide [Assignment: organization-defined system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(01)</td>
			<td>System monitoring</td>
			<td>System monitoring: System-wide intrusion detection system<br />
			Connect and configure individual intrusion detection tools into a system-wide intrusion detection system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(02)</td>
			<td>System monitoring</td>
			<td>System monitoring: Automated tools and mechanisms for real-time analysis<br />
			Employ automated tools and mechanisms to support near real-time analysis of events.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(03)</td>
			<td>System monitoring</td>
			<td>System monitoring: Automated tool and mechanism integration<br />
			Employ automated tools and mechanisms to integrate intrusion detection tools and mechanisms into access control and flow control mechanisms.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(04)</td>
			<td>System monitoring</td>
			<td>System monitoring: Inbound and outbound communications traffic
			<ol class="lst-lwr-alph"><li>Determine criteria for unusual or unauthorized activities or conditions for inbound and outbound communications traffic.</li>
				<li>Monitor inbound and outbound communications traffic [Assignment: organization-defined frequency] for [Assignment: organization-defined unusual or unauthorized activities or conditions].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(05)</td>
			<td>System monitoring</td>
			<td>System monitoring: System-generated alerts<br />
			Alert [Assignment: organization-defined personnel or roles] when the following system-generated indications of compromise or potential compromise occur: [Assignment: organization-defined compromise indicators].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(06)</td>
			<td>System monitoring</td>
			<td>System monitoring: Restrict non-privileged users<br />
			Withdrawn: Incorporated into AC-06(10).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(07)</td>
			<td>System monitoring</td>
			<td>System monitoring: Automated response to suspicious events
			<ol class="lst-lwr-alph"><li>Notify [Assignment: organization-defined incident response personnel (identified by name and/or by role)] of detected suspicious events.</li>
				<li>Take the following actions upon detection: [Assignment: organization-defined least-disruptive actions to terminate suspicious events].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(08)</td>
			<td>System monitoring</td>
			<td>System monitoring: Protection of monitoring information<br />
			Withdrawn: Incorporated into SI-04.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(09)</td>
			<td>System monitoring</td>
			<td>System monitoring: Testing of monitoring tools and mechanisms<br />
			Test intrusion-monitoring tools and mechanisms [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(10)</td>
			<td>System monitoring</td>
			<td>System monitoring: Visibility of encrypted communications<br />
			Make provisions so that [Assignment: organization-defined encrypted communications traffic] is visible to [Assignment: organization-defined system monitoring tools and mechanisms].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(11)</td>
			<td>System monitoring</td>
			<td>System monitoring: Analyze communications traffic anomalies<br />
			Analyze outbound communications traffic at the external interfaces to the system and selected [Assignment: organization-defined interior points within the system] to discover anomalies.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(12)</td>
			<td>System monitoring</td>
			<td>Information system monitoring: Automated organization-generated alerts<br />
			Alert [Assignment: organization-defined personnel or roles] using [Assignment: organization-defined automated mechanisms] when the following indications of inappropriate or unusual activities with security or privacy implications occur: [Assignment: organization-defined activities that trigger alerts].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(13)</td>
			<td>System monitoring</td>
			<td>System monitoring: Analyze traffic and event patterns
			<ol class="lst-lwr-alph"><li>Analyze communications traffic and event patterns for the system.</li>
				<li>Develop profiles representing common traffic and event patterns.</li>
				<li>Use the traffic and event profiles in tuning system-monitoring devices.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(14)</td>
			<td>System monitoring</td>
			<td>System monitoring: Wireless intrusion detection<br />
			Employ a wireless intrusion detection system (WIDS) to identify rogue wireless devices and to detect attack attempts and potential compromises or breaches to the system.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(15)</td>
			<td>System monitoring</td>
			<td>System monitoring: Wireless to wireline communications<br />
			Employ an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(16)</td>
			<td>System monitoring</td>
			<td>System monitoring: Correlate monitoring information<br />
			Correlate information from monitoring tools and mechanisms employed throughout the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(17)</td>
			<td>System monitoring</td>
			<td>System monitoring: Integrated situational awareness<br />
			Correlate information from monitoring physical, cyber, and supply chain activities to achieve integrated, organization-wide situational awareness.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(18)</td>
			<td>System monitoring</td>
			<td>System monitoring: Analyze traffic and covert exfiltration<br />
			Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: [Assignment: organization-defined interior points within the system].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(19)</td>
			<td>System monitoring</td>
			<td>System monitoring: Risk for individuals<br />
			Implement [Assignment: organization-defined additional monitoring] of individuals who have been identified by [Assignment: organization-defined sources] as posing an increased level of risk.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(20)</td>
			<td>System monitoring</td>
			<td>System monitoring: Privileged user<br />
			Implement the following additional monitoring of privileged users: [Assignment: organization-defined additional monitoring].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(21)</td>
			<td>System monitoring</td>
			<td>System monitoring: Probationary periods<br />
			Implement the following additional monitoring of individuals during [Assignment: organization-defined probationary period]: [Assignment: organization-defined additional monitoring].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(22)</td>
			<td>System monitoring</td>
			<td>System monitoring: Unauthorized network services
			<ol class="lst-lwr-alph"><li>Detect network services that have not been authorized or approved by [Assignment: organization-defined authorization or approval processes].</li>
				<li>[Selection (one or more): Audit; Alert [Assignment: organization-defined personnel or roles]] when detected.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(23)</td>
			<td>System monitoring</td>
			<td>System monitoring: Host-based devices<br />
			Implement the following host-based monitoring mechanisms at [Assignment: organization-defined system components]: [Assignment: organization-defined host-based monitoring mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(24)</td>
			<td>System monitoring</td>
			<td>System monitoring: Indicators of compromise<br />
			Discover, collect, and distribute to [Assignment: organization-defined personnel or roles], indicators of compromise (IOCs) provided by [Assignment: organization-defined sources].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>04(25)</td>
			<td>System monitoring</td>
			<td>System monitoring: Optimize network traffic analysis<br />
			Provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>05</td>
			<td>Security alerts, advisories, and directives</td>
			<td>
			<ol class="lst-upr-alph"><li>Receive system security alerts, advisories, and directives from [Assignment: organization-defined external organizations] on an ongoing basis.</li>
				<li>Generate internal security alerts, advisories, and directives as necessary.</li>
				<li>Disseminate security alerts, advisories, and directives to: [Selection (one or more): [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined elements within the organization]; [Assignment: organization-defined external organizations]].</li>
				<li>Implement security directives in accordance with established timeframes or notify the issuing organization of the degree of non-compliance.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>05(01)</td>
			<td>Security alerts, advisories, and directives</td>
			<td>Security alerts, advisories, and directives: Automated alerts and advisories<br />
			Broadcast security alert and advisory information throughout the organization using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>06</td>
			<td>Security and privacy function verification</td>
			<td>
			<ol class="lst-upr-alph"><li>Verify the correct operation of [Assignment: organization-defined security and privacy functions].</li>
				<li>Perform the verification of the functions specified in SI-06A [Selection (one or more): [Assignment: organization-defined system transitional states]; upon command by user with appropriate privilege; [Assignment: organization-defined frequency]].</li>
				<li>Alert [Assignment: organization-defined personnel or roles] to failed security and privacy verification tests.</li>
				<li>[Selection (one or more): Shut the system down; Restart the system; [Assignment: organization-defined alternative action(s)]] when anomalies are discovered.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>06(01)</td>
			<td>Security and privacy function verification</td>
			<td>Security and privacy function verification: Notification of failed security tests<br />
			Withdrawn: Incorporated into SI-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>06(02)</td>
			<td>Security and privacy function verification</td>
			<td>Security and privacy function verification: Automation support for distributed testing<br />
			Implement automated mechanisms to support the management of distributed security and privacy function testing.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>06(03)</td>
			<td>Security and privacy function verification</td>
			<td>Security and privacy function verification: Report verification results<br />
			Report the results of security and privacy function verification to [Assignment: organization-defined personnel or roles].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07</td>
			<td>Software, firmware, and information integrity</td>
			<td>
			<ol class="lst-upr-alph"><li>Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [Assignment: organization-defined software, firmware, and information].</li>
				<li>Take the following actions when unauthorized changes to the software, firmware, and information are detected: [Assignment: organization-defined actions].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(01)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Integrity checks<br />
			Perform an integrity check of [Assignment: organization-defined software, firmware, and information] [Selection (one or more): at startup; at [Assignment: organization-defined transitional states or security-relevant events]; [Assignment: organization-defined frequency]].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>[4] [frequency at no longer than 30 days]</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(02)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Automated notifications of integrity violations<br />
			Employ automated tools that provide notification to [Assignment: organization-defined personnel or roles] upon discovering discrepancies during integrity verification.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(03)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Centrally managed integrity tools<br />
			Employ centrally managed integrity verification tools.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(04)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Tamper-evident packaging<br />
			Withdrawn: Incorporated into SA-12.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(05)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Automated response to integrity violations<br />
			Automatically [Selection (one or more): shut the system down; restart the system; implement [Assignment: organization-defined controls]] when integrity violations are discovered.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(06)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Cryptographic protection<br />
			Implement cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(07)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Integration of detection and response<br />
			Incorporate the detection of the following unauthorized changes into the organizational incident response capability: [Assignment: organization-defined security-relevant changes to the system].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(08)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Auditing capability for significant events<br />
			Upon detection of a potential integrity violation, provide the capability to audit the event and initiate the following actions: [Selection (one or more): generate an audit record; alert current user; alert [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined other actions]].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(09)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Verify boot process<br />
			Verify the integrity of the boot process of the following system components: [Assignment: organization-defined system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(10)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Protection of boot firmware<br />
			Implement the following mechanisms to protect the integrity of boot firmware in [Assignment: organization-defined system components]: [Assignment: organization-defined mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(11)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Confined environments with limited privileges<br />
			Withdrawn: Moved to CM-07(06).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(12)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Integrity verification<br />
			Require that the integrity of the following software be verified prior to execution: [Assignment: organization-defined software].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(13)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Code execution in protected environments<br />
			Withdrawn: Moved to CM-07(07).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(14)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Binary or machine executable code<br />
			Withdrawn: Moved to CM-07(08).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(15)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Code authentication<br />
			Implement cryptographic mechanisms to authenticate the following software or firmware components prior to installation: [Assignment: organization-defined software or firmware components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(16)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Time limit on process execution without supervision<br />
			Prohibit processes from executing without supervision for more than [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>07(17)</td>
			<td>Software, firmware, and information integrity</td>
			<td>Software, firmware, and information integrity: Run-time application self-protection<br />
			Implement [Assignment: organization-defined controls] for application self-protection at runtime.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>08</td>
			<td>Spam protection</td>
			<td>
			<ol class="lst-upr-alph"><li>Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages.</li>
				<li>Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>08(01)</td>
			<td>Spam protection</td>
			<td>Spam protection: Central management<br />
			Withdrawn: Incorporated into PL-09.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>08(02)</td>
			<td>Spam protection</td>
			<td>Spam protection: Automatic updates<br />
			Automatically update spam protection mechanisms [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>08(03)</td>
			<td>Spam protection</td>
			<td>Spam protection: Continuous learning capability<br />
			Implement spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>09</td>
			<td>Information input restrictions</td>
			<td>Withdrawn: Incorporated into AC-02, AC-03, AC-05, and AC-06.</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>10</td>
			<td>Information input validation</td>
			<td>Check the validity of the following information inputs: [Assignment: organization-defined information inputs to the system].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>10(01)</td>
			<td>Information input validation</td>
			<td>Information input validation: Manual override capability
			<ol class="lst-lwr-alph"><li>Provide a manual override capability for input validation of the following information inputs: [Assignment: organization-defined inputs defined in the base control (SI-10)].</li>
				<li>Restrict the use of the manual override capability to only [Assignment: organization-defined authorized individuals].</li>
				<li>Audit the use of the manual override capability.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>10(02)</td>
			<td>Information input validation</td>
			<td>Information input validation: Review and resolve of errors<br />
			Review and resolve input validation errors within [Assignment: organization-defined time period].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>10(03)</td>
			<td>Information input validation</td>
			<td>Information input validation: Predictable behaviour<br />
			Verify that the system behaves in a predictable and documented manner when invalid inputs are received.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>10(04)</td>
			<td>Information input validation</td>
			<td>Information input validation: Timing interactions<br />
			Account for timing interactions among system components in determining appropriate responses for invalid inputs.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>10(05)</td>
			<td>Information input validation</td>
			<td>Information input validation: Restrict inputs to trusted sources and approved formats<br />
			Restrict the use of information inputs to [Assignment: organization-defined trusted sources] and/or [Assignment: organization-defined formats].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>10(06)</td>
			<td>Information input validation</td>
			<td>Information input validation: Injection prevention<br />
			Prevent untrusted data injections.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>11</td>
			<td>Error handling</td>
			<td>
			<ol class="lst-upr-alph"><li>Generate error messages that provide information necessary for corrective actions without revealing information that could be exploited.</li>
				<li>Reveal error messages only to [Assignment: organization-defined personnel or roles].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>12</td>
			<td>Information management and retention</td>
			<td>Manage and retain information within the system and information output from the system in accordance with applicable laws, Orders in Council, directives, regulations, policies, standards, guidelines and operational requirements.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>12(01)</td>
			<td>Information management and retention</td>
			<td>Information management and retention: Limit personal information elements<br />
			Limit personal information being processed in the information lifecycle to the following elements of personal information: [Assignment: organization-defined elements of personal information].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>12(02)</td>
			<td>Information management and retention</td>
			<td>Information management and retention: Minimize personal information in testing, training, and research<br />
			Use the following techniques to minimize the use of personal information for research, testing, or training: [Assignment: organization-defined techniques].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>12(03)</td>
			<td>Information management and retention</td>
			<td>Information management and retention: Information disposal<br />
			Use the following techniques to dispose of, destroy, or erase information following the retention period: [Assignment: organization-defined techniques].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>13</td>
			<td>Predictable failure prevention</td>
			<td>
			<ol class="lst-upr-alph"><li>Determine mean time to failure (MTTF) for the following system components in specific environments of operation: [Assignment: organization-defined system components].</li>
				<li>Provide substitute system components and a means to exchange active and standby components in accordance with the following criteria: [Assignment: organization-defined <abbr title="mean time to failure">MTTF</abbr> substitution criteria].</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>13(01)</td>
			<td>Predictable failure prevention</td>
			<td>Predictable failure prevention: Transferring component responsibilities<br />
			Take system components out of service by transferring component responsibilities to substitute components no later than [Assignment: organization-defined fraction or percentage] of mean time to failure.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>13(02)</td>
			<td>Predictable failure prevention</td>
			<td>Predictable failure prevention: Time limit on process execution without supervision<br />
			Withdrawn: Incorporated into SI-07(16).</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>13(03)</td>
			<td>Predictable failure prevention</td>
			<td>Predictable failure prevention: Manual transfer between components<br />
			Manually initiate transfers between active and standby system components when the use of the active component reaches [Assignment: organization-defined percentage] of the mean time to failure.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>13(04)</td>
			<td>Predictable failure prevention</td>
			<td>Predictable failure prevention: Standby component installation and notification<br />
			If system component failures are detected:
			<ol class="lst-lwr-alph"><li>ensure that the standby components are successfully and transparently installed within [Assignment: organization-defined time period]</li>
				<li>[Selection (one or more): Activate [Assignment: organization-defined alarm]; Automatically shut down the system; [Assignment: organization-defined action]]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>13(05)</td>
			<td>Predictable failure prevention</td>
			<td>Predictable failure prevention: Failover capability<br />
			Provide [Selection (one): real-time; near real-time] [Assignment: organization-defined failover capability] for the system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>14</td>
			<td>Non-persistence</td>
			<td>Implement non-persistent [Assignment: organization-defined system components and services] that are initiated in a known state and terminated [Selection (one or more): upon end of session of use; periodically at [Assignment: organization-defined frequency]].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>14(01)</td>
			<td>Non-persistence</td>
			<td>Non-persistence: Refresh from trusted sources<br />
			Obtain software and data employed during system component and service refreshes from the following trusted sources: [Assignment: organization-defined trusted sources].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>14(02)</td>
			<td>Non-persistence</td>
			<td>Non-persistence: Non-persistent information
			<ol class="lst-lwr-alph"><li>[Selection (one): Refresh [Assignment: organization-defined information] [Assignment: organization-defined frequency]; Generate [Assignment: organization-defined information] on demand].</li>
				<li>Delete information when no longer needed.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>14(03)</td>
			<td>Non-persistence</td>
			<td>Non-persistence: Non-persistent connectivity<br />
			Establish connections to the system on demand and terminate connections after [Selection (one): completion of a request; a period of non-use].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>15</td>
			<td>Information output filtering</td>
			<td>Validate information output from the following software programs and/or applications to ensure that the information is consistent with the expected content: [Assignment: organization-defined software programs and/or applications].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>16</td>
			<td>Memory protection</td>
			<td>Implement the following controls to protect the system memory from unauthorized code execution: [Assignment: organization-defined controls].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>17</td>
			<td>Fail-safe procedures</td>
			<td>Implement the indicated fail-safe procedures when the indicated failures occur: [Assignment: organization-defined list of failure conditions and associated fail-safe procedures].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>18</td>
			<td>Personal information quality operations</td>
			<td>
			<ol class="lst-upr-alph"><li>Ensure the accuracy, relevance, timeliness, and completeness of personal information used for an administrative purpose by the organization across the information lifecycle [Assignment: organization-defined frequency].</li>
				<li>Correct or delete inaccurate or outdated personal information.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>18(01)</td>
			<td>Personal information quality operations</td>
			<td>Personal information quality operations: Automation support<br />
			Correct or delete personal information that is inaccurate or outdated, incorrectly determined regarding impact, or incorrectly de-identified using [Assignment: organization-defined automated mechanisms].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>18(02)</td>
			<td>Personal information quality operations</td>
			<td>Personal information quality operations: Data tags<br />
			Employ data tags to automate the correction or deletion of personal information across the information lifecycle within organizational systems.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>18(03)</td>
			<td>Personal information quality operations</td>
			<td>Personal information quality operations: Collection<br />
			Collect personal information directly from the individual.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>18(04)</td>
			<td>Personal information quality operations</td>
			<td>Personal information quality operations: Individual requests<br />
			Correct or delete personal information upon request by individuals or their designated representatives.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>18(05)</td>
			<td>Personal information quality operations</td>
			<td>Personal information quality operations: Notice of correction or deletion<br />
			Notify [Assignment: organization-defined recipients of personal information] and individuals that the personal information has been corrected or deleted.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19</td>
			<td>De-identification</td>
			<td>
			<ol class="lst-upr-alph"><li>Remove the following elements of personal information from datasets: [Assignment: organization-defined elements of personal information].</li>
				<li>Evaluate [Assignment: organization-defined frequency] for effectiveness of de-identification.</li>
			</ol><ol class="lst-upr-alph" start="27"><li>Consider the privacy injury if information that may be available in the public enables re-identification of individuals.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(01)</td>
			<td>De-identification</td>
			<td>De-identification: Collection<br />
			De-identify the dataset upon collection by not collecting personal information.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(02)</td>
			<td>De-identification</td>
			<td>De-identification: Archiving<br />
			Prohibit archiving of personal information elements if those elements in a dataset will not be needed after the dataset is archived.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(03)</td>
			<td>De-identification</td>
			<td>De-identification: Release<br />
			Remove personal information elements from a dataset prior to its release if those elements in the dataset do not need to be part of the data release.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(04)</td>
			<td>De-identification</td>
			<td>De-identification: Removal, masking, encryption, hashing, or replacement of direct identifiers<br />
			Remove, mask, encrypt, hash, or replace direct identifiers in a dataset.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(05)</td>
			<td>De-identification</td>
			<td>De-identification: Statistical disclosure control<br />
			Manipulate numerical data, contingency tables, and statistical findings so that no individual or organization is identifiable in the results of the analysis.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(06)</td>
			<td>De-identification</td>
			<td>De-identification: Differential privacy<br />
			Prevent disclosure of personal information by adding non-deterministic noise to the results of mathematical operations before the results are reported.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(07)</td>
			<td>De-identification</td>
			<td>De-identification: Validated algorithms and software<br />
			Perform de-identification using validated algorithms and software that is validated to implement the algorithms.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>19(08)</td>
			<td>De-identification</td>
			<td>De-identification: Motivated intruder<br />
			Perform a motivated intruder test on the de-identified dataset to determine if the identified data remains or if the de-identified data can be re-identified.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>20</td>
			<td>Tainting</td>
			<td>Embed data or capabilities in the following systems or system components to determine if organizational data has been exfiltrated or improperly removed from the organization: [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>21</td>
			<td>Information refresh</td>
			<td>Refresh [Assignment: organization-defined information] at [Assignment: organization-defined frequencies] or generate the information on demand and delete the information when no longer needed.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>22</td>
			<td>Information diversity</td>
			<td>
			<ol class="lst-upr-alph"><li>Identify the following alternative sources of information for [Assignment: organization-defined essential functions and services]: [Assignment: organization-defined alternative information sources].</li>
				<li>Use an alternative information source for the execution of essential functions or services on [Assignment: organization-defined systems or system components] when the primary source of information is corrupted or unavailable.</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>23</td>
			<td>Information fragmentation</td>
			<td>Based on [Assignment: organization-defined circumstances]:
			<ol class="lst-upr-alph"><li>fragment the following information: [Assignment: organization-defined information]</li>
				<li>distribute the fragmented information across the following systems or system components: [Assignment: organization-defined systems or system components]</li>
			</ol></td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>400</td>
			<td>Dedicated administration workstation</td>
			<td>Require any administrative or superuser actions to be performed from a physical workstation which is dedicated to those specific tasks and isolated from all other functions and networks, and especially from any form of internet access.</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>400(01)</td>
			<td>Dedicated administration workstation</td>
			<td>Dedicated administration workstation: Thin client dedicated administration workstation<br />
			Implement virtualized <abbr title="dedicated administration workstation">DAW</abbr> inside network-isolated physical thin client DAW.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>400(02)</td>
			<td>Dedicated administration workstation</td>
			<td>Dedicated administration workstation: <abbr title="virtual private network">VPN</abbr> on carrier private network<br />
			Connect a <abbr title="dedicated administration workstation">DAW</abbr> to a target network using carrier private networks (for example, virtual private <abbr title="local area network">LAN</abbr> service (VPLS) or multiprotocol label switching (MPLS)) with <abbr title="virtual private network">VPN</abbr> encryption.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>400(03)</td>
			<td>Dedicated administration workstation</td>
			<td>Dedicated administration workstation: Local area network<br />
			Connect a <abbr title="dedicated administration workstation">DAW</abbr> to a target network using only <abbr title="local area network">LAN</abbr>.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>400(04)</td>
			<td>Dedicated administration workstation</td>
			<td>Dedicated administration workstation: Console access only<br />
			Connect a <abbr title="dedicated administration workstation">DAW</abbr> to the target system using only direct console ports.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>400(05)</td>
			<td>Dedicated administration workstation</td>
			<td>Dedicated administration workstation: Dedicated physical workstation<br />
			Use a single-purpose physical workstation as the <abbr title="dedicated administration workstation">DAW</abbr>.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SI</td>
			<td>400(06)</td>
			<td>Dedicated administration workstation</td>
			<td>Dedicated administration workstation: Heterogeneous administrative access<br />
			Use a different operating system for the <abbr title="dedicated administration workstation">DAW</abbr> relative to the target system.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered"><caption class="center-text" id="tab4.20">Table 4.20: Supply chain risk management</caption>
	<thead><tr class="active"><th scope="col">Family</th>
			<th scope="col">ID</th>
			<th scope="col">Name</th>
			<th scope="col">Description</th>
			<th scope="col">Control/<br />
			Activity</th>
			<th scope="col">Suggested for this profile</th>
			<th scope="col">Suggested placeholder values</th>
			<th scope="col">Profile-specific notes</th>
		</tr></thead><tbody><tr><td>SR</td>
			<td>01</td>
			<td>Supply chain risk management policy and procedures</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
				<ol><li>[Selection (one or more): Organization-level; Mission/business process-level; System-level] supply chain risk management (SCRM) policy that:
					<ol class="lst-lwr-alph"><li>addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance</li>
						<li>is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines</li>
					</ol></li>
					<li>procedures to facilitate the implementation of the <abbr title="supply chain risk management">SCRM</abbr> policy and the associated <abbr title="supply chain risk management">SCRM</abbr> controls</li>
				</ol></li>
				<li>Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the <abbr title="supply chain risk management">SCRM</abbr> policy and procedures.</li>
				<li>Review and update the current <abbr title="supply chain risk management">SCRM</abbr>:
				<ol><li>policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
					<li>procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
				</ol></li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>02</td>
			<td>Supply chain risk management plan</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop a plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal of the following systems, system components or system services: [Assignment: organization-defined systems, system components, or system services].</li>
				<li>Review and update the <abbr title="supply chain risk management">SCRM</abbr> plan [Assignment: organization-defined frequency] or as required, to address threat, organizational or environmental changes.</li>
				<li>Protect the <abbr title="supply chain risk management">SCRM</abbr> plan from unauthorized disclosure and modification.</li>
			</ol></td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>02(01)</td>
			<td>Supply chain risk management plan</td>
			<td>Supply chain risk management plan: Establish a <abbr title="supply chain risk management">SCRM</abbr> team<br />
			Establish a <abbr title="supply chain risk management">SCRM</abbr> team consisting of [Assignment: organization-defined personnel, roles, and responsibilities] to lead and support the following <abbr title="supply chain risk management">SCRM</abbr> activities: [Assignment: organization-defined supply chain risk management activities].</td>
			<td>Activity</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>03</td>
			<td>Supply chain controls and processes</td>
			<td>
			<ol class="lst-upr-alph"><li>Establish a process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of [Assignment: organization-defined system or system component] in coordination with [Assignment: organization-defined supply chain personnel].</li>
				<li>Employ the following controls to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events: [Assignment: organization-defined supply chain controls].</li>
				<li>Document the selected and implemented supply chain processes and controls in [Selection (one): security and privacy plans; <abbr title="supply chain risk management">SCRM</abbr> plan; [Assignment: organization-defined document]].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>03(01)</td>
			<td>Supply chain controls and processes</td>
			<td>Supply chain controls and processes: Diverse supply base<br />
			Employ a diverse set of sources for the following system components and services: [Assignment: organization-defined system components and services].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>03(02)</td>
			<td>Supply chain controls and processes</td>
			<td>Supply chain controls and processes: Limitation of harm<br />
			Employ the following controls to limit harm from potential adversaries identifying and targeting the organizational supply chain: [Assignment: organization-defined controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>03(03)</td>
			<td>Supply chain controls and processes</td>
			<td>Supply chain controls and processes: Sub-tier flow down<br />
			Ensure that the controls included in the contracts of prime contractors are also included in the contracts of subcontractors.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>04</td>
			<td>Provenance</td>
			<td>Document, monitor, and maintain valid provenance of the following systems, system components, and associated data: [Assignment: organization-defined systems, system components, and associated data].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>04(01)</td>
			<td>Provenance</td>
			<td>Provenance: Identity<br />
			Establish and maintain unique identification of the following supply chain elements, processes, and personnel associated with the identified system and critical system components: [Assignment: organization-defined supply chain elements, processes, and personnel associated with organization-defined systems and critical system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>04(02)</td>
			<td>Provenance</td>
			<td>Provenance: Track and trace<br />
			Establish and maintain unique identification of the following systems and critical system components for tracking through the supply chain: [Assignment: organization-defined systems and critical system components].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>04(03)</td>
			<td>Provenance</td>
			<td>Provenance: Validate as genuine and not altered<br />
			Employ the following controls to validate that the system or system component received is genuine and has not been altered: [Assignment: organization-defined controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>04(04)</td>
			<td>Provenance</td>
			<td>Provenance: Supply chain integrity - pedigree<br />
			Employ [Assignment: organization-defined controls] and conduct [Assignment: organization-defined analysis] to ensure the integrity of the system and system components by validating the internal composition and provenance of critical or mission-essential technologies, products, and services.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>05</td>
			<td>Acquisition strategies, tools and methods</td>
			<td>Employ the following acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks: [Assignment: organization-defined acquisition strategies, contract tools, and procurement methods].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>05(01)</td>
			<td>Acquisition strategies, tools and methods</td>
			<td>Acquisition strategies, tools and methods: Adequate supply<br />
			Employ the following controls to ensure an adequate supply of [Assignment: organization-defined critical system components]: [Assignment: organization-defined controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>05(02)</td>
			<td>Acquisition strategies, tools and methods</td>
			<td>Acquisition strategies, tools and methods: Assessments prior to selection, acceptance, modification, or update<br />
			Assess the system, system component, or system service prior to selection, acceptance, modification, or update.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>06</td>
			<td>Supplier assessments and reviews</td>
			<td>Assess and review the supply chain-related risks associated with suppliers or contractors and the system, system component, or system service they provide [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>06(01)</td>
			<td>Supplier assessments and reviews</td>
			<td>Supplier assessments and reviews: Testing and analysis<br />
			Employ [Selection (one or more): organizational analysis; independent third-party analysis; organizational testing; independent third-party testing] of the following supply chain elements, processes, and actors associated with the system, system component, or system service: [Assignment: organization-defined supply chain elements, processes, and actors].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>07</td>
			<td>Supply chain operations security</td>
			<td>Employ the following operations security (OPSEC) controls to protect supply chain-related information for the system, system component, or system service: [Assignment: organization-defined <abbr title="operations security">OPSEC</abbr> controls].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>08</td>
			<td>Notification agreements</td>
			<td>Establish agreements and procedures with entities involved in the supply chain for the system, system component, or system service for the [Selection (one or more): notification of supply chain compromises; results of assessments or audits; [Assignment: organization-defined information]].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>09</td>
			<td>Tamper resistance and detection</td>
			<td>Implement a tamper protection program for the system, system component, or system service</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>09(01)</td>
			<td>Tamper resistance and detection</td>
			<td>Tamper resistance and detection: Multiple stages of system development lifecycle<br />
			Employ anti-tamper technologies, tools, and techniques throughout the system development lifecycle.</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>10</td>
			<td>Inspection of systems or components</td>
			<td>Inspect the following systems or system components [Selection (one or more): at random; at [Assignment: organization-defined frequency], upon [Assignment: organization-defined indications of need for inspection]] to detect tampering: [Assignment: organization-defined systems or system components].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>11</td>
			<td>Component authenticity</td>
			<td>
			<ol class="lst-upr-alph"><li>Develop and implement anti-counterfeiting policy and procedures that include the means to detect and prevent counterfeit components from entering the system.</li>
				<li>Report counterfeit system components to [Selection (one or more): source of counterfeit component; [Assignment: organization-defined external reporting organizations]; [Assignment: organization-defined personnel or roles]].</li>
			</ol></td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>11(01)</td>
			<td>Component authenticity</td>
			<td>Component authenticity: Anti-counterfeit training<br />
			Train [Assignment: organization-defined personnel or roles] to detect counterfeit system components (including hardware, software, and firmware).</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>11(02)</td>
			<td>Component authenticity</td>
			<td>Component authenticity: Configuration control for component service and repair<br />
			Maintain configuration control over the following system components awaiting service or repair and serviced or repaired components awaiting return to service: [Assignment: organization-defined system components].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>11(03)</td>
			<td>Component authenticity</td>
			<td>Component authenticity: Anti-counterfeit scanning<br />
			Scan for counterfeit system components [Assignment: organization-defined frequency].</td>
			<td>Control</td>
			<td>Not selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr><tr><td>SR</td>
			<td>12</td>
			<td>Component disposal</td>
			<td>Dispose of [Assignment: organization-defined data, documentation, tools, or system components] using the following techniques and methods: [Assignment: organization-defined techniques and methods].</td>
			<td>Control</td>
			<td>Selected</td>
			<td>NA</td>
			<td>NA</td>
		</tr></tbody></table></div>
</section><!--FOOTNOTE SECTION EN--><aside class="wb-fnote" role="note"><h2 id="5">Footnotes</h2>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p>In this publication, activity is meant as assurance activity.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>In this publication, the term “department” refers to <abbr title="Government of Canada">GC</abbr> departments, agencies and other organizations subject to the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security</a>.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p>An “asset” is a generic term used to represent business applications, electronic representations of information (data), and the hardware, software and system data of which information systems are composed.</p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p>For more information on the list of assured products, refer to the <a href="https://www.cyber.gc.ca/en/tools-services/common-criteria/certified-products">Cyber Centre’s Certified Products</a>.</p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p>For more information on <abbr title="Common Criteria">CC</abbr>-protected profiles, refer to the <a href="https://www.commoncriteriaportal.org/pps/index.cfm">Common Criteria Portal</a>.</p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p>For more information on cryptographic modules, refer to <a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program"><abbr title="Cryptographic Module Validation Program">CMVP</abbr> website</a>.</p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
</div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-security-privacy-risk-management/itsp10033</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-security-privacy-risk-management/itsp10033"/><title><![CDATA[Security and privacy controls and assurance activities catalogue (ITSP.10.033)]]></title><updated>2026-03-31T18:28:12Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7473" about="/en/guidance/cyber-security-privacy-risk-management/itsp10033" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>March 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Practitioner series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSP.10.033</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>March 2026 | Practitioner series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg"><div class="mrgn-bttm-md well well-sm">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsp.10.033-e.pdf">Security and privacy controls and assurance activities catalogue - ITSP.10.033 (PDF, 4.5 MB)</a></p>
</div>

<div class="clearfix"> </div>
<div class="mrgn-tp-md row">
<div class="col-xs-6 col-sm-4 col-md-3 col-md-offset-1"><!--LINK TO NEXT FILE--><a class="btn btn-default btn-block" href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction" rel="next" role="button">Next <span aria-hidden="true" class="glyphicon glyphicon-arrow-right"></span></a></div>
</div>

<section><h2 class="text-info">Table of contents</h2>

<ul class="list-unstyled"><li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#0">Foreword</a></li>
	<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#0.1">Overview</a></li>
	<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#1">1. Introduction</a>
	<ul class="lst-none"><li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#1.1">Purpose</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#1.2">Scope and applicability</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#1.3">Audience</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#1.4">Publication taxonomy</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/foreword-overview-introduction#1.5">Publication organization</a></li>
	</ul></li>
	<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/concepts-structure">2. Concepts and structure</a>
	<ul class="lst-none"><li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/concepts-structure#2.1">Requirements, controls, and activities</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/concepts-structure#2.2">Controls and assurance activities, structure, and organization</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/concepts-structure#2.3">Implementation approaches</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/concepts-structure#2.4">Security and privacy controls and assurance activities</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/concepts-structure#2.5">Robustness</a></li>
	</ul></li>
	<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/controls-assurance-activities-families">3. The controls and assurance activities families</a>
	<ul class="lst-none"><li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/access-control">Access control</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/awareness-training">Awareness and training</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/audit-accountability">Audit and accountability</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/assessment-authorization-monitoring">Assessment, authorization, and monitoring</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/configuration-management">Configuration management</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/contingency-planning">Contingency planning</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/identification-authentication">Identification and authentication</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/incident-response">Incident response</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/maintenance">Maintenance</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/media-protection">Media protection</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/physical-environmental-protection">Physical and environmental protection</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/planning">Planning</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/program-management">Program management</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/personnel-security">Personnel security</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/personal-information-handling-transparency">Personal information handling and transparency</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/risk-assessment">Risk assessment</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/system-services-acquisition">System and services acquisition</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/system-communications-protection">System and communications protection</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/system-information-integrity">System and information integrity</a></li>
		<li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/supply-chain-risk-management">Supply chain risk management</a></li>
	</ul></li>
	<li><a href="#cited">Works cited</a></li>
</ul><h2 class="text-info">List of figures</h2>

<ul class="list-unstyled"><li><a href="/en/guidance/cyber-security-privacy-risk-management/itsp10033/concepts-structure#fig1">Figure 1: Control or activity structure</a></li>
</ul></section></div>
</div>
<!--FOOTNOTE SECTION EN-->

<aside class="wb-fnote" role="note"><h2 class="text-info" id="cited">Works cited</h2>

<dl><dt>Footnote 12</dt>
	<dd id="fn12">
	<p>Lampson, B. W. (1973, October). A note on the confinement problem. Communications of the ACM, 16(10), 613-615.<br />
	doi:10.1145/362375.362389</p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>Popek, G. J. (1974). The Principle of Kernel Design. Proceedings of the May 6-10, 1974, National Computer Conference and Exposition (pp. 977-978). Chicago: Association for Computing Machinery.<br />
	doi:<a href="https://doi.org/10.1145/1500175.1500361">https://doi.org/10.1145/1500175.1500361</a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p>Saltzer, J., and Schroeder, M. (1975). The protection of information in computer systems. Proceedings of the <abbr title="Institute of Electrical and Electronics Engineers">IEEE</abbr>, 63(9), 1278-1308.<br />
	doi:10.1109/PROC.1975.9939</p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-security-privacy-risk-management</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-security-privacy-risk-management"/><title><![CDATA[Cyber security and privacy risk management: A lifecycle approach]]></title><updated>2026-03-31T18:16:57Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7472" about="/en/guidance/cyber-security-privacy-risk-management" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>This publication is part of a series of guidelines published by the Cyber Centre, under “Cyber security and privacy risk management: A lifecycle approach.” It contains definitions of assurance activities and controls for systems and organizations that practitioners can use as a foundation for selecting, tailoring and allocating controls and assurance activities to manage cyber security and privacy risks. Implementing a comprehensive set of security and privacy controls and assurance activities can help organizations achieve their business activities.</p>

<div class="row mrgn-tp-lg ">
<div class="col-sm-6">
<div><a class="btn btn-primary btn-block btn-lg mrgn-bttm-md" href="/en/guidance/cyber-security-privacy-risk-management/itsp10033"><span>Security and privacy controls and assurance activities catalogue (ITSP.10.033)</span> </a></div>
</div>

<div class="col-sm-6">
<div><a class="btn btn-primary btn-block btn-lg mrgn-bttm-md" href="/en/guidance/cyber-security-privacy-risk-management/suggested-organizational-security-privacy-control-activity-profile-medium-impact-itsp10033-01"><span>Suggested organizational security and privacy control and activity profile — Medium impact (ITSP.10.033-1)</span></a></div>
</div>
</div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/etherhiding-trojan-your-toolchain</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/etherhiding-trojan-your-toolchain"/><title><![CDATA[ EtherHiding: The trojan in your toolchain]]></title><updated>2026-03-31T14:00:15Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7390" about="/en/news-events/etherhiding-trojan-your-toolchain" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-12">
<p>The Canadian Centre for Cyber Security (Cyber Centre) is actively tracking a campaign exploiting blockchain technology to covertly host and distribute malware. This campaign leverages a technique known as <strong>EtherHiding</strong>.</p>

<p>The Cyber Centre has compiled a detailed analysis derived from a recent investigation to help defenders combat attacks leveraging this technique. This analysis examines the <strong>evolution and use of the EtherHiding technique</strong> and provides an <strong>in-depth characterization of the threat actor’s techniques</strong>, along with critical mitigation and detection guidance.</p>
</div>
</div>

<section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#summary">Executive summary</a></li>
	<li><a href="#overview">An incident overview</a></li>
	<li><a href="#analysis">Analysis of the incident</a></li>
	<li><a href="#indicators">Indicators of compromise and recommendations</a></li>
	<li><a href="#tools-services">Cyber Centre tools and services</a></li>
	<li><a href="#acknowledgements">Acknowledgements</a></li>
	<li><a href="#references">References</a></li>
</ul></details></section><section><h2 class="text-info" id="summary">Executive summary</h2>

<p>This technical article aims to raise awareness and describe some of the tactics, techniques, and procedures (TTPs) associated with EtherHiding. The Cyber Centre’s preliminary findings highlight that, in the analyzed incident, the threat actor inserted a malicious one-liner JavaScript downloader inside a configuration file for the Tailwind CSS framework (tailwind.config.js).</p>

<p>The downloaded JavaScript payload is a highly advanced backdoor designed for a covert operation, as it operates within the Node.js runtime environment that is embedded in Visual Studio Code (VS Code) or Cursor AI (a modified version of VS Code). It is designed to infect developer machines, perform file or directory theft, and execute command from a command-and-control server (C2). The subsequent analysis of this backdoor module provided valuable insights into the extent of the compromise as well as the threat actor’s intentions and activities.</p>
</section><section><h2 class="text-info" id="overview">An incident overview</h2>

<div class="alert alert-info">
<p><strong>Disclaimer:</strong> Although it is unknown how the threat actor was able to push the file, this technical analysis focuses on how the threat actor was able to achieve remote code execution, maintain persistence, leverage C2 techniques and exfiltrate data.</p>
</div>

<p>While working on an artificial intelligence (AI) source project that used the Node.js Tailwind CSS framework, a developer observed an unknown commit made to their private internal GitHub repository. That commit modified their tailwind.config.js file in plain sight. Padded with over a thousand whitespace characters, the file blended seamlessly into the developer’s workspace – making it especially difficult to spot during routine code reviews. Technical support was sought from the Cyber Centre to assist with threat analysis and identification.</p>

<p>The malicious code is designed to take advantage of the Node.js ecosystem, which is commonly used by developers to build and test applications. When a developer interacts with the repository, the hidden payload is triggered within the environment without their knowledge.</p>
<!-- Figure 1 -->

<section class="panel panel-default col-md-12"><div class="panel-body">
<h3 class="text-center h5" id="fig1"><strong>Figure 1: Attack path depicting how the threat actor gained access and moved through the environment</strong></h3>

<figure><img alt="Figure 1 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/etherhiding-trojan-toolchain-fig1-e-800x641.png" /></figure><details><summary>Long description - Attack path depicting how the threat actor gained access and moved through the environment</summary><p>The figure depicts a multi-stage cyber attack flowchart. It starts with the execution of a malicious JavaScript file that retrieves transaction hashes from cryptocurrency platforms. This triggers a chain of events involving multiple downloaders and a JavaScript backdoor (InvisibleFerret) to execute malicious payloads and enable unauthorized access.</p>
</details></div>
</section><span class="clearfix"></span></section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<p><span class="clearfix"></span></p>

<section><h2 class="text-info" id="analysis">Analysis of the incident</h2>

<div class="alert alert-info">
<p><strong>Disclaimer:</strong> To enhance source code readability, content may be updated by adding comments or renaming functions and variables.</p>
</div>

<h3><span class="text-uppercase">mitre att</span>&amp;CK techniques observed during analysis</h3>

<p>The information below is based on the attack path outlined in figure 1.</p>

<h3 class="text-info">Observation 1</h3>

<ul><li>Main technique: <a href="https://attack.mitre.org/techniques/T1059/007/">Command and scripting interpreter: JavaScript (T1059.007)</a></li>
	<li>Additional techniques: <a href="https://attack.mitre.org/techniques/T1036/">Masquerading (T1036)</a></li>
	<li>Stage capabilities: <a href="https://attack.mitre.org/techniques/T1608/001/">Upload malware (T1608.001)</a></li>
</ul><h3 class="text-info">Observation 2</h3>

<ul><li>Main technique: <a href="https://attack.mitre.org/techniques/T1546/015/">Event triggered execution: Component object model hijacking (T1546.015)</a></li>
</ul><h3 class="text-info">Observation 3</h3>

<ul><li>Main technique: <a href="https://attack.mitre.org/techniques/T1071/001/">Application layer protocol: Web protocols (T1071.001)</a></li>
	<li>Additional techniques: <a href="https://attack.mitre.org/techniques/T1071/004/">Application layer protocol: DNS (T1071.004)</a> and <a href="https://attack.mitre.org/techniques/T1614/">System location discovery (T1614)</a></li>
</ul><h3 class="text-info">Observation 4</h3>

<ul><li>Main technique: <a href="https://attack.mitre.org/techniques/T1041/">Exfiltration over C2 channel (T1041)</a></li>
	<!-- subsection -->
</ul><div class="panel panel-default">
<div class="panel-body">
<h3>Observation 1</h3>

<p><strong>Observed tactics:</strong> <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0002/">Execution (TA0002)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0005/">Defense evasion (TA0005)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0042/">Resource development (TA0042)</a></span></p>

<p><strong>Observed techniques:</strong> <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1059/007/">Command and scripting interpreter: JavaScript (T1059.007)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1036/">Masquerading (T1036)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1608/001/">Stage capabilities: Upload malware (T1608.001)</a></span></p>

<p>Once triggered, the malware runs custom JavaScript routines that decrypt and launch additional payloads. The attack is multi-staged and dynamic.</p>
<!-- subsection lvl 2 -->

<div>
<h4>Stage 1</h4>

<p>The tailwind.config.js file loads a <span class="text-uppercase">jadesnow</span> downloader that requests a transaction hash from hardcoded wallet addresses on the <span class="text-uppercase">tron</span> or Aptos blockchains.<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup></p>
<!-- footnote to add --><!-- Figure 2 -->

<h3 class="text-center h5" id="fig2"><strong>Figure 2: Flow diagram illustrating how the script requests a transaction hash</strong></h3>

<figure><img alt="Figure 2 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/etherhiding-trojan-toolchain-fig2-e-1000x167.png" /></figure><details><summary>Long description - Flow diagram illustrating how the script requests a transaction hash</summary><p>The figure illustrates the initial stages of a cyber attack, starting with the execution of a malicious JavaScript file (tailwind.config.js) within a Node.js environment. This script triggers the <span class="text-uppercase">jadesnow</span> Downloader1, which retrieves a transaction hash from cryptocurrency platforms.</p>
</details></div>

<div>
<h4>Stage 2</h4>

<p>Using the transaction hash, the <span class="text-uppercase">jadesnow</span> downloader fetches a payload from the Binance Smart Chain (BSC) via a JSON RPC <span class="text-uppercase">post</span> request. The payload is XOR-decrypted using a hardcoded key and executed as JavaScript.</p>
<!-- Figure 3 -->

<h3 class="text-center h5" id="fig3"><strong>Figure 3: Flow diagram illustrating how the payload is XOR-decrypted</strong></h3>

<figure><img alt="Figure 3 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/etherhiding-trojan-toolchain-fig3-e-1000x441.png" /></figure><details><summary>Long description - Flow diagram illustrating how the payload is XOR-decrypted</summary><p>The figure depicts a cyber attack segment involving two malicious downloaders. The "<span class="text-uppercase">jadesnow</span> Downloader1" downloads a payload from Binance (step 3) and decrypts the payload using XOR (step 4) to produce a JavaScript file (payload1.js). The decrypted file is then executed (step 5), triggering "<span class="text-uppercase">jadesnow</span> Downloader2" to continue the attack chain.</p>
</details></div>

<div>
<h4>Stage 3</h4>

<p>The decrypted payload is another <span class="text-uppercase">jadesnow</span> downloader, repeating the blockchain fetch-and-decrypt process with new wallet combinations and a hardcoded XOR key. The payload is a loader for the InvisibleFerret.JavaScript backdoor.<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup></p>
<!-- Footnote 2 --><!-- figure 4 -->

<h3 class="text-center h5" id="fig4"><strong>Figure 4: How the decrypted payload repeats the process using new wallet combinations</strong></h3>

<figure><img alt="Figure 4 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/etherhiding-trojan-toolchain-fig4-e-1000x449.png" /></figure><details><summary>Long description - Flow diagram illustrating how the payload is XOR-decrypted</summary><p>The figure depicts how the "<span class="text-uppercase">jadesnow</span> Downloader2" retrieves a transaction hash from the TRON and Aptos cryptocurrency platforms. Using that transaction hash, it downloads a payload from Binance which is decrypted using XOR to produce a JavaScript file (payload2.js). It is then executed to trigger "<span class="text-uppercase">jadesnow</span> Downloader1" and continue the attack sequence.</p>
</details></div>

<div>
<h4>Stage 4</h4>

<p>The last payload is another <span class="text-uppercase">jadesnow</span> downloader that is XOR-decrypted using a static key. This variant of the malware checks for a kill switch (process.env.jsbot) to terminate itself if detected, attempts to deploy Python (python.zip, python.7z, 7zr.exe), and runs scripts (boot, client) for further compromise.</p>

<h3 class="text-center h5" id="fig5"><strong>Figure 5: XOR decryption key</strong></h3>

<figure><img alt="Figure 5 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/etherhiding-trojan-toolchain-fig5-e-1000x449.png" /></figure><details><summary>Long description - Figure 5: XOR decryption key</summary><p>The figure depicts how the "<span class="text-uppercase">jadesnow</span> Downloader1" retrieves a transaction hash from the TRON and APTOS cryptocurrency platforms. Using that transaction hash, it downloads a payload from Binance which is decrypted using XOR to produce a JavaScript file (payload3.js). It is then executed to trigger "<span class="text-uppercase">jadesnow</span> Downloader3" and continue the attack sequence.</p>
</details></div>
</div>
</div>
<span class="clearfix"> </span>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
<span class="clearfix"></span>

<div class="panel panel-default">
<div class="panel-body">
<h3>Observation 2</h3>

<p><strong>Observed tactics:</strong> <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0004/">Privilege escalation (TA0004)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0003/">Persistence (TA0003)</a></span></p>

<p><strong>Observed technique:</strong> <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1546/015/">Event triggered execution: Component object model hijacking (T1546.015)</a></span></p>

<p>InvisibleFerret.JavaScript injects itself into the telemetry files of VS Code and Cursor AI to reconfigure files like index.js in the editor’s internal modules. The injected code includes custom session labelling, such as <code>[5-74-&lt;date&gt;]&lt;hostname&gt;$&lt;username&gt;</code>.</p>

<p>It maintains persistent communication with its operators using both HTTP POST and socket.io connections while it waits for commands and will attempt to reconnect every five seconds if the connection is dropped.</p>

<p>Since this module is responsible for generating unique machine IDs, hijacking it allows the malware to:</p>

<ul><li>track users across sessions and installations</li>
	<li>leak identifying information</li>
	<li>maintain persistent access</li>
</ul><p>Paths for the injected file varies by operating system (OS):</p>

<ul><li>Windows: %localappdata%\Programs\Microsoft VS Code\resources\app\node_modules\@vscode\deviceid\dist\index.js</li>
	<li>MacOS: /Applications/Visual Studio Code.app/Contents/Resources/app/node_modules/@vscode/deviceid/dist/index.js</li>
	<li>Linux: /usr/share/code/resources/app/node_modules/@vscode/deviceid/dist/index.js</li>
</ul></div>
</div>
<span class="clearfix"> </span> <!-- last updated -->

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
<span class="clearfix"></span>

<div class="panel panel-default">
<div class="panel-body">
<h3>Observation 3</h3>

<p><strong>Observed tactics:</strong> <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0011/">Command and control (TA0011)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0007/">Discovery (TA0007)</a></span></p>

<p><strong>Observed techniques:</strong> <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1071/001/">Application layer protocol: Web protocols (T1071.001)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1071/004/">Application layer protocol: DNS (T1071.004)</a></span>; <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1614/">System location discovery (T1614)</a></span></p>

<p>Communication with the attacker’s infrastructure is handled specifically via HTTP POST requests to hardcoded internet protocol (IP) addresses and uniform resource identifiers (URIs). Various C2 servers and endpoints include a numerical value of 5-74 in the uniform resource locator (URL) which corresponds to a malware or campaign version number defined in the JavaScript program.</p>

<p>The malware fetches external internet protocol (IP) information to determine the geographical location of the victim, helping attackers profile the infected environment and tailor their operations. It also supports a wide range of other commands, as outlined below.</p>

<div>
<h4>Supported commands with descriptions and techniques</h4>

<ul><li><strong>cd:</strong> changes the current location to the target directory</li>
	<li><strong>ss_info:</strong> returns information about the running Node.js application: version, session, operating system, and path</li>
	<li><strong>ss_ip:</strong> gets the external IP address information from ip-api[.]com/json</li>
	<li><strong>ss_upf:</strong> uploads a file</li>
	<li><strong>ss_upd:</strong> uploads a directory</li>
	<li><strong>ss_dir:</strong> changes the current location to the module directory</li>
	<li><strong>ss_fcd:</strong> changes the current location to the target directory</li>
	<li><strong>ss_inz:</strong> injects JavaScript code in VSCode</li>
	<li><strong>ss_eval:</strong> executes JavaScript code using eval</li>
</ul><p>The commands above enable a threat actor to conduct data collection activities (<a href="https://attack.mitre.org/tactics/TA0009/">Tactic: Collection (TA0009)</a> – <a href="https://attack.mitre.org/techniques/T1005/">Data from Local System (T1005)</a>) and run arbitrary code on affected systems.</p>
</div>
</div>
</div>
<span class="clearfix"></span>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
<span class="clearfix"></span>

<div class="panel panel-default">
<div class="panel-body">
<h3>Observation 4</h3>

<p><strong>Observed tactic:</strong> <span class="label label-info"><a href="https://attack.mitre.org/tactics/TA0010/">Exfiltration (TA0010)</a></span></p>

<p><strong>Observed technique:</strong> <span class="label label-info"><a href="https://attack.mitre.org/techniques/T1041/">Exfiltration over C2 channel (T1041)</a></span></p>

<p>Robust, recursive routines are used to upload a single file or an entire directory to attacker-controlled servers. The malware then leverages Node.js modules like Axios and form data to craft HTTP POST requests with multipart/form-data, ensuring compatibility with web servers and stealth in transit.</p>

<p>The malware’s recursive upload function (recursiveHttpUpload) walks through directories, collecting file paths and uploading each file individually. Success and failure counts are tracked, and status messages are sent back to the C2 via socket.io events. The exfiltration is not limited to files, as entire directory trees can be sent, enabling attackers to siphon off large volumes of source code, configuration files or sensitive data in one go.</p>
</div>
</div>
</section><section><h2 class="text-info" id="indicators">Indicators of compromise and recommendations</h2>

<p>Indicators of compromise (IoCs) were distributed through alerts and communications by the Canadian Cyber Security Incident Response Team (CSIRT). This ensured that partners across all sectors had the information they needed to act decisively.</p>

<p>For up-to-date information on <a href="https://www.cyber.gc.ca/en/alerts-advisories">alerts and advisories</a> or <a href="https://www.cyber.gc.ca/en/guidance">cyber security guidance</a>, please <a href="https://www.cyber.gc.ca/en/contact-cyber-centre">contact the Cyber Centre</a>.</p>

<h3>Malicious JavaScript configuration</h3>

<ul><li>tailwind.config.js
	<ul><li>SHA256: d043f264ff5216fa724cad2d35ba4d895c43e295df72be6d46c07a3a46cfbd62</li>
	</ul></li>
</ul><h4>Payloads</h4>

<ul><li>payload2.js (InvisibleFerret.Javascript)
	<ul><li>SHA256: 7237310e076459d2fce2f531941b5920e451f390a8b8e633787b62b68b1315d5</li>
	</ul></li>
	<li>boot-decoded-2.js
	<ul><li>SHA256: 91822e59bd642f8e6f321011d0fb45b8a5f0854547ea898dead5d5af1db3ed9b</li>
	</ul></li>
</ul><h4>C2 URL</h4>

<ul><li>/verify-human/5-74</li>
</ul><h4>C2 URL for upload endpoint</h4>

<ul><li>/u/f/</li>
</ul><h4>C2 IPs</h4>

<ul><li>166.88.4[.]2</li>
	<li>23.27.202[.]27</li>
	<li>23.27.202[.]143</li>
	<li>136.0.9[.]8</li>
</ul><h4>C2 port</h4>

<ul><li>27017</li>
</ul></section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<p><span class="clearfix"></span></p>

<section><h2 class="text-info" id="tools-services">Cyber Centre tools and services</h2>

<p>No single tool, service or turnkey solution can reconstruct an incident, trace an attacker’s path or validate a threat on its own. A holistic approach using multiple perspectives is required to conduct a thorough investigation. As such, the Cyber Centre relies on multiple layered telemetry sources to detect threats and protect monitored assets.</p>

<p><a href="https://www.cyber.gc.ca/en/tools-services/assemblyline">AssemblyLine</a> was used to enable triage at scale, processing hundreds of thousands of files per day. In response to this incident, the Cyber Centre also created YARA rules to help with the detection of malicious files related to the threat actor’s activity. Additional YARA rules will be released periodically after an evaluation period to ensure accuracy.</p>

<p>The YARA rule below enables a detection of similar payloads extracted from the compromised host.</p>

<section class="panel panel-default col-md-12"><div class="panel-body">
<h3 class="text-center h5" id="fig6"><strong>Figure 6: YARA rule for <span class="text-uppercase">jadesnow</span> obfuscated downloader</strong></h3>

<figure><img alt="Figure 6 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/etherhiding-fig6-yara-rule-ef-1080x329.png" /></figure><details><summary>Long description - Figure 6: YARA rule for <span class="text-uppercase">jadesnow</span> obfuscated downloader</summary><p>This YARA rule specifically targets malware associated with the <span class="text-uppercase">jadesnow</span> actor group. It uses a combination of metadata, including a unique identifier, fingerprint, version, and description, along with a specific string pattern and condition to identify the presence of the obfuscated downloader in files. The condition checks for a specific hexadecimal value and the presence of a defined obfuscated string pattern to flag potential threats.</p>

<pre class="prettyprint">
<span class="wb-inv">Code</span>
rule <span class="text-uppercase">jadesnow</span>_obfuscated_downloader { 
    meta: 
      id = "1vzA18HaXi4AzFlgIvijiq" 
      fingerprint = "02701150de12a2a30a570cb0c1147d32b005fe618a6eceb1452e1c1eaba6b27a" 
      version = "1.0" 
      modified = "2025-12-30" 
      status = "<span class="text-uppercase">released</span>" 
      sharing = "TLP:GREEN" 
      source = "CCCS" 
      author = "reveng@CCCS" 
      description = "Detects the obfuscated downloader appended to legitimate GitHub projects, used by <span class="text-uppercase">jadesnow</span>" 
      category = "<span class="text-uppercase">malware</span>" 
      malware_type = "<span class="text-uppercase">downloader</span>" 
      report = "TA25-0064" 
      hash = "d043f264ff5216fa724cad2d35ba4d895c43e295df72be6d46c07a3a46cfbd62" 
      first_imported = "2025-12-30" 
      strings: $obfuscated_downloader = /\s{200}global\[[\x09\x0A\x0D\x20-\x7E]+function[\x09\x0A\x0D\x20-\x7E]+\.length;[\x09\x0A\x0D\x20-\x7E]+charAt\([\x09\x0A\x0D\x20-\x7E]+\.join/ 
      condition: uint16(0) != 0x5A4D and 
      $obfuscated_downloader 
  }
</pre>
</details></div>
</section></section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<p><span class="clearfix"></span></p>

<section><h2 class="text-info" id="acknowledgements">Acknowledgments</h2>

<p>As a part of the Communications Security Establishment Canada (CSE), the Cyber Centre is a proud member of the Five Eyes, the world’s longest-standing and closest intelligence-sharing alliance. Sharing IoCs and TTPs with the cyber community and Five Eyes partners has been instrumental since the EtherHiding campaign was first discovered, and ongoing analytical exchanges have maximized the value of collected data.</p>

<p>Further collaboration with organizations such as Mandiant has enabled the exchange of detailed malware analysis and technical findings, strengthening collective defences.</p>

<div class="alert alert-info">
<p><strong>Disclaimer:</strong> The Cyber Centre disclaims all liability for any loss, damage, or costs arising from the use of or reliance on the information within this article. Readers are solely responsible for verifying the accuracy and applicability of any information before acting on it.</p>
</div>
</section><section><aside class="wb-fnote" role="note"><h2 id="references">References</h2>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p>Blas Kojusner et al., <a href="https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding?hl=en">DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains</a>, Mandiant, October 16, 2025.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote </span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>Ellis Stannard, <a href="https://ransom-isac.org/blog/cross-chain-txdatahiding-crypto-heist/">Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1)</a>, RANSOM-ISAC, October 20, 2025.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></section></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-securing-space-cyber-security-low-earth-orbit-satellite-communications</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-securing-space-cyber-security-low-earth-orbit-satellite-communications"/><title><![CDATA[Joint guidance on securing space and cyber security for low earth orbit satellite communications]]></title><updated>2026-03-25T14:40:25Z</updated><summary><![CDATA[This joint guidance is intended for users of LEO SATCOM services. It highlights the key cyber security risks and mitigation strategies to support informed decision-making.]]></summary><content><![CDATA[<article data-history-node-id="7424" about="/en/news-events/joint-guidance-securing-space-cyber-security-low-earth-orbit-satellite-communications" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Australian Space Agency (ASA) and the following international partners in releasing cyber security guidance on considerations for users of low earth orbit (LEO) satellite services:</p>

<ul><li>New Zealand National Cyber Security Centre (NCSC-NZ)</li>
	<li>United States’ National Security Agency (NSA)</li>
</ul><p>The rapid expansion and increasing reliance on <abbr title="low earth orbit">LEO</abbr> satellite communication (SATCOM) systems have introduced significant cyber security challenges. As <abbr title="low earth orbit">LEO</abbr> satellite constellations grow, the attack surface for threat actors increases. This growth puts critical networks that depend on these satellite services at greater risk. Securing this infrastructure is essential to ensuring the resilience of commercial communications, national security systems and emergency response capabilities.</p>

<p>This joint guidance is intended for users of <abbr title="low earth orbit">LEO</abbr> <abbr title="satellite communication">SATCOM</abbr> services. It highlights the key cyber security risks and mitigation strategies to support informed decision-making. It also provides organizations with a set of critical questions that they can ask in discussions about security with <abbr title="low earth orbit">LEO</abbr> <abbr title="satellite communication">SATCOM</abbr> service providers.</p>

<p>Read the full joint guidance: <a href="https://www.cyber.gov.au/about-us/view-all-content/news/securing-space-cyber-security-for-leo-satcom">Securing space – Cyber security for low earth orbit satellite communications</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/top-10-artificial-intelligence-security-actions-primer-itsap10049</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/top-10-artificial-intelligence-security-actions-primer-itsap10049"/><title><![CDATA[Top 10 artificial intelligence security actions: A primer - ITSAP.10.049]]></title><updated>2026-03-05T16:56:13Z</updated><summary><![CDATA[Our top AI security actions are designed to help organizations of all sizes and sectors strengthen their cyber resilience.]]></summary><content><![CDATA[<article data-history-node-id="7350" about="/en/guidance/top-10-artificial-intelligence-security-actions-primer-itsap10049" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>March 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.10.049</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>March 2026 | Awareness series</strong></p>
</div>
</div>

<p>In an era of rapid advancements in artificial intelligence (AI), organizations face heightened security risks. Such risks include data theft, reputational harm, and operational and financial loss stemming from adversarial abuse of AI, attacks on AI systems or misuse of AI by business users.</p>

<p>The Canadian Centre for Cyber Security (Cyber Centre) plays a critical role in safeguarding Canadian organizations from these threats. Our top AI security actions are designed to help organizations of all sizes and sectors strengthen their cyber resilience. These recommended AI security actions support and strengthen our <a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">existing Top IT security actions (ITSM.10.089)</a>, rather than replace them.</p>

<p>By adopting AI-specific security actions, organizations can build more resilient AI-enabled infrastructures and processes. This will minimize the likelihood and impact of AI-related intrusions, misuse and system compromise.</p>

<p>Our top AI security actions are organized into the following 3 pillars:</p>

<ul><li><a href="#pillar1">Pillar 1: Protecting against adversarial use of AI</a></li>
	<li><a href="#pillar2">Pillar 2: Protecting AI Systems</a></li>
	<li><a href="#pillar3">Pillar 3: Protecting users and business processes</a></li>
</ul><p>Given the speed at which AI solutions are being developed and adopted, we expect the risks and actions to evolve over the next 10 years. However, the 3 pillars are expected to remain the same for the foreseeable future, even as AI models and methods evolve.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!-- Pillar 1 -->

<h2 class="text-info" id="pillar1">Pillar 1: Protecting against adversarial use of AI</h2>

<p>This pillar provides actions for your organization to enhance your ability to protect your environment from the adversarial use of AI.</p>
<!-- action 1 -->

<h3>Action 1: Implement prompt injection and jailbreak mitigations</h3>

<ul><li>Sanitize inputs</li>
	<li>Isolate system prompts and protect prompt history</li>
	<li>Apply output filtering and policy gating</li>
	<li>Restrict high risk tools and agents via role based access and identity controls</li>
	<li>Validate downstream actions (files, code and tools) before execution</li>
	<li>Quarantine anomalous outputs</li>
	<li>Reduce access to private data by AI models</li>
	<li>Limit exposure to untrusted content</li>
	<li>Reduce the ability for AI systems to communicate externally (such as embedded data in markdown image URLs)</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 1</span></h4>
</header><div class="panel-body">
<p>Imagine that you’re chatting with a smart chatbot assistant, but a hacker finds a way to secretly slip in sneaky commands inside your questions. These commands trick the AI into doing things it shouldn’t do, such as running harmful computer commands.</p>

<p>This happened in 2025 with GitHub Copilot. Threat actors used a clever “prompt injection” to fool it into running dangerous code remotely. Microsoft quickly fixed it, showing us that spotting these hidden hacks early is key to keeping AI safe.<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup></p>
</div>
</section><!-- action 2 --><h3>Action 2: Defend against deepfake and impersonation</h3>

<ul><li>Deploy media authenticity checks and detection</li>
	<li>Enforce strong identity verification and phishing-resistant multi-factor authentication (including meeting PINs) for conferencing and messaging</li>
	<li>Train staff to verify unusual requests across channels</li>
	<li>Implement out of band verification for sensitive actions</li>
	<li>Implement abuse prevention for scams and social engineering at scale</li>
	<li>Monitor for AI generated phishing and voice or video spoofs</li>
	<li>Follow our <a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 IT security actions (ITSM.10.089)</a>, including securing online accounts, to reduce hijacking and limit the impact of disinformation or false narratives</li>
	<li>Set the default for all identify signals (such as voice and video) as untrusted until verified by your organization</li>
	<li>Implement robust identity binding processes for higher risk business functions, such as finance, administrative privileges and access to sensitive information</li>
	<li>Enforce identity risk scoring to AI when it’s used to launch or accelerate specific actions to determine the likelihood of compromise</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 2</span></h4>
</header><div class="panel-body">
<p>In early 2024, a British design and engineering firm lost millions of dollars/pounds when a threat actor used AI-powered deepfake technology to impersonate the company’s CFO. During a video call, they fooled an employee in Hong Kong into transferring funds to fake accounts. The money quickly vanished offshore.</p>

<p>In May 2025, a separate incident highlighted how a global advertising giant narrowly avoided a similar scam. In this case, a threat actor used deepfake video and audio of the CEO and senior executives in a Microsoft Teams meeting to try to trick employees into leaking confidential information and making payments.<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup></p>
</div>
</section><!-- action 3 --><h3>Action 3: Harden defences against AI powered cyber attacks and fraud</h3>

<ul><li>Upgrade analytics for high volume, automated probing and credential stuffing</li>
	<li>Enforce rate limiting, bot detection and adaptive authentication</li>
	<li>Adopt zero trust principles and best practices</li>
	<li>Establish clear standards for data quality, code and documentation</li>
	<li>Regularly refactor models and code as systems evolve</li>
	<li>Ensure ongoing maintenance, automated testing and proactive code review</li>
	<li>Continuously monitor to mitigate “technical debt” and improve long-term AI system reliability and adaptability</li>
	<li>Train staff on AI threats and create tailored awareness programs which include:
	<ul><li>sharing intelligence reporting</li>
		<li>developing resilience by addressing known issues through employee upskilling and vulnerability disclosure</li>
	</ul></li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 3</span></h4>
</header><div class="panel-body">
<p>Early in 2025, ransomware attacks exploded by almost 150%. A new trend has emerged where threat actors use AI to craft perfect phishing emails that appear to be from your boss or bank. AI-driven malware can shape-shift (called polymorphic malware), acting normally on your computer to avoid being spotted until it’s too late.</p>

<p>Ransom amounts have increased from hundreds of thousands to millions of dollars, while the level of effort for threat actors has gone down significantly.<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup></p>
</div>
</section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!-- Pillar 2 -->

<h2 class="text-info" id="pillar2">Pillar 2: Protecting AI systems</h2>

<p>This pillar provides actions for your organization to enhance your ability to protect AI systems.</p>
<!-- action 4 -->

<h3>Action 4: Conduct testing and red teaming of AI to identify modifications</h3>

<ul><li>Regularly evaluate models, pipelines and interfaces against known attacks (such as evasion, prompt injection and poisoning)</li>
	<li>Update guardrails as exploits evolve</li>
	<li>Prioritize vetted, signed and well-maintained models based on risk assessments</li>
	<li>Apply timely patches and configuration updates</li>
	<li>Develop recovery plans to provide options for faulty deployments</li>
	<li>Implement disaster recovery and incident response plans for AI systems</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 4</span></h4>
</header><div class="panel-body">
<p>In July 2025, researchers found a critical data poisoning exploit in Microsoft 365 Copilot and similar retrieval-augmented generation (RAG) AI systems where threat actors injected poisoned documents to manipulate AI outputs persistently. This exploit showed the danger of insufficient continuous testing and updating of AI guardrails against evolving attacks.<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup></p>
</div>
</section><!-- action 5 --><h3>Action 5: Safeguard against data poisoning</h3>

<ul><li>Track data provenance</li>
	<li>Curate versioned datasets</li>
	<li>Harden training environments or use sandboxed architectures</li>
	<li>Run anomaly and bias detection on ingested data (including mirrored or manipulated news or content sources)</li>
	<li>Implement gate training and finetuning with approval workflows and model and data rollback plans</li>
	<li>Ensue rigorous identity and access control measures are implemented across all parts of the data and operations chain</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 5</span></h4>
</header><div class="panel-body">
<p>In 2024, security researchers working with Wiz and Hugging Face uncovered a risk in which malicious actors could upload poisoned data to Hugging Face’s dataset repositories. This vulnerability threatened AI pipelines of multiple organizations using their models and data. It exposed weak tracking of data sources and lack of anomaly detection on ingested data.<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup></p>
</div>
</section><!-- action 6 --><h3>Action 6: Implement data usage controls and model theft prevention</h3>

<ul><li>Enforce “no train” defaults and strict data sharing controls</li>
	<li>Implement vendor contractual clauses</li>
	<li>Log and audit all models and data access</li>
	<li>Monitor application programming interfaces (APIs) for extraction patterns (such as mass queries or label harvesting)</li>
	<li>Prevent sensitive data leakage with data loss prevention and secret scrubbing</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 6</span></h4>
</header><div class="panel-body">
<p>Threat actors carry out model extraction attacks by querying a machine learning model extensively and using the responses to train a replica with similar functionality. Implementing defences like API rate limiting, authentication, query monitoring, model watermarking, and legal protections can prevent unauthorized model replication and data leakage.</p>
</div>
</section><!-- action 7 --><h3>Action 7: Secure AI engineering and supply chain processes</h3>

<ul><li>Implement and maintain an AI bill of materials (AIBOM)</li>
	<li>Reduce “technology debt” when AI systems are deployed or advanced very quickly and without secure deployment controls</li>
	<li>Ensure a strong foundational system, in accordance with <a href="/en/guidance/annex-3a-security-control-catalogue-itsg-33#a33au12">Cyber security and privacy risk management series: A lifecycle approach (ITSP.10.033)</a>, is in place before layering AI systems on top of existing IT infrastructure</li>
	<li>Keep AI applications up to date</li>
	<li>Cryptographically sign models, code and artifacts or use hash-based validation as a start</li>
	<li>Maintain an AI specific software bill of materials (SBOM) for models, datasets, and dependencies</li>
	<li>Align with secure development frameworks (such as ITSP.10.033) and AI risk management standards including the:
	<ul><li><a href="https://www.nist.gov/itl/ai-risk-management-framework">National Institute of Standards and Technology’s (NIST) Artificial Intelligence Risk Management Framework</a></li>
		<li><a href="https://www.iso.org/standard/42001">International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) Standard 42001:2023 Information technology — Artificial intelligence — Management system</a></li>
	</ul></li>
	<li>Implement change control, reviews and dependency scanning</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 7</span></h4>
</header><div class="panel-body">
<p>In 2024, the NullBulge group conducted high-profile supply chain attacks on AI-related open-source repositories hosted on GitHub and Hugging Face. By injecting malicious Python payloads into widely used AI tools and dependencies, they were able to exfiltrate sensitive data and deploy ransomware into downstream systems.</p>

<p>This incident underscores the dangers of technology debt when AI solutions are rapidly adopted without robust security controls. The incident also demonstrates the urgent need for foundational secure engineering, cryptographically signed artifacts, comprehensive SBOMs, and adherence to recognized security frameworks.<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup></p>
</div>
</section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!-- Pillar 3 -->

<h2 class="text-info" id="pillar3">Pillar 3: Protecting users and business processes</h2>

<p>This pillar provides actions for your organization to enhance your ability to protect users and business processes.</p>
<!-- action 8 -->

<h3>Action 8: Enforce data privacy, vendor and contractual controls</h3>

<ul><li>Classify and minimize personally identifiable information (PII) in prompts</li>
	<li>Encrypt data in transit and at rest</li>
	<li>Apply data loss prevention, access controls and retention limits</li>
	<li>Require transparency, audit rights, liability and use restrictions (for intellectual property and copyright issues)</li>
	<li>Support the labelling of generative AI content to improve transparency</li>
	<li>Map and identify sanctioned and unsanctioned models operating on a network</li>
	<li>Implement policies, process and tools to govern the use of “shadow AI”</li>
	<li>Create an internal business policy for the acceptable use of AI tools</li>
	<li>Apply allow and deny lists for AI solutions</li>
	<li>Draft procurement clauses for vendors of AI-generated tools or solutions to protect against reputational harm</li>
</ul><p>To meet regulatory expectations and manage vendor risk, contracts with AI vendors should include explicit data usage, privacy, audit, and liability clauses. These clauses should include:</p>

<ul><li>prohibiting unauthorized use of organizational data for model training</li>
	<li>ensuring encryption and access controls for all PII</li>
	<li>requiring vendor transparency and audit rights</li>
	<li>embedding usage restrictions and liability terms to protect against data leakage, unauthorized reuse, and reputational or legal harm</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 8</span></h4>
</header><div class="panel-body">
<p>Internal policies, including lists of approved AI tools and shadow AI controls, ensure AI tools are used safely and in compliance with privacy laws and contractual obligations.</p>
</div>
</section><!-- action 9 --><h3>Action 9: Ensure that human-in-the-loop oversight and execution controls are in place</h3>

<ul><li>Embed human checkpoints in automated and multi‑agent workflows</li>
	<li>Provide explainability tools and auditable decision trails</li>
	<li>Implement escalation, triage, rate limits and kill‑switches or emergency shutdown procedures for high‑impact actions</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 9</span></h4>
</header><div class="panel-body">
<p>In 2025, an HR technology company faced reputational damage and legal scrutiny after removing human review from its AI-driven candidate screening process. The lack of human oversight allowed unchecked algorithmic bias to influence hiring decisions. In response, the organization reinstated human-in-the-loop controls, added execution checks, and established auditable decision trails to ensure all AI-driven outcomes are monitored and can be corrected by human reviewers.<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup></p>
</div>
</section><!-- action 10 --><h3>Action 10: Maintain operational resilience against model drift, hallucinations, bias and overreliance</h3>

<ul><li>Continuously monitor for drift and performance degradation</li>
	<li>Retrain or retire models that exceed validated bounds</li>
	<li>Continuously monitor for AI decision transparency to enable better understanding of model decisions and outputs</li>
	<li>Add truth checking and human review for critical outputs</li>
	<li>Test for bias and misuse</li>
	<li>Maintain fallback procedures and user training to avoid overreliance</li>
	<li>Require human review to prevent introduction of made-up components and containers for software code that could be appropriated by a threat actor</li>
	<li>Implement detection measures and retraining thresholds</li>
</ul><section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Why this action matters <span class="wb-inv">Action 10</span></h4>
</header><div class="panel-body">
<p>Financial regulators, including Canada’s Office of the Superintendent of Financial Institutions (OSFI), have identified AI model risk as a growing supervisory concern, particularly risks arising from data quality issues, model drift, lack of transparency, bias, and overreliance on automated outputs. OSFI has warned that poorly governed AI systems can produce unreliable or unexpected results, potentially leading to operational disruption, financial loss, legal exposure, and reputational harm if not actively monitored and controlled.</p>

<p>As AI models evolve over time and conditions change, maintaining operational resilience requires continuous performance monitoring, explainability, human oversight for critical decisions, and clear fallback procedures to ensure AI systems remain within validated and acceptable risk boundaries.<sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup></p>
</div>
</section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<section><aside class="wb-fnote" role="note"><h2 id="fn">Footnotes</h2>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p>Intelligence X. <a href="https://blog.intelligencex.org/github-copilot-critical-camoleak-vulnerability">GitHub Copilot Hit by Critical CamoLeak Vulnerability</a>. October 22, 2025.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote </span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>World Economic Forum. ‘<a href="https://www.weforum.org/stories/2025/02/deepfake-ai-cybercrime-arup/">This happens more frequently than people realize’: Arup chief on the lessons learned from a $25m deepfake crime</a>. February 4, 2025.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote </span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p>Axis. A.I. <a href="https://axisinsurance.ca/a-i-driven-cyberattacks-fuel-149-rise-in-ransomware-incidents-in-early-2025-our-advice-for-staying-ahead-of-the-next-breach/">Driven Cyberattacks Fuel 149% Rise in Ransomware Incidents in Early 2025. Our Advice for Staying Ahead of the Next Breach</a>. June 5, 2025.</p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote </span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p>Hack the Box. <a href="https://www.hackthebox.com/blog/cve-2025-32711-echoleak-copilot-vulnerability">Inside CVE-2025-32711 (EchoLeak): Prompt injection meets AI exfiltration</a>. July 2, 2025.</p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote </span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p>The Wiz. <a href="https://www.wiz.io/blog/wiz-research-discovers-critical-vulnerability-in-replicate">The risk in malicious AI models: Wiz Research discovers critical vulnerability in AI-as-a-Service provider, Replicate</a>. May 23, 2024.</p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote </span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p>Sentinel Labs. <a href="https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/">NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI</a>. July 16, 2024.</p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote </span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p>Best Lawyers. <a href="https://www.bestlawyers.com/article/algorithmic-exclusion-workday-lawsuit-future-hiring/6909">Algorithmic Exclusion: The Workday lawsuit and the future of AI in hiring</a>. September 19, 2025.</p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote </span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 8</dt>
	<dd id="fn8">
	<p>Government of Canada, Office of the Superintendent of Financial Institutions. <a href="https://www.osfi-bsif.gc.ca/en/about-osfi/reports-publications/osfi-fcac-risk-report-ai-uses-risks-federally-regulated-financial-institutions">OSFI-FCAC Risk Report - AI Uses and Risks at Federally Regulated Financial Institutions</a>. September 24, 2024.</p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote </span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-supply-chain-risks-mitigations-artificial-intelligence-machine-learning</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-supply-chain-risks-mitigations-artificial-intelligence-machine-learning"/><title><![CDATA[Joint guidance on supply chain risks and mitigations for artificial intelligence and machine learning]]></title><updated>2026-03-05T15:05:25Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7309" about="/en/news-events/joint-guidance-supply-chain-risks-mitigations-artificial-intelligence-machine-learning" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and the following international partners in releasing cyber security guidance on supply chain risks and mitigations for artificial intelligence (AI) and machine learning (ML):</p>

<ul><li>Japan’s National Cybersecurity Office (NCO)</li>
	<li>New Zealand National Cyber Security Centre (NCSC-NZ)</li>
	<li>Republic of Korea’s National Intelligence Service (NIS)</li>
	<li>Singapore’s Cyber Security Agency (CSA)</li>
	<li>United Kingdom’s National Cyber Security Centre (NCSC-UK)</li>
	<li>United States’ National Security Agency (NSA)</li>
</ul><p><abbr title="artificial intelligence">AI</abbr> and <abbr title="machine learning">ML</abbr> systems allow organizations to improve their efficiency in various ways, including by making informed decisions, streamlining processes and improving customer experience.</p>

<p>If not securely managed, adopting <abbr title="artificial intelligence">AI</abbr> or <abbr title="machine learning">ML</abbr> systems and using pre-trained models and third-party data sets can introduce unique supply chain risks and expose your organization to existing vulnerabilities and compromises. Organizations should know what to look out for when developing or incorporating <abbr title="artificial intelligence">AI</abbr> and <abbr title="machine learning">ML</abbr> into their systems.</p>

<p>This joint guidance is intended for organizations and staff that deploy or develop <abbr title="artificial intelligence">AI</abbr> or <abbr title="machine learning">ML</abbr> systems and components. The risks and mitigation in this joint guidance should inform organizations’ questions and requirements for vendors when sourcing third-party <abbr title="artificial intelligence">AI</abbr> or <abbr title="machine learning">ML</abbr> systems and components. It aims to highlight the importance of <abbr title="artificial intelligence">AI</abbr> and <abbr title="machine learning">ML</abbr> supply chain security and address key risks and mitigations that should be considered when developing or procuring an <abbr title="artificial intelligence">AI</abbr> system.</p>

<p>Consult the full joint guidance: <a href="https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/artificial-intelligence-and-machine-learning-supply-chain-risks-and-mitigations">Artificial intelligence and machine learning – Supply chain risks and mitigations</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-threat-bulletin-iranian-cyber-threat-response-usisrael-strikes-february-2026</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-threat-bulletin-iranian-cyber-threat-response-usisrael-strikes-february-2026"/><title><![CDATA[Cyber threat bulletin: Iranian Cyber Threat Response to US/Israel strikes, February 2026]]></title><updated>2026-03-02T15:28:10Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7340" about="/en/guidance/cyber-threat-bulletin-iranian-cyber-threat-response-usisrael-strikes-february-2026" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><section><h2 class="text-info page-header">Overview</h2>

<p>On February 28, 2026, the United States (U.S.) and the State of Israel (Israel) launched military strikes against the Islamic Republic of Iran (Iran) to eliminate threats from the Iranian regime.<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> Iran retaliated with military strikes against Israel and U.S. military bases across the Middle East.<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup></p>

<p>On February 28, 2026, the Government of Canada released a statement supporting the United States acting to prevent Iran from obtaining a nuclear weapon and to prevent its regime from further threatening international peace and security<span class="nowrap">.<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup></span></p>

<p>Iran will very likely use its cyber program to respond to the joint U.S. and Israel combat operations against Iran. Possible responses by Iranian cyber threat actors include:</p>

<ul><li>Cyber attacks against critical infrastructure;</li>
	<li>Cyber-enabled information operations;</li>
	<li>Online harassment of military personnel; and</li>
	<li>Harassment and repression of diaspora and activist communities.</li>
</ul><p>Canadian critical infrastructure operators and other possible targeted entities should remain vigilant to threats posed by cyber actors aligned with Iranian interests.</p>

<h2 class="text-info page-header">Iran uses cyber program to retaliate, achieve geopolitical goals</h2>

<ul class="lst-spcd"><li>Iranian state-sponsored cyber threat actors conduct disruptive cyber-enabled information operations to further Iran’s geopolitical objectives and the regime’s interests. Iran has developed a network of hacktivist personas and social media channels to intimidate Iran’s opponents and shape public opinion.<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup></li>
	<li>Iranian state-sponsored cyber threat actors opportunistically target poorly secured critical infrastructure (CI) networks and internet-connected devices around the world, including those associated with the water and energy sectors.<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup> Iranian cyber threat actors have performed denial of services attacks, attempted to manipulate industrial control systems, and accessed networks to encrypt, wipe, and leak data.<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup></li>
	<li>Pro-Iran hacktivists conduct cyber threat activity against Iran’s rivals, but often overstate their impact. In response to the U.S. airstrikes on Iranian nuclear sites in 2025, pro-Iran hacktivist groups claimed to have conducted distributed denial-of-service (DDoS) attacks against websites associated with the U.S. military, U.S. defence companies and U.S. financial institutions.<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup> Pro-Iran hacktivists will likely view Canada as a target for low-sophistication disruptive cyber activity due to Canada’s public support of the US/Israel military activity.</li>
	<li>Iranian state-sponsored cyber threat actors likely conduct cyber espionage against individuals in Canada that the Iranian regime considers a threat, such as political activists, journalists, and human rights advocates.<sup id="fn4a-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup> We assess that Iranian cyber threat actors will likely target opponents abroad, especially those advocating for regime change in Iran.<sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup></li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info page-header">Characteristics of Iranian cyber threat activity</h2>

<section class="panel panel-primary"><header class="panel-heading"><h3 class="panel-title">Compelling social engineering</h3>
</header><div class="panel-body">
<p>Iranian cyber threat groups are particularly sophisticated in combining social engineering with spear phishing, using these efforts to target public officials and gain access to government networks and private sector organizations globally<span class="nowrap">.<sup id="fn9-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup></span></p>

<p>Iranian social engineering efforts focus on using professional interactions on social media platforms to gain information about organizations related to Iran’s political, economic and military interests, particularly in the aerospace, energy, defence, security, and telecommunications sectors<span class="nowrap">.<sup id="fn9a-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup></span></p>
</div>
</section><section class="panel panel-primary"><header class="panel-heading"><h3 class="panel-title">Exploiting known vulnerabilities</h3>
</header><div class="panel-body">
<p>Iranian cyber threat actors exploit known vulnerabilities to gain initial access to systems, and then leverage this access for follow on operations such as data exfiltration or encryption, ransomware, and extortion.<sup id="fn10-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup></p>

<p>Iranian cyber threat actors opportunistically identify targets using publicly available scanning tools to search for internet-exposed systems with vulnerable configurations, for example devices using default or weak passwords and without multi-factor authentication.<sup id="fn11-rf"><a class="fn-lnk" href="#fn11"><span class="wb-inv">Footnote </span>11</a></sup></p>
</div>
</section><section class="panel panel-primary"><header class="panel-heading"><h3 class="panel-title">Disruptive and destructive cyber attacks</h3>
</header><div class="panel-body">
<p>Iranian cyber threat actors typically conduct DDoS attacks and website / device defacements to temporarily disrupt target networks. They also deploy ransomware and destructive wiper malware and conduct hack-and-leak operations against compromised targets.<sup id="fn12-rf"><a class="fn-lnk" href="#fn12"><span class="wb-inv">Footnote </span>12</a></sup></p>
</div>
</section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info">Useful resources</h2>

<p>Refer to the following online resources for more information and useful advice and guidance.</p>

<p><strong>Reports and advisories</strong></p>

<ul class="lst-spcd"><li>Canada’s threat assessments
	<ul><li><a href="/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a></li>
	</ul></li>
	<li>Advisories and partner publications
	<ul><li><a href="/en/guidance/cyber-threat-bulletin-iranian-cyber-threat-canada-israel-iran-conflict">Cyber threat bulletin: Iranian cyber threat to Canada from Israel-Iran conflict</a></li>
		<li><a href="/en/guidance/targeted-manipulation-irans-social-engineering-and-spear-phishing-campaigns">Targeted manipulation: Iran’s social engineering and spear phishing campaigns</a></li>
		<li><a href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a></li>
	</ul></li>
</ul><p><strong>Advice and guidance</strong></p>

<ul class="lst-spcd"><li><a href="/en/cyber-security-readiness/cyber-security-readiness-goals-securing-our-most-critical-systems">Cyber Security Readiness Goals (CRGs): Securing Our Most Critical Systems</a></li>
	<li><a href="/en/cyber-security-readiness/cross-sector-cyber-security-readiness-goals-toolkit">Cross-Sector Cyber Security Readiness Goals Toolkit</a></li>
	<li><a href="/en/guidance/security-considerations-critical-infrastructure-itsap10100">Security considerations for critical infrastructure</a></li>
	<li><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 IT security actions to protect Internet connected networks and information</a></li>
	<li><a href="/en/guidance/top-10-it-security-action-items-no2-patch-operating-systems-and-applications-itsm10096">Top 10 IT security action items: No.2 patch operating systems and applications</a></li>
	<li><a href="/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware</a></li>
	<li><a href="/en/guidance/security-considerations-your-website-itsm60005">Security considerations for your website</a></li>
	<li><a href="/en/guidance/security-considerations-edge-devices-itsm80101">Security considerations for edge devices</a></li>
	<li><a href="/en/guidance/defending-against-distributed-denial-service-ddos-attacks-itsm80110">Defending against distributed denial of service (DDoS) attacks</a></li>
	<li><a href="/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication</a></li>
	<li><a href="/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks">Don't take the bait: Recognize and avoid phishing attacks</a></li>
	<li><a href="/en/guidance/what-do-when-your-organization-has-been-compromised-cyber-attack-itsap00009">What to do when your organization has been compromised by a cyber attack</a></li>
</ul></section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<section><h2 class="text-info page-header">About this document</h2>

<h3>Contact</h3>

<p>For follow-up questions or issues, contact the Cyber Centre at <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>

<h3>Assessment base and methodology</h3>

<p>The key judgements in this assessment rely on reporting from multiples sources, both classified and unclassified. The judgements are based on the Canadian Centre for Cyber Security (Cyber Centre)’s knowledge and expertise in cyber security. Defending the Government of Canada’s information systems provides the Cyber Centre with a unique perspective to observe trends in the cyber threat environment, which also informs our assessments. CSE’s foreign intelligence mandate provides us with valuable insight into adversary behavior in cyberspace. While we must always protect classified sources and methods, we provide the reader with as much justification as possible for our judgements.</p>

<p>Our key judgements are based on an analytical process that includes evaluating the quality of available information, exploring alternative explanations, mitigating biases and using probabilistic language. We use terms such as “we assess” or “we judge” to convey an analytic assessment. We use qualifiers such as “possibly”, “likely”, and “very likely” to convey probability.</p>

<p>The contents of this document are based on information available as of <strong>February 28, 2026</strong>.</p>

<h3>Estimative language</h3>

<p><img alt="Estimated language chart long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/tarp-language-chart-transparent-e.png" /></p>

<details class="mrgn-bttm-lg"><summary>Long description - Estimative language chart </summary><ul class="list-unstyled mrgn-tp-md"><li>1 to 9% Almost no chance</li>
	<li>10 to 24% Very unlikely/Very Improbable</li>
	<li>25 to 39% Unlikely/Improbable</li>
	<li>40 to 59% Roughly even chance</li>
	<li>60 to 74% Likely/probably</li>
	<li>75 to 89% Very likely/very probable</li>
	<li>90 to 100% Almost certainly</li>
</ul></details><div class="clearfix"> </div>
</section><section><!--FOOTNOTE SECTION EN--><aside class="wb-fnote" role="note"><h2 class="text-info" id="10">Footnotes</h2>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p>Abdi Latif Dahir, “<a href="https://www.nytimes.com/2026/02/28/world/middleeast/iran-retaliatory-strikes-region.html?smid=url-share">Iran Hits Back Across the Mideast, Targeting U.S. Basses and Allies</a>,” The New York Times, February 28, 2026; PBS News, “<a href="https://www.pbs.org/newshour/world/read-trumps-full-statement-on-iran-attack">Read Trump’s full statement on Iran Attacks</a>,” February 28, 2026.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>Abdi Latif Dahir, “<a href="https://www.nytimes.com/2026/02/28/world/middleeast/iran-retaliatory-strikes-region.html?smid=url-share">Iran Hits Back Across the Mideast, Targeting U.S. Basses and Allies</a>,” The New York Times, February 28, 2026.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p>Prime Minister of Canada, “<a href="https://www.pm.gc.ca/en/news/statements/2026/02/28/statement-prime-minister-carney-and-minister-anand-situation-middle-east">Statement by Prime Minister Carney and Minister Anand on the situation in the Middle East</a>,” February 28, 2026.</p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote </span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p>Canadian Centre for Cyber Security, “<a href="/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a>,” October 30, 2024.</p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote </span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p>Cybersecurity and Infrastructure Security Agency, “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a">IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities</a>,” December 18, 2024; U.S. Department of Homeland Security, “<a href="https://www.dhs.gov/ntas/advisory/national-terrorism-advisory-system-bulletin-june-22-2025">National Terrorism Advisory System Bulletin – Issued June 22, 2025</a>,” June 22, 2025; Andy Greenberg, “<a href="https://www.wired.com/story/cyberav3ngers-iran-hacking-water-and-gas-industrial-systems/">CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide</a>,” Wired, April 14, 2025.</p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote </span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p>Canadian Centre for Cyber Security, “<a href="/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a>,” October 30, 2024; National Security Agency. <a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4229506/nsa-cisa-fbi-and-dc3-warn-iranian-cyber-actors-may-target-vulnerable-us-network/">Iranian Cyber Actors May Target Vulnerable U.S. Networks and Entities of Interest</a>, June 30, 2025; Cybersecurity and Infrastructure Security Agency, “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-264a">Iranian State Actors Conduct Cyber Operations Against the Government of Albania</a>,” September 23, 2022.</p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote </span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p>Cyble, “<a href="https://cyble.com/blog/hacktivists-launch-ddos-attacks-at-us-iran-bombings/">Hacktivists Launch DDoS Attacks at U.S. Following Iran Bombings</a>,” June 24, 2025.</p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote </span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 8</dt>
	<dd id="fn8">
	<p>CBC News, “<a href="https://www.cbc.ca/news/world/iran-internal-crackdown-1.7570782">Iranian government turns to internal crackdown with arrests, executions</a>,” June 25, 2025; Government of Canada. G7 Rapid Response Mechanism (RRM) Statement on Iranian Transnational Repression and Other Malign Activities, September 12, 2025.</p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote </span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 9</dt>
	<dd id="fn9">
	<p>Canadian Centre for Cyber Security, “<a href="/en/guidance/targeted-manipulation-irans-social-engineering-and-spear-phishing-campaigns">Targeted manipulation: Iran's social engineering and spear phishing campaigns</a>,” December 20, 2024.</p>

	<p class="fn-rtn"><a href="#fn9-rf"><span class="wb-inv">Return to footnote </span>9<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 10</dt>
	<dd id="fn10">
	<p>Cybersecurity and Infrastructure Security Agency, “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-321a">Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities</a>,” November 19, 2021; Cybersecurity and Infrastructure Security Agency, “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-257a">Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations</a>,” September 14, 2022.</p>

	<p class="fn-rtn"><a href="#fn10-rf"><span class="wb-inv">Return to footnote </span>10<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 11</dt>
	<dd id="fn11">
	<p>Cybersecurity and Infrastructure Security Agency, “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-259a">Iran-Based Threat Actor Exploits VPN Vulnerabilities</a>,” September 15, 2020; Cybersecurity and Infrastructure Security Agency, “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a">IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities</a>,” December 18, 2024.</p>

	<p class="fn-rtn"><a href="#fn11-rf"><span class="wb-inv">Return to footnote </span>11<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 12</dt>
	<dd id="fn12">
	<p>Cybersecurity and Infrastructure Security Agency, “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-264a">Iranian State Actors Conduct Cyber Operations Against the Government of Albania</a>,” September 23, 2022.</p>

	<p class="fn-rtn"><a href="#fn12-rf"><span class="wb-inv">Return to footnote </span>12<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside><div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-malicious-cyber-threats-sd-wan-networks</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-malicious-cyber-threats-sd-wan-networks"/><title><![CDATA[Joint guidance on malicious cyber threats to SD-WAN networks]]></title><updated>2026-02-25T16:10:24Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7291" about="/en/news-events/joint-guidance-malicious-cyber-threats-sd-wan-networks" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>Malicious cyber threat actors are targeting Software-Defined Wide Area Networks (SD-WAN) networks used by organizations globally. The Canadian Centre for Cyber Security (Cyber Centre), a part of the Communications Security Establishment Canada (CSE), and international partners strongly encourage immediate action to ensure <abbr title="Software Defined Wide Area Network">SD-WAN</abbr>s are patched, hardened and investigated for potential compromise.</p>

<p>Consult the following for additional information and recommendations:</p>

<ul><li><a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">Australia’s Signals Directorate’s Australian Cyber Security Centre (ASD ACSC) CISCO <abbr title="Software Defined Wide Area Network">SD-WAN</abbr> threat hunt guide (PDF)</a></li>
	<li><a href="/en/alerts-advisories/al26-004-critical-vulnerability-affecting-cisco-catalyst-sd-wan-cve-2026-20127">Cyber Centre alert on this threat</a></li>
	<li><a href="/en/alerts-advisories/cisco-security-advisory-av26-166">Cyber Centre advisory on this threat</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk">Cisco’s advisory on this threat</a></li>
</ul><p>The Cyber Centre is monitoring the situation and can provide assistance and advice as required. If you believe your organization has been impacted or requires assistance, contact us by email at <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> or by phone at <a href="tel:+16139497048">613-949-7048</a> or <a href="tel:+18332923788">1‑833‑CYBER‑88</a>.</p>

<h2>Quote</h2>

<blockquote>We urge Canadian organizations and their network defenders to heed this warning, use the hunt guide, and patch. These malicious cyber threat actors are targeting organizations globally. Vigilance and immediate action will help us all harden our defences to get ahead of this threat.
<footer>Rajiv Gupta, Head of the Canadian Centre for Cyber Security</footer></blockquote>

<h2>Background</h2>

<p>The Cyber Centre has joined <abbr title="Australian Cyber Security Centre">ACSC</abbr> and the following other international partners in releasing guidance alerting of malicious cyber threat actors targeting <abbr title="Software Defined Wide Area Network">SD-WAN</abbr> networks used by organizations globally:</p>

<ul><li>New Zealand National Cyber Security Centre (NCSC-NZ)</li>
	<li>United Kingdom National Cyber Security Centre (NCSC-UK)</li>
	<li>United States National Security Agency (NSA)</li>
	<li>United States Cybersecurity and Infrastructure Security Agency (CISA)</li>
</ul><p>Threat actors have been observed using CVE-2026-20127 to add a malicious rogue peer. They have then conducted a range of follow-on actions to achieve root access and maintain persistent, long-term access to <abbr title="Software Defined Wide Area Network">SD-WAN</abbr> networks.</p>

<p><a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led Cisco SD-WAN Hunt Guide.pdf"><abbr title="Australian Cyber Security Centre">ACSC</abbr>’s hunt guide (PDF)</a> has been prepared based on observations from various investigations and details the tactics, techniques and procedures (TTPs) leveraged by these malicious actors. The hunt guide aims to support network owners and defenders to conduct detection and threat hunting activities and provides mitigation guidance to reduce the risk from the observed <abbr title="techniques and procedures">TTPs</abbr>.</p>

<h2>Mitigation advice</h2>

<p>The authoring agencies strongly urge network defenders to ensure <abbr title="Software Defined Wide Area Network">SD-WAN</abbr>s are fully patched (including for CVE-2026-20127) and to hunt for evidence of compromise detailed in the hunt guide. The guidance also urges organizations to review and implement <a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide">Cisco's <abbr title="Software Defined Wide Area Network">SD-WAN</abbr> hardening guidance.</a></p>

<p>To reduce the risks to your networks, Cisco’s <abbr title="Software Defined Wide Area Network">SD-WAN</abbr> hardening guidance should be reviewed in full. It includes advice on the following:</p>

<ul><li><strong>Network perimeter controls: </strong>Ensure control components are behind a firewall, isolate <abbr title="virtual private network">VPN</abbr> 512 interfaces, and use <abbr title="internet protocol">IP</abbr> blocks for manually provisioned edge <abbr title="internet protocols">IPs</abbr></li>
	<li><strong><abbr title="Software Defined Wide Area Network">SD-WAN</abbr> manager access:</strong> Replace the self-signed certificate for the web user interface</li>
	<li><strong>Control and data plane security:</strong> Use pairwise keying</li>
	<li><strong>Session timeout:</strong> Limit to the shortest period possible</li>
	<li><strong>Logging:</strong> Forward to a remote syslog server</li>
</ul><h2>Additional resources</h2>

<p>For more information on vulnerabilities, visit our <a href="https://www.cyber.gc.ca/en/alerts-advisories">Alerts and advisories page</a>.</p>

<p>For best practices, visit our <a href="https://www.cyber.gc.ca/en/guidance">Cyber security guidance page</a>.</p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/cse-calls-canadian-organizations-critical-infrastructure-providers-strengthen-defences-fourth-anniversary-russias-invasion-ukraine</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/cse-calls-canadian-organizations-critical-infrastructure-providers-strengthen-defences-fourth-anniversary-russias-invasion-ukraine"/><title><![CDATA[CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on fourth anniversary of Russia’s invasion of Ukraine]]></title><updated>2026-02-20T19:06:58Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7308" about="/en/news-events/cse-calls-canadian-organizations-critical-infrastructure-providers-strengthen-defences-fourth-anniversary-russias-invasion-ukraine" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Communications Security Establishment Canada (CSE) and its Canadian Centre for Cyber Security (Cyber Centre) are urging Canadian organizations to stay vigilant and strengthen their defences against malicious cyber threats as the four-year mark of Russia's full-scale invasion of Ukraine approaches.</p>

<p>Over the past four years, the Cyber Centre has observed pro-Russia cyber actors targeting countries, including Canada, that support Ukraine. These activities have affected government and military agencies, private and public sector organizations, and critical infrastructure networks in Canada. Russian cyber threat actors have also attempted to disrupt services to Canadians by targeting cloud-based platforms, supply chains, and Internet-facing systems, including through distributed denial of service (DDoS) attacks.</p>

<p>As we previously reported, we continue to see ideologically motivated, pro-Russia non-state cyber groups conducting malicious activity against perceived enemies. These groups are generally less sophisticated than state-sponsored actors but act independently, leading to unpredictability and a higher tolerance for risk.</p>

<p>Canadian organizations and critical infrastructure operators should remain vigilant to threats posed by cyber actors aligned with Russian interests and prepare for potential service disruptions, website defacement and increased ransomware activity. Operators of Internet-connected operational technology (OT) devices should remain alert, as these systems are easily discoverable and vulnerable to cyber threats.</p>

<p>We urge all Canadian organizations to implement appropriate measures now to defend against threats from Russian-aligned cyber actors.</p>

<h2>Recommended actions</h2>

<ul><li>Adopt the Cyber Centre's <a href="/en/cyber-security-readiness/cross-sector-cyber-security-readiness-goals-toolkit">Cross-Sector Cyber Security Readiness Goals</a></li>
	<li>Follow the Cyber Centre's guidance on:
	<ul><li><a href="/en/guidance/ransomware-playbook-itsm00099">Ransomware</a></li>
		<li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003"><abbr title="information technology">IT</abbr> incident response</a></li>
		<li><a href="/en/guidance/website-defacement-itsap00060">Website defacement</a></li>
		<li><a href="/en/guidance/distributed-denial-service-attacks-prevention-and-preparation-itsap80110">Distributed denial-of-service attacks</a></li>
	</ul></li>
	<li>Consult the Cyber Centre's <a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">top 10 security actions to protect Internet-connected networks and information</a> with special attention to:
	<ul><li>Consolidating, monitoring and defending Internet gateways</li>
		<li>Segmenting information</li>
		<li>Isolating web-facing applications</li>
	</ul></li>
	<li>Review joint guidance on:
	<ul><li><a href="/en/news-events/joint-guidance-secure-connectivity-principles-operational-technology">Secure connectivity principles for operational technology</a></li>
		<li><a href="/en/news-events/joint-guidance-creating-maintaining-definitive-view-your-operational-technology-architecture">Creating and maintaining a definitive view of your operational technology architecture</a></li>
		<li><a href="/en/news-events/joint-cyber-security-advisory-pro-russia-hacktivists-conducting-opportunistic-attacks-global-critical-infrastructure">Pro-Russia hacktivists conducting opportunistic attacks on global critical infrastructures</a></li>
	</ul></li>
	<li>Consult the Cyber Centre's <a href="https://www.canada.ca/en/communications-security/news/2025/11/backgrounder-malicious-cyber-activity-targeting-canadian-critical-infrastructure.html">backgrounder on malicious cyber activity targeting Canadian critical infrastructure</a> and <a href="/en/guidance/security-considerations-critical-infrastructure-itsap10100">security considerations for critical infrastructure,</a> focusing on:
	<ul><li>Isolating components, services and systems</li>
		<li>Maintaining and testing offline backups</li>
		<li>Developing an incident response plan</li>
		<li>Monitoring <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> environments and enabling logging</li>
	</ul></li>
	<li>Take note of the Cyber Centre's alert on <a href="/en/alerts-advisories/al25-016-internet-accessible-industrial-control-systems-ics-abused-hacktivists">Internet-accessible industrial control systems abused by hacktivists</a></li>
	<li>Review perimeter network systems for signs of suspicious activity</li>
	<li>Report cyber incidents to the Cyber Centre</li>
</ul><p>The Cyber Centre continues to share cyber threat information with Canadian critical infrastructure and government partners via protected channels throughout the year. We actively monitor the cyber threat environment in Canada and globally. Canadian organizations that believe they may have been targeted by cyber threat activity should contact the Cyber Centre by email at <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> or by phone at <a href="tel:18332923788">1-833-CYBER-88</a>.</p>

<h2>Related resources</h2>

<ul><li><a href="/en/guidance/national-cyber-threat-assessments">National Cyber Threat Assessments</a></li>
	<li><a href="/en/guidance/ransomware-threat-outlook-2025-2027">Ransomware Threat Outlook 2025-2027</a></li>
	<li><a href="/en/guidance/cyber-threat-canadas-water-systems-assessment-mitigation">Cyber threats to Canada's water systems</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/security-considerations-sims</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/security-considerations-sims"/><title><![CDATA[Security considerations for SIMs (ITSAP.10.021)]]></title><updated>2026-02-16T18:56:46Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7244" about="/en/guidance/security-considerations-sims" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>February 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.10.021</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>February 2026 | Awareness series</strong></p>
</div>
</div>

<p>A subscriber identity module (SIM) card is an electronic chip that stores mobile network user information, such as your phone number and authentication key used to grant access to the cellular network. A SIM card is also referred to as a universal integrated circuit chip (UICC), which is the modern day version of the original SIM card. Although the UICC is the technical term, it continues to be referred to as the SIM card.</p>

<p>Because of the information they store, SIMs can be valuable targets for threat actors. This publication aims to help you understand the main threat, known as SIM swapping, and provide you with recommendations to better protect yourself.</p>

<h2>On This Page</h2>

<ul><li><a href="#Differences">Difference between a SIM card and an eSIM</a></li>
	<li><a href="#Swap">SIM swapping</a></li>
	<li><a href="#How-swap">How SIM swapping happens</a></li>
	<li><a href="#Consequences">Consequences of SIM swapping</a></li>
	<li><a href="#Signs">The signs of SIM swapping</a></li>
	<li><a href="#Protect">How to protect your SIM</a></li>
	<li><a href="#Learn-more">Learn more</a></li>
</ul><h2 class="text-info" id="Differences">Difference between a SIM card and an eSIM</h2>

<p>A SIM card is a physical card inserted into a device. It uses information stored within it to identify and authenticate the user on a mobile network. An embedded SIM (eSIM) is a non-removable electronic chip integrated into the device, making it easy to configure and activate remotely. An eSIM is capable of storing several SIM profiles at once.</p>

<h3>Considerations for eSIMs</h3>

<p>Providers are increasingly offering eSIMs as a format due to convenience. However, there are risks associated with them. eSIMs can make it easier for threat actors to:</p>

<ul><li>compromise and gain access to your mobile accounts</li>
	<li>conduct social engineering and remote attacks, as they can be digitally generated and electronically transferred</li>
	<li>compromise multiple profiles at a time</li>
	<li>leverage malicious software through arbitrary code execution</li>
</ul><h2 class="text-info" id="Swap">SIM swapping</h2>

<p>SIM swapping is an attack against your mobile phone account that transfers your phone number to a threat actor’s SIM card or eSIM without your knowledge or permission. Some other common terms used for SIM swapping include SIM jacking, SIM napping and SIM porting.</p>

<p>If a threat actor is successful with a SIM swapping attack, they can use their device to control communications meant for you, including through impersonation. This scam is also used to access other accounts, such as your bank account, that might use your phone number as a method to verify your identity.</p>

<h2 class="text-info" id="How-swap">How SIM swapping happens</h2>

<p>Threat actors leverage the following methods to conduct SIM swapping attacks.</p>

<h3>Calling your provider</h3>

<p>Threat actors attempt SIM swapping using a similar process that providers follow when they transfer a user’s phone number from their old device to a new one during an upgrade. Threat actors can try to transfer a victim’s phone number to their own device by calling the mobile network provider and fraudulently impersonate the victim. They can bypass common security questions used to verify your identity by researching the personal information you’ve shared online.</p>

<h3>Stealing your credentials</h3>

<p>Threat actors can also try to access your mobile account details on the provider’s website to initiate and authorize a SIM swap. They use credential stuffing, where criminals use stolen usernames and passwords, or collect personal information that has been shared online and on social media to answer security questions during account authentication.</p>

<h3>Exploiting insider access</h3>

<p>SIM swapping can occur due to insider threat. Employees and other insiders with internal access to a mobile service provider can falsely authorize changes to customer accounts and sell swapped SIMs.</p>

<h2 class="text-info" id="Consequences">Consequences of SIM swapping</h2>

<p>If you are a victim of SIM swapping, a threat actor will receive your phone calls, messages and notifications on their device. Since mobile devices are often used as an authentication measure, a threat actor can impersonate you and gain access to your accounts and information, putting both you and your organization at risk.</p>

<h3>Individual risks</h3>

<p>As an individual, being a victim of SIM swapping possesses several risks. A threat actor can:</p>

<ul><li>change and steal other account credentials</li>
	<li>prevent you from accessing and managing your accounts</li>
	<li>steal your money and financial information</li>
	<li>control and handle information managed through personal accounts</li>
	<li>impersonate you to spread the scam to your contacts</li>
</ul><h3>Organizational risks</h3>

<p>Depending on your organization’s posture on device-use (for example, company-owned or personal devices) and remote work, it is important to evaluate the level of sensitivity of the data being handled. If threat actors compromise a mobile service that handles your organization’s information, they can:</p>

<ul><li>impersonate the individual behind the account</li>
	<li>spread phishing scams and malware to other accounts and devices</li>
	<li>gain access to sensitive and confidential information</li>
	<li>compromise systems and processes</li>
	<li>damage your business’ reputation and trust with customers and partners</li>
</ul><h2 class="text-info" id="Signs">The signs of SIM swapping</h2>

<p>There are signs you can look out for that signify that a threat actor may be trying to or has swapped your SIM. These include:</p>

<ul><li>abnormal reduction in messages on your device</li>
	<li>lack of verification messages when using multi-factor authentication (MFA)</li>
	<li>phishing messages asking to verify your account with a PIN or clicking a link to login</li>
	<li>messages indicating activity on your account that you don’t remember</li>
	<li>changes to account information you did not make</li>
	<li>losing access to online accounts (for example, banking, email and social media)</li>
	<li>transactions on accounts that are unknown</li>
	<li>disconnection from cellular network</li>
</ul><p>If your SIM has been successfully swapped, you will lose cellular service as well as Wi-Fi calling capabilities. It is important to note that being connected to Wi-Fi can keep your data connection active. If you switch between cellular service and Wi-Fi automatically and frequently, you may not immediately recognize when your SIM is compromised.</p>

<h2 class="text-info" id="Protect">How to protect your SIM</h2>

<p>It is important to take preventative security measures to reduce the risks of being a victim of SIM swapping. The best ways to protect yourself from SIM swapping include:</p>

<ul><li>using any additional verification requirements your mobile provider offers to help protect your account</li>
	<li>requesting your mobile provider to enable port protection or a SIM lock on your accounts, if available</li>
	<li>enabling MFA that includes methods other than those that rely on your phone number (for example, a PIN, biometric or authentication app)</li>
	<li>keeping sensitive information related to account security questions private (for example, date of birth, home address and mother’s maiden name)</li>
	<li>using separate and unique email addresses for financial accounts and social media</li>
	<li>creating different passwords and passphrases for each of your accounts</li>
	<li>keeping up with your provider’s security advisories and Cyber Centre guidance and alerts</li>
</ul><h3>Organization-specific security measures</h3>

<p>Alongside the security measures mentioned, there are some specific security practices your company should consider to help prevent SIM swapping.</p>

<ul><li>Have a clear device usage policy for what data can be handled on certain devices</li>
	<li>Enforce cellular contracts for company-owned devices that prohibit account migration without your organization’s approval</li>
	<li>Implement mandatory maintenance sessions for company-owned devices</li>
	<li>Use authenticator applications that generate one-time passcodes for MFA rather than verification measures connected to the phone number (for example, text message and phone call)</li>
	<li>Deploy hardware security keys to secure and authenticate highly sensitive accounts if necessary</li>
	<li>Classify and label data according to sensitivity levels and clearly establish how data belonging to each level should be handled</li>
	<li>Offer cyber security training</li>
</ul><h2 class="text-info" id="Learn-more">Learn more</h2>

<ul><li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="38a1fb42-00d7-4f06-89ad-c73fa0e72ce9" href="/en/guidance/using-your-mobile-device-securely-itsap00001">Using your mobile device securely (ITSAP.00.001)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="4869097e-e33a-4268-9ada-1e0ba0a027ed" href="/en/guidance/end-user-device-security-bring-your-own-device-byod-deployment-models-itsm70003">End user device security for Bring-Your-Own-Device (BYOD) deployment models (ITSM.70.003)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="27e5d9ca-0c82-4d31-90a0-207c22c7652b" href="/en/guidance/social-engineering-itsap00166">Social engineering (ITSAP.00.166)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="e9e04d2f-d1d6-4f04-b897-95e9ca060c7f" href="/en/guidance/rethink-your-password-habits-protect-your-accounts-hackers-itsap30036">Rethink your password habits to protect your accounts from hackers (ITSAP.30.036)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="8d072457-288e-4bd1-a076-da037de9ad03" href="/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks">Don’t take the bait: Recognize and avoid phishing attacks (ITSAP.00.101)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="df4d897c-c726-4e48-8901-408ba2bdf6d3" href="/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/geekweek/geekweek-11</id><link rel="alternate" href="https://cyber.gc.ca/en/geekweek/geekweek-11"/><title><![CDATA[GeekWeek 11]]></title><updated>2026-02-13T13:56:36Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7277" about="/en/geekweek/geekweek-11" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><img alt="geekweek banner" class="img-responsive mrgn-bttm-lg" src="/sites/default/files/images/geekweek-11-ef-1170x347.png" /></p>

<h2 class="page-header">Detection and Deception</h2>

<p>GeekWeek provides an opportunity for participants to take few days away from their day-to-day and work with public sector, industry, critical infrastructure and international partners to explore innovative ideas in the cyber security space.</p>

<div class="row">
<section class="col-md-4 col-sm-5 pull-right well well-sm mrgn-tp-lg"><h3 class="mrgn-tp-sm">Venue</h3>
<img alt="Photo of Vanier Facility" class="img-responsive" src="/sites/default/files/images/vanier-edifice-vanier_1.jpg" /><p class="mrgn-tp-md">Canadian Centre for Cyber Security<br />
1625 Vanier Parkway, Ottawa<br />
ON K1L 7P1</p>
</section><div class="col-md-8 col-sm-7 mrgn-tp-lg">
<h2 class="page-header">Event date</h2>

<p>May 27 to June 5, 2026</p>

<p>If you’re interested in future Geek events, reach out to <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>

<div class="clearfix"> </div>

<h2 class="page-header mrgn-tp-lg">Registration information</h2>

<p>Given the technical nature of the workshop, GeekWeek is an <strong>invitation-only event</strong>.</p>
</div>
</div>

<h2 class="page-header">Keynote speaker</h2>

<p>To be confirmed.</p>

<h2 class="page-header">Participating organizations</h2>

<p class="mrgn-bttm-lg">To be confirmed.</p>

<h2 class="page-header">Topics and themes</h2>

<p>The following topics and themes have been proposed for GeekWeek 11.</p>

<ul class="list-unstyled"><li>
	<details><summary>Cyber physical systems</summary><ul><li>Industrial spectrum monitoring</li>
		<li>Industrial control systems and operational technology security for energy</li>
		<li>Early warning threat sharing for industrial control systems and operational technology security environments</li>
		<li>Connected vehicules</li>
		<li>Hunting the hunters</li>
		<li>Firmware security</li>
	</ul></details></li>
	<li>
	<details><summary>Cyber toolboxes and analytical environments</summary><ul><li>Memory analysis</li>
		<li>Industrial control systems honeypot</li>
		<li>Home modems and routers protection</li>
		<li>Internet scanner</li>
		<li>Digital Forensics and Incident Response in Cybersecurity</li>
	</ul></details></li>
	<li>
	<details><summary>Cyber threat hunting</summary><ul><li>Detecting and decoding advanced persistent threat (APT) malware</li>
		<li>Malicious infrastructure and threat hunting</li>
		<li>Cross-organization data harvesting and analytics</li>
		<li>It’s all about money</li>
	</ul></details></li>
	<li>
	<details><summary>Cyber threat analytics</summary><ul><li>Cyber security posture</li>
		<li>Cyber threat storytelling (a.k.a it’s all about graphs!)</li>
		<li>Using large language models for malware analysis</li>
		<li>Malicious email identification and triage enhancement with large language models (LLMs)</li>
		<li>Cyber news aggregation and summarization with large language models</li>
		<li>Automated signature generation</li>
		<li>AI-powered fraud prevention for Canadians</li>
		<li>Monitoring, analytics and scaling security in the cloud</li>
	</ul></details></li>
	<li>
	<details><summary>Open-source solutions: Giving back to the cyber security community</summary><ul><li>Cyber range development</li>
		<li>Cyber tools development: Borealis/Clue, Chameleon/Beever, Howler</li>
	</ul></details></li>
	<li>
	<details><summary>Cyber defence turnkey solutions</summary><ul><li>Cyber defense Fly-Away kit</li>
		<li>Secure operations centre (SOC) in a box
		<ul><li>Platform</li>
			<li>Pipeline for data collection</li>
			<li>Analytics</li>
			<li>Machine learning-based analytics</li>
		</ul></li>
	</ul></details></li>
</ul><p>For more general information about GeekWeek, visit the <a href="/en/geekweek">GeekWeek page</a>.</p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-threat-marine-transportation</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-threat-marine-transportation"/><title><![CDATA[The cyber threat to marine transportation]]></title><updated>2026-02-12T15:03:18Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7019" about="/en/guidance/cyber-threat-marine-transportation" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#judgements">Key judgements</a></li>
	<li><a href="#intro">Introduction</a></li>
	<li><a href="#digitalization-threat">Digitalization is expanding the sector threat surface</a></li>
	<li><a href="#cybercriminals-threat">The threat from cybercriminals</a></li>
	<li><a href="#threat-state-sponsored">The threat from state-sponsored cyber actors</a></li>
	<li><a href="#treat-non-state">The threat from non-state cyber threat actors</a></li>
	<li><a href="#outlook">Outlook</a></li>
	<li><a href="#fn">Endnotes</a></li>
</ul></details></section><section><div>
<h2 class="text-info">Audience</h2>

<p>This report is part of a series of cyber threat assessments focused on Canada’s critical infrastructure. It is intended for leaders in the marine transportation sector, cyber security professionals with maritime infrastructure to protect, and the general reader with an interest in the cyber security of critical infrastructure. For additional information on technical mitigation of these threats, consult the <a href="https://www.cyber.gc.ca/en/guidance">Canadian Centre for Cyber Security’s (Cyber Centre) guidance</a> or contact the Cyber Centre.</p>
</div>

<div>
<h2 class="text-info">Contact</h2>

<p>For follow-up questions or issues, contact the Cyber Centre by email at <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>
</div>

<div>
<h2 class="text-info">Assessment base and methodology</h2>

<p>The key judgements in this assessment rely on reporting from multiple sources, both classified and unclassified. The judgements are based on the knowledge and expertise in cyber security of the Cyber Centre. Defending the Government of Canada’s information systems provides the Cyber Centre with a unique perspective to observe trends in the cyber threat environment, which also informs our assessments. The Communications Security Establishment Canada’s foreign intelligence mandate provides us with valuable insight into adversary behaviour in cyberspace. While we must always protect classified sources and methods, we provide the reader with as much justification as possible for our judgements.</p>

<p>Our judgements are based on an analytical process that includes evaluating the quality of available information, exploring alternative explanations, mitigating biases and using probabilistic language. We use terms such as “we assess” or “we judge” to convey an analytic assessment. We use qualifiers such as “possibly,” “likely,” and “very likely” to convey probability.</p>
</div>

<div>The assessments and analysis are based on information available as of <strong>August 31, 2024</strong>.</div>

<h3>Estimative language</h3>

<div class="panel panel-default col-md-12">
<div class="panel-body">
<figure><p class="mrgn-bttm-lg">The chart below matches estimative language with appropriate percentages. these percentages are not derived via statistical analysis, but are based on logic, available information, prior judgements, and methods that increase the accuracy of estimates.</p>
<img alt="Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/tarp-language-chart-transparent-e.png" /><details class="brdr-tp brdr-rght brdr-bttm brdr-lft mrgn-bttm-sm"><summary>Long description - Estimative language chart </summary><ul class="list-unstyled mrgn-tp-md"><li>1 to 9% Almost no chance</li>
	<li>10 to 24% Very unlikely/very improbable</li>
	<li>25 to 39% Unlikely/improbable</li>
	<li>40 to 59% Roughly even chance</li>
	<li>60 to 74% Likely/probably</li>
	<li>75 to 89% Very likely/very probable</li>
	<li>90 to 99% Almost certainly</li>
</ul></details></figure></div>
</div>
<span class="clearfix"></span></section><section><h2 class="text-info" id="judgements">Key judgements</h2>

<ul><li>We assess that financially motivated cybercriminals are the most likely cyber threat to affect the marine transportation sector. We assess that cybercriminals will almost certainly continue to exploit marine transportation and supporting organizations through extortion tied to ransomware, in addition to selling or exploiting stolen personal or proprietary business information. We assess that ransomware is almost certainly the most likely disruptive cyber threat to affect marine transportation operations.</li>
	<li>The marine transportation sector’s importance to Canada’s economic and strategic supply chains makes it a high priority target for state-sponsored cyber threat activity. We assess that state-sponsored cyber threat actors will very likely continue targeting the Canadian marine transportation sector and supporting organizations to steal logistical and operational data that can be leveraged for economic advantage, and to steal intellectual property that can be used to support state commercial, military, and intelligence priorities.</li>
	<li>We assess that the marine transportation sector is a strategic target for disruption or destruction by state-sponsored cyber threat actors. However, we judge that these actors would likely only intentionally disrupt or damage Canadian marine transportation infrastructure in times of crisis or conflict between states.</li>
	<li>We assess that non-state cyber threat actors will very likely continue targeting the Canadian marine transportation sector in connection to international events and conflicts, primarily though distributed denial-of-service (DDoS) attacks and website defacements.</li>
</ul></section><section><h2 class="text-info" id="intro">Introduction</h2>

<p>The marine transportation sector (MTS) plays a pivotal role in Canada’s economy by supporting the movement of goods and travelers to and from domestic and international markets. Marine transportation and its supporting activities contributed over $8.3 billion to Canada’s gross domestic product in 2022 and accounted for 24% of Canadian merchandise imports and 18% of Canadian merchandise exports in 2023.<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> Marine transportation is a key method of connection for communities and industries across Canada’s expansive geography and is the sole option for resupply in some northern communities.<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup> The <abbr title="marine transportation sector">MTS</abbr>’s importance to Canada makes the cyber security of Canadian ports, vessels, supporting infrastructure, and the organizations that operate them a matter of critical importance for Canada’s national and economic security.</p>

<p>Cyber threat activity against the <abbr title="marine transportation sector">MTS</abbr> can have significant consequences. Cyber-enabled fraud and scams are costly for victims,<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup> and disruptive cyber threat activity such as ransomware can interfere with marine transportation operations, implicating safety and causing costly disruptions to supply chains. For example, in 2017, the NotPetya wiper malware affected organizations worldwide, including global shipping company A.P. Møller-Maersk.<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup> Maersk was forced to entirely rebuild the affected computer systems and experienced global operational interruptions. Maersk experienced an estimated $250 to $300 million USD in damages, and unknown additional damages on the part of Maersk customers stemming from supply chain interruptions and shipping delays.<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup></p>
</section><!--** TOP OF PAGE ******--><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="digitalization-threat">Digitalization is expanding the sector threat surface</h2>

<p>The <abbr title="marine transportation sector">MTS</abbr> is digitalizing its operations to improve efficiency and address environmental challenges such as decarbonization. Digitalization refers to the incorporation of data-informed decision making, connected technology, and automation throughout the scope of marine transportation operations. Digitalization is supported by the wide deployment of sensors that collect operational and environmental data—for example, smart buoys, video-based container recognition systems, and shipboard sensors—that provide enhanced situational awareness and allow for centralized management over marine transportation operations.<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup> It also involves the adoption of digitally transformed operational technology (OT) and industrial systems within ports and on vessels, such as ship-to-shore cranes and physical access control systems.</p>

<p>Digitalization is expanding the <abbr title="marine transportation sector">MTS</abbr>’s threat surface. Increased adoption of connected <abbr title="operational technology">OT</abbr> systems provides cyber threat actors more opportunities to exploit those systems to disrupt their functioning, or to use them to gain access to business or <abbr title="operational technology">OT</abbr> networks. New methods of connection such as very short aperture terminal satellite Internet connections extend the reach of cyber threat actors to vessels and <abbr title="operational technology">OT</abbr> systems even in remote areas. Further, the growing volume of operational and environmental data being collected and shared within and across organizations, and the systems supporting that growth, are valuable targets for commercial or strategic espionage and potential targets for disruption.</p>
<!-- change styling? -->

<div class="panel panel-primary">
<header class="panel-heading"><h3 class="panel-title">Position, navigation and timing systems are vulnerable to interference</h3>
</header><div class="panel-body">
<p>The <abbr title="marine transportation sector">MTS</abbr> relies on the integrity and availability of various position, navigation and timing (PNT) systems, including the Automatic Identification System (AIS) and the Global Positioning System (GPS). Accurate <abbr title="position, navigation and timing">PNT</abbr> information is critical for safe vessel navigation and is essential for new technologies such as autonomous vessels and smart port systems. AIS and <abbr title="Global Positioning System">GPS</abbr> signals are vulnerable to interference because they typically lack encryption or any mechanism for validating the content or originator of a signal.</p>

<p>Interference with <abbr title="position, navigation and timing">PNT</abbr> systems falls into 2 categories:</p>

<ul><li><strong>Signal jamming</strong> is a form of <strong>denial-of-service attack</strong> that prevents a target system from receiving an intended communication by overwhelming the receiver using a malicious signal, making <abbr title="position, navigation and timing">PNT</abbr> information inaccessible to the victim.</li>
	<li><strong>Signal spoofing</strong> is a form of <strong>data manipulation</strong> that deceives a target system into accepting a malicious signal rather than the intended communication. This can result in incorrect location information being provided to a user, which may cause them to adjust course and potentially navigate into dangerous areas.</li>
</ul><p>There has been an increase in the number of reported <abbr title="position, navigation and timing">PNT</abbr> interference incidents affecting civilian marine and air transportation in the past several years. Some reported incidents are likely incidental effects of military electronic warfare measures near conflict areas, including around Ukraine. However, <abbr title="position, navigation and timing">PNT</abbr> interference may also be used to hide criminal maritime activities or support state geopolitical objectives.<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup> For example, in July 2019, the British-flagged Stena Impero was seized by Iran in the Strait of Hormuz for violating Iranian territorial waters. Analysis by security researchers suggests that the Stena Impero may have diverted course into Iranian territorial waters because they were provided spoofed positional information through <abbr title="Automatic Identification System">AIS</abbr>, possibly to justify seizure of the vessel by Iran.<sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup></p>
</div>
</div>

<p>As the <abbr title="marine transportation sector">MTS</abbr> continues to digitalize, the associated threat surface from proprietary information and data being shared with third-party service providers expands.</p>

<div class="well">
<p>We assess that medium and high-sophistication threat actors will very likely attempt to exploit third parties to steal sector information, or to gain access to organizations within the sector by exploiting the digital supply chain.</p>
</div>

<p>Arrangements where suppliers have remote access to organizational networks, or where they provide a product with consistent data exchange between organizations, increase the opportunities for supplier-based compromise by cyber threat actors.<sup id="fn9-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup> This may include organizations that provide information technology services such as cloud or managed service providers, software-as-a-service providers, and suppliers for digitally transformed technology.</p>
</section><!--** TOP OF PAGE ******--><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="cybercriminals-threat">The threat from cybercriminals</h2>

<div class="well">
<p>We assess that financially motivated cybercriminals are the most likely cyber threat to affect the <abbr title="marine transportation sector">MTS</abbr>. We assess that cybercriminals will almost certainly continue to exploit marine transportation and supporting organizations through extortion tied to ransomware, in addition to selling or exploiting stolen personal or proprietary business information.</p>
</div>

<p>The <abbr title="marine transportation sector">MTS</abbr> is an attractive target for extortion by cybercriminals because of the economic importance of supply chains and the dependence of its clients on the continuity of shipping operations. Some cybercriminals specifically target organizations such as ports or shipping companies that may be willing to pay large ransoms to recover from disruptions as quickly as possible. However, most cybercriminal activity opportunistically targets organizations regardless of their size by exploiting vulnerable Internet-exposed devices or through bulk phishing or password spraying campaigns.<sup id="fn10-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup></p>

<h3>Top 10 ransomware threats to Canada in 2024 by rank</h3>

<ol class="colcount-sm-2"><li>
	<p>AKIRA<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
	<li>
	<p>PLAY<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
	<li>
	<p>MEDUSA<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
	<li>
	<p>LOCKBIT<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
	<li>
	<p>BLACK BASTA<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
	<li>
	<p>RANSOMHUB<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
	<li>
	<p>CACTUS<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-warning">Unknown</span></p>
	</li>
	<li>
	<p>CL0P<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-danger">No</span></p>
	</li>
	<li>
	<p>HUNTERS INTERNATIONAL<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
	<li>
	<p>QILIN<br /><strong>Ransomware-as-a-service:</strong> <span class="label label-success">Yes</span></p>
	</li>
</ol><p>Cybercriminals are continuously evolving their tactics to increase their ability to extract profit from victim organizations. Illicit marketplaces for cybercrime tools and services reduce the barrier to entry for cybercriminal activity, and the proliferation of prebuilt cyber tools such as <strong>ransomware-as-a-service (RaaS)</strong> variants increases the impact even low sophistication cybercriminals can have on their victims.<sup id="fn10a-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup> In the <abbr title="ransomware-as-a-service">RaaS</abbr> model, a cybercrime group maintains their own version of ransomware and leases it to other cybercriminals in exchange for a portion of ransom payments they receive. In the January to March 2024 period, 8 of the top 10 most impactful ransomware variants by number and severity of incidents were assessed as being <abbr title="ransomware-as-a-service">RaaS</abbr>.<sup id="fn10b-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup></p>
<!-- subsection -->

<div>
<h3>Ransomware is the most likely disruptive threat to marine transportation</h3>

<div class="well">
<p>We assess that ransomware is almost certainly the most likely disruptive cyber threat to affect the <abbr title="marine transportation sector">MTS</abbr>.</p>
</div>

<p>Ransomware attacks can cause operational disruptions by preventing access to business systems and information, disrupting operational communications within or between organizations, or by preventing operators from accessing or safely operating industrial systems. Although the primary means of extortion against ransomware victims is data or device encryption, cybercriminals frequently use other methods to pressure victims into providing a ransom payment. This includes exfiltrating sensitive files and data prior to deploying the ransomware and threatening to sell the stolen information if payment is not received.<sup id="fn11-rf"><a class="fn-lnk" href="#fn11"><span class="wb-inv">Footnote </span>11</a></sup></p>

<p>There are several recent examples of ransomware attacks disrupting marine transportation operations. In July 2023, a ransomware attack against the Japanese Port of Nagoya caused the port to entirely stop its container operations for several days.<sup id="fn12-rf"><a class="fn-lnk" href="#fn12"><span class="wb-inv">Footnote </span>12</a></sup> The Nagoya Harbor Transportation Association disclosed that the attack was conducted with LockBit 3.0, one of the most widely deployed RaaS variants.<sup id="fn13-rf"><a class="fn-lnk" href="#fn13"><span class="wb-inv">Footnote </span>13</a></sup></p>

<p>Cybercriminals have also targeted organizations that provide managed services and software for clients across the <abbr title="marine transportation sector">MTS</abbr> and disrupted the availability of those services. In January 2023, a ransomware attack forced a Norwegian maritime software provider to shut down servers used by their ship management product.<sup id="fn14-rf"><a class="fn-lnk" href="#fn14"><span class="wb-inv">Footnote </span>14</a></sup> The outage affected 70 of the organization’s clients and approximately 1,000 vessels, with clients only able to access the software’s offline functionalities.<sup id="fn15-rf"><a class="fn-lnk" href="#fn15"><span class="wb-inv">Footnote </span>15</a></sup> We assess that cybercriminals will very likely continue targeting organizations that provide services to large numbers of clients within the <abbr title="marine transportation sector">MTS</abbr> to maximize the effects of their activity and to increase pressure on victims to provide ransom payment.</p>

<div class="panel panel-primary">
<header class="panel-heading"><h4 class="panel-title">Significant ransomware attacks against the marine transportation sector</h4>
</header><div class="panel-body">
<ul><li>In July 2021, a ransomware attack against a South African logistics company disrupted operations at container terminals in Durban, Ngqura, Port Elizabeth, and Cape Town. The Durban Port alone accounts for approximately 60% of all South African container traffic and was reduced to 10% of its operational capacity for almost a week.<sup id="fn16-rf"><a class="fn-lnk" href="#fn16"><span class="wb-inv">Footnote </span>16</a></sup></li>
	<li>In January 2022, a ransomware attack against European oil and gas organizations resulted in disruptions to port-based oil storage and transportation infrastructure, disrupting oil and gas supply chains.<sup id="fn17-rf"><a class="fn-lnk" href="#fn17"><span class="wb-inv">Footnote </span>17</a></sup></li>
	<li>In March 2023, a ransomware attack against a Dutch shipping company resulted in data related to business contracts and employee personal information being stolen.<sup id="fn18-rf"><a class="fn-lnk" href="#fn18"><span class="wb-inv">Footnote </span>18</a></sup></li>
	<li>In April 2023, a ransomware attack against a United States (U.S.) shipbuilding company Fincantieri Marinette Marine resulted in short-term production delays and the unauthorized disclosure of personal information for over 16,000 individuals.<sup id="fn19-rf"><a class="fn-lnk" href="#fn19"><span class="wb-inv">Footnote </span>19</a></sup></li>
</ul></div>
</div>
</div>

<div>
<h4>Data theft supports additional cybercriminal activity</h4>

<p>In addition to directly defrauding or extorting victims, cybercriminals benefit from stealing and exploiting stolen organizational data to conduct further threat activity against the victim organization, its business partners, and employees. For example, stolen information related to organizational devices and networks can be used to plan additional compromises, and information on an organization’s business plans and activities can be used to craft convincing lures for phishing emails against clients and employees. Stolen information may also be sold through dark web forums to other cybercriminals, competitor organizations, or state-sponsored cyber threat actors. In a limited number of cases, cybercriminals have used network access and stolen information to facilitate physical criminal operations such as cargo theft and smuggling.<sup id="fn20-rf"><a class="fn-lnk" href="#fn20"><span class="wb-inv">Footnote </span>20</a></sup></p>
</div>
</section><!--** TOP OF PAGE ******--><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="threat-state-sponsored">The threat from state-sponsored cyber actors</h2>

<div class="well">
<p>The <abbr title="marine transportation sector">MTS</abbr>’s importance to Canada’s economic and strategic supply chains makes it a high-priority target for state-sponsored cyber threat activity.</p>
</div>

<p>State-sponsored cyber threat actors are capable of highly sophisticated threat activity that is difficult to detect and attribute and may maintain persistence within compromised environments for years before being detected.<sup id="fn21-rf"><a class="fn-lnk" href="#fn21"><span class="wb-inv">Footnote </span>21</a></sup> State-sponsored threat actors, including from the People’s Republic of China (PRC), Russia, and Iran, have consistently targeted the <abbr title="marine transportation sector">MTS</abbr> for espionage, to intimidate or project power against adversaries, and to disrupt adversary commercial and military supply chains.</p>

<div>
<h3>Espionage for commercial and strategic advantage</h3>

<div class="well">
<p>We assess that state-sponsored cyber threat actors will very likely continue targeting the Canadian <abbr title="marine transportation sector">MTS</abbr> and supporting organizations to steal logistical and operational data that can be leveraged for economic advantage, and to steal intellectual property that can be used to support state commercial, military, and intelligence priorities.</p>
</div>

<p>Foreign states can exploit stolen logistical and operational information from the <abbr title="marine transportation sector">MTS</abbr>, including data on the movement of goods and people, business development plans, and other forms of proprietary information. This information may provide foreign industry competitive advantage or leveraged for economic or diplomatic advantage over Canada in bilateral relations such as trade negotiations.<sup id="fn22-rf"><a class="fn-lnk" href="#fn22"><span class="wb-inv">Footnote </span>22</a></sup> Likely targets for state-sponsored commercial espionage include port authorities, port terminal operators, shipping lines, regulators, and organizations involved in the sharing, storage, or analysis of marine transportation data.</p>

<p>Stolen intellectual property and research information from Canada’s robust ship building, marine research, and innovation base can be directly leveraged by foreign states to improve the efficiency and competitiveness of foreign industry or sold to third parties to co-opt the financial gain Canadian organizations would have realized through commercializing their intellectual property. State-sponsored actors have demonstrated a particular interest in intellectual property and research information with a dual-use military application or that would otherwise support foreign state interests, even if the intent of the research is not explicitly military in nature. This may include, for example, research related to the use of drones in marine operations, improving the ability for vessels to operate in arctic conditions, or measuring and predicting environmental changes in the Arctic. Likely targets for state-sponsored espionage targeting intellectual property includes ship builders, research and innovation hubs, and university researchers.</p>

<div class="panel panel-primary">
<header class="panel-heading"><h4 class="panel-title">Examples of state-sponsored activity against the marine transportation sector</h4>
</header><div class="panel-body">
<ul><li>In January and February 2018, PRC threat actors stole data from an organization contracted by the U.S. Navy related to submarines and undersea warfare.<sup id="fn23-rf"><a class="fn-lnk" href="#fn23"><span class="wb-inv">Footnote </span>23</a></sup></li>
	<li>In March 2019, security researchers reported that PRC state-sponsored threat actors targeted over 20 universities worldwide attempting to steal maritime research with military application.<sup id="fn24-rf"><a class="fn-lnk" href="#fn24"><span class="wb-inv">Footnote </span>24</a></sup></li>
	<li>In March 2023, security researchers attributed malware found in several European commercial cargo shipping companies to PRC advanced persistent threat group Mustang Panda.<sup id="fn25-rf"><a class="fn-lnk" href="#fn25"><span class="wb-inv">Footnote </span>25</a></sup></li>
</ul></div>
</div>
</div>
<!--** TOP OF PAGE ******-->

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div>
<h3>Pre-positioning disruptive or destructive cyber capabilities</h3>

<div class="well">
<p>We assess that the <abbr title="marine transportation sector">MTS</abbr> is a strategic target for disruption or destruction by state-sponsored cyber threat actors.<sup id="fn26-rf"><a class="fn-lnk" href="#fn26"><span class="wb-inv">Footnote </span>26</a></sup></p>
</div>

<p>However, we judge that these actors would likely only intentionally disrupt or damage Canadian marine transportation infrastructure in times of crisis and conflict between states. Disruptive or destructive cyber threat activity against the <abbr title="marine transportation sector">MTS</abbr> by state-sponsored actors may be used to intimidate and demoralize the public, to disrupt economic and strategic supply chains, or to damage or destroy marine transportation infrastructure. State-sponsored actors pre-position for this activity by identifying and gaining access to Internet-connected <abbr title="operational technology">OT</abbr> systems, or IT networks from which they can laterally move to <abbr title="operational technology">OT</abbr> systems. Once in the target network, they collect information on assets within the network to identify opportunities for disruptive or destructive action. Likely targets for state-sponsored pre-positioning and disruption include connected <abbr title="operational technology">OT</abbr> and infrastructure at major Canadian ports and supply chain bottlenecks, especially those that may be involved in military mobilization.<sup id="fn27-rf"><a class="fn-lnk" href="#fn27"><span class="wb-inv">Footnote </span>27</a></sup></p>

<div class="well">
<p>We assess that state-sponsored cyber threat actors are almost certainly improving their capacity to disrupt or destroy adversary critical infrastructure through active reconnaissance including network intrusion, developing disruptive tools and techniques, and maintaining access against targets and systems of interest.</p>
</div>

<p>On February 7, 2024, the Cyber Centre and international partners released a joint advisory about PRC Volt Typhoon state-sponsored cyber threat actors compromising and maintaining access to U.S. critical infrastructure, including within the <abbr title="marine transportation sector">MTS</abbr>.<sup id="fn28-rf"><a class="fn-lnk" href="#fn28"><span class="wb-inv">Footnote </span>28</a></sup> The advisory assesses with high confidence that Volt Typhoon activity has aimed to pre-position cyber capabilities to “enable the disruption of <abbr title="operational technology">OT</abbr> functions across multiple critical infrastructure sectors” in the event of conflict. Volt Typhoon activity has been noted by private sector partners as early as May 2023, targeting sectors including manufacturing, government, and marine transportation. <sup id="fn29-rf"><a class="fn-lnk" href="#fn29"><span class="wb-inv">Footnote </span>29</a></sup></p>

<div class="well">
<p>We assess that the direct threat to Canada’s critical infrastructure from PRC state-sponsored threat actors is likely lower than that to U.S. infrastructure. However, given the integration of the Canadian and U.S. economies, malicious activity targeting U.S. infrastructure would likely also affect Canada. For example, disruptions to U.S. ports may result in shipments being diverted to Canadian ports, straining capacity and risking supply chain disruptions.</p>
</div>
</div>

<div>
<h3>Foreign ownership</h3>

<div class="well">
<p>We assess that state-sponsored cyber threat actors are likely to attempt to exploit foreign ownership connections to steal organizational data or attempt to gain network access to Canadian marine transportation organizations.</p>
</div>

<p>Some states, including the PRC and Russia, can legally compel their industries to cooperate with state intelligence services.<sup id="fn30-rf"><a class="fn-lnk" href="#fn30"><span class="wb-inv">Footnote </span>30</a></sup> This creates a threat that some foreign-owned digital service providers could be leveraged to access Canadian customers’ data, to access customer networks, or to deny service to customers to disrupt their operations.<sup id="fn31-rf"><a class="fn-lnk" href="#fn31"><span class="wb-inv">Footnote </span>31</a></sup></p>
</div>
</section><!--** TOP OF PAGE ******--><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="treat-non-state">The threat from non-state cyber threat actors</h2>

<div class="well">
<p>We assess that non-state cyber threat actors will very likely continue targeting the Canadian <abbr title="marine transportation sector">MTS</abbr> in connection to international events and conflicts, primarily though <abbr title="distributed denial-of-service">DDoS</abbr> attacks and website defacements.</p>
</div>

<p>Ideologically motivated non-state actors, sometimes referred to as hacktivists, have become an increasingly common feature of the cyber threat environment. In 2023, pro-Russia non-state (PRNS) actors were responsible for 2 wide-spread <abbr title="distributed denial-of-service">DDoS</abbr> attack campaigns against Canada intended to undermine Canadian support for Ukraine. These <abbr title="distributed denial-of-service">DDoS</abbr> attacks primarily affected the public facing websites of government and private organizations across the country, including within the <abbr title="marine transportation sector">MTS</abbr> and affecting several Canadian ports.<sup id="fn32-rf"><a class="fn-lnk" href="#fn32"><span class="wb-inv">Footnote </span>32</a></sup> However, <abbr title="distributed denial-of-service">DDoS</abbr> attacks by PRNS actors in September 2023 had additional disruptive effects to airports where check-in kiosks lost connectivity and caused delays. <sup id="fn33-rf"><a class="fn-lnk" href="#fn33"><span class="wb-inv">Footnote </span>33</a></sup></p>

<div class="panel panel-primary">
<header class="panel-heading"><h3 class="panel-title">Distributed denial-of-service attack primer</h3>
</header><div class="panel-body">
<p><strong>Volume-based <abbr title="distributed denial-of-service">DDoS</abbr> attacks</strong> disrupt access to a target system, often a public website, by flooding the server with requests to the point where it is unable to respond. Volume-based <abbr title="distributed denial-of-service">DDoS</abbr> attacks frequently rely on multiple attacker-controlled systems, often by using botnets, to provide sufficient traffic volumes to degrade the target system.</p>

<p><strong>Slow <abbr title="distributed denial-of-service">DDoS</abbr> attacks</strong> use fewer, more complex requests to occupy a server’s resources and prevent legitimate users from accessing it. Slow <abbr title="distributed denial-of-service">DDoS</abbr> attack traffic can be difficult to distinguish from legitimate traffic, making it difficult to detect and mitigate.</p>

<p><strong>Internet Protocol (IP) address range <abbr title="distributed denial-of-service">DDoS</abbr></strong> attacks target the full IP range of a target organization rather than being aimed towards a single server. By targeting the IP range, attackers can affect any of the target’s Internet-facing devices, including gateway devices, public facing web applications, and Internet-based interfaces for <abbr title="operational technology">OT</abbr> systems.</p>
</div>
</div>

<p>Some non-state actors have attempted to maximize the disruptive impact of their DDoS attacks by targeting Internet-exposed IT infrastructure. This activity increases the risk that DDoS attacks will inadvertently affect other Internet-exposed systems and services, including edge devices, web-based applications such as Port Information Management Systems, and Internet-facing interfaces for connected industrial systems.</p>

<p>In May 2024, the Cyber Centre and partners issued a joint advisory warning of PRNS actors targeting Internet-exposed industrial systems. These actors opportunistically identify targets using publicly available scanning tools to search for Internet-exposed systems with vulnerable configurations. For example, they may look for systems that use default or weak passwords and without multi-factor authentication.<sup id="fn34-rf"><a class="fn-lnk" href="#fn34"><span class="wb-inv">Footnote </span>34</a></sup></p>

<div class="well">
<p>We assess that non-state threat actors are very likely to continue developing their capacity to disrupt Internet-exposed industrial systems, and likely that they will attempt to disrupt Internet-exposed industrial systems within Canada.</p>
</div>

<p>It is important to note that non-state cyber threat actors may not have the expertise to correctly identify or understand the system they have compromised, may exaggerate claims of disruptive effects, and may entirely fabricate claims that they have compromised or disrupted Internet-exposed <abbr title="operational technology">OT</abbr>. False or exaggerated claims can serve to build the reputation of the groups involved and may still have a disruptive effect by causing fear and degrading trust in the system.</p>
</section><!--** TOP OF PAGE ******--><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="outlook">Outlook</h2>

<p>The cyber security of Canada’s <abbr title="marine transportation sector">MTS</abbr> is critical for Canada’s national and economic security. The <abbr title="marine transportation sector">MTS</abbr>’s economic and strategic importance to Canada also makes it a compelling target for cyber threat actors with financial, ideological, or disruptive intent. As the sector continues to digitalize its operations and its threat surface grows, cyber threat actors will have additional opportunities to compromise marine transportation organizations and new ways in which to maximize the disruptive or destructive impact of their activities. This threat is compounded by the sectors already complex and interconnected nature, which creates risk that disruptions to key organizations or systems within the <abbr title="marine transportation sector">MTS</abbr> will widely affect the safety and continuity of marine transportation operations.</p>

<p>Many cyber threats can be mitigated through awareness and best practices in cyber security and business continuity. The Cyber Centre encourages all critical infrastructure network owners to take appropriate measures to protect your systems against the cyber threats detailed in this assessment.</p>

<p>Please refer to the following online resources for more information and for useful advice and guidance.</p>

<p><strong>General cyber threat information</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/introduction-cyber-threat-environment">An introduction to the cyber threat environment</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessments">National Cyber Threat Assessments</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware (ITSAP.00.057)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/security-considerations-critical-infrastructure-itsap10100">Security considerations for critical infrastructure (ITSAP.10.100)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/preventative-security-tools-itsap00058">Preventative security tools (ITSAP.00.058)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/defending-against-data-exfiltration-threats-itsm40110">Defending against data exfiltration threats (ITSM.40.110)</a></li>
</ul><p><strong>Digitalization and connected <abbr title="operational technology">OT</abbr></strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-cyber-threat-operational-technology">Cyber threat bulletin: Cyber threat to operational technology</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protect-your-operational-technology-itsap00051">Protect your operational technology (ITSAP.00.051)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-version-20-itsp80022">Baseline security requirements for network security zones (ITSP.80.022)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38">Network security zoning – Design considerations for placement of services within zones (ITSG-38)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 IT security actions to protect Internet connected networks and information (ITSM.10.089)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/satellite-communications-itsap80029">Satellite communications (ITSAP.80.029)</a></li>
</ul><p><strong>Supply chain and supplier-based threat</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-supply-chains">The cyber threat from supply chains</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/supply-chain-threats-and-commercial-espionage">Supply chain threats and commercial espionage</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-supply-chain-approach-assessing-risk-itsap10070">Cyber supply chain: An approach to assessing risk (ITSAP.10.070)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protecting-your-organization-software-supply-chain-threats-itsm10071">Protecting your organization from software supply chain threats (ITSM.10.071)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-supply-chain-security-small-medium-sized-organizations-itsap00070">Cyber supply chain security for small and medium-sized organizations (ITSAP.00.070)</a></li>
</ul><p><strong>Cybercrime</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/baseline-cyber-threat-assessment-cybercrime">Baseline cyber threat assessment: Cybercrime</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/ransomware">Cyber Centre ransomware overview page</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/ransomware-how-prevent-and-recover-itsap00099">Ransomware: How to prevent and recover (ITSAP.00.099)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/ransomware-playbook-itsm00099">Ransomware playbook (ITSM.00.099)</a></li>
</ul><p><strong>State-sponsored cyber threats</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-cyber-centre-urges-canadian-critical-infrastructure-operators-raise">Cyber threat bulletin: Cyber Centre urges Canadian critical infrastructure operators to raise awareness and take mitigations against known Russian-backed cyber threat activity</a></li>
	<li><a href="https://www.cyber.gc.ca/en/news-events/joint-cyber-security-advisory-russian-state-sponsored-and-criminal-cyber-threats-critical">Joint cyber security advisory on Russian state-sponsored and criminal cyber threats to critical infrastructure</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-cyber-centre-urges-canadians-be-aware-and-protect-against-prc-cyber-threat-activity">Cyber threat bulletin: Cyber Centre urges Canadians to be aware of and protect against PRC cyber threat activity</a></li>
</ul><p><strong>DDoS attacks</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/defending-against-distributed-denial-service-ddos-attacks-itsm80110">Defending against distributed denial of service (DDoS) attacks (ITSM.80.110)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protecting-your-organization-against-denial-service-attacks-itsap80100">Protecting your organization against denial-of-service attacks (ITSAP.80.100)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/distributed-denial-service-attacks-prevention-and-preparation-itsap80110">Distributed denial of service attacks - prevention and preparation (ITSAP.80.110)</a></li>
</ul></section><!--** TOP OF PAGE ******--><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><aside class="wb-fnote" role="note"><h2 class="text-info" id="fn">Endnotes</h2>

<dl><dt>1</dt>
	<dd id="fn1">
	<p>Global Affairs Canada, Office of the Chief Economist. <a href="https://international.canada.ca/en/global-affairs/corporate/reports/chief-economist/state-trade/2024">State of Trade 2024: Supply chains</a>. June 2024.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote </span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>2</dt>
	<dd id="fn2">
	<p>Global Affairs Canada. <a href="https://international.canada.ca/en/global-affairs/corporate/reports/chief-economist/global-value-chains/2020-06-vulnerability">Canadian supply chain logistics vulnerability</a>. June 2021.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote </span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>3</dt>
	<dd id="fn3">
	<p>Federal Bureau of Investigation. <a href="https://www.ic3.gov/PSA/2022/psa220504">Business Email Compromise: The $43 Billion Scam</a>. May 4, 2022.</p>
	<!-- broken link -->

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote </span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>4</dt>
	<dd id="fn4">
	<p>Global Affairs Canada. <a href="https://www.canada.ca/en/global-affairs/news/2023/12/statement-on-russias-malicious-cyber-activity-affecting-the-united-kingdom.html">Statement on Russia’s malicious cyber activity affecting the United Kingdom. December 7, 2023.</a>. February 14, 2019.</p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote </span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>5</dt>
	<dd id="fn5">
	<p>Andry Greenberg. <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/">The Untold Story of NotPetya, the Most Devastating Cyberattack in History</a>. Wired. August 22, 2018.</p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote </span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>6</dt>
	<dd id="fn6">
	<p>Courtney Dickson. <a href="https://www.cbc.ca/news/canada/british-columbia/t-souke-nation-marine-labs-ocean-data-climate-change-1.6540485">First Nation, tech company collaborate to prepare for climate change’s effects on harvesting waters</a>. CBC News. August 7, 2022.</p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote </span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>7</dt>
	<dd id="fn7">
	<p><a href="https://safety4sea.com/wp-content/uploads/2019/04/C4ADS-Above-us-only-start_Exposing-GPS-spoofing-in-Russia-and-Syria-2019_04.pdf">Above us, only stars: Exposing GPS Spoofing in Russia and Syria (PDF)</a>. C4ADS. 2019; Anatoly Kurmanaev. <a href="https://www.nytimes.com/2022/09/03/world/americas/ships-gps-international-law.html">How Fake GPS Coordinates Are Leading to Lawlessness on the High Seas</a>. The New York Times. September 3, 2022; Katie Zeng Xiaojun. <a href="https://www.riskintelligence.eu/background-and-guides/background-gnss-spoofing-in-china-and-beyond">BACKGROUND: GNSS spoofing in China and beyond</a>. RiskIntelligence. June 29, 2021.</p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote </span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>8</dt>
	<dd id="fn8">
	<p>Michelle Wiese Bockmann. <a href="https://www.lloydslist.com/LL1128820/Seized-UK-tanker-likely-spoofed-by-Iran">Seized UK tanker likely ‘spoofed’ by Iran</a>. Lloyd’s List. August 16, 2019.</p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote </span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>9</dt>
	<dd id="fn9">
	<p>Cyber Centre. <a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-supply-chains">The cyber threat from supply chains</a>. February 8, 2023</p>

	<p class="fn-rtn"><a href="#fn9-rf"><span class="wb-inv">Return to footnote </span>9<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>10</dt>
	<dd id="fn10">
	<p>Cyber Centre. <a href="https://www.cyber.gc.ca/en/guidance/baseline-cyber-threat-assessment-cybercrime">Baseline Cyber Threat Assessment: Cybercrime</a>. August 28, 2023.</p>

	<p class="fn-rtn"><a href="#fn10-rf"><span class="wb-inv">Return to footnote </span>10<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>11</dt>
	<dd id="fn11">
	<p>Cyber Centre. <a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2023-2024">National Cyber Threat Assessment 2023-2024</a>. October 2022.</p>

	<p class="fn-rtn"><a href="#fn11-rf"><span class="wb-inv">Return to footnote </span>11<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>12</dt>
	<dd id="fn12">
	<p>Bill Toulas. <a href="https://www.bleepingcomputer.com/news/security/japans-largest-port-stops-operations-after-ransomware-attack/">Japan’s largest port stops operations after ransomware attack</a>. Bleeping Computer. July 5, 2023; Yukana Inoue. <a href="https://www.japantimes.co.jp/news/2023/07/13/national/japan-cybersecurity-improvements-ransomware/">No longer a ‘catastrophe,’ Japan’s cybersecurity could still improve</a>. The Japan Times. July 13, 2023.</p>

	<p class="fn-rtn"><a href="#fn12-rf"><span class="wb-inv">Return to footnote </span>12<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>13</dt>
	<dd id="fn13">
	<p>Sangfor Technologies. <a href="https://www.sangfor.com/blog/cybersecurity/nagoya-port-cyber-attack-by-lockbit-ransomware">Nagoya Port Cyber Attack by LockBit Ransomware Results in Cargo Delays</a>. July 11, 2023.</p>

	<p class="fn-rtn"><a href="#fn13-rf"><span class="wb-inv">Return to footnote </span>13<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>14</dt>
	<dd id="fn14">
	<p>Det Norske Veritas (DNV). <a href="https://www.dnv.com/news/2023/cyber-attack-on-shipmanager-servers-update-237931/">Cyber-attack on ShipManager servers – update</a>. January 23, 2023.</p>

	<p class="fn-rtn"><a href="#fn14-rf"><span class="wb-inv">Return to footnote </span>14<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>15</dt>
	<dd id="fn15">
	<p>Jonathan Greig. <a href="https://therecord.media/ransomware-attack-on-maritime-software-impacts-1000-ships">Ransomware attack on maritime software impacts 1,000 ships</a>. The Record. January 16, 2023; Eduard Kovacs. Ransomware Attack on DNV Ship Management Software Impacts 1,000 Vessels. Security Week. January 18, 2023.</p>

	<p class="fn-rtn"><a href="#fn15-rf"><span class="wb-inv">Return to footnote </span>15<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>16</dt>
	<dd id="fn16">
	<p>Ingrid Booth. <a href="https://www.investec.com/en_za/focus/economy/transnet-cyberattack-could-have-catastrophic-consequences.html">Transnet cyberattack could have catastrophic consequences.</a> Investec. July 28, 2021.</p>

	<p class="fn-rtn"><a href="#fn16-rf"><span class="wb-inv">Return to footnote </span>16<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>17</dt>
	<dd id="fn17">
	<p>Joe Tidy. <a href="https://www.bbc.com/news/technology-60250956">European oil facilities hit by cyber-attacks</a>. British Broadcasting Corporation (BBC). February 3, 2022.</p>

	<p class="fn-rtn"><a href="#fn17-rf"><span class="wb-inv">Return to footnote </span>17<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>18</dt>
	<dd id="fn18">
	<p>Jonathan Greig. <a href="https://therecord.media/royal-dirkzwager-ransomware-attack-dutch-shipping">Dutch shipping giant Royal Dirkzwager confirms Play ransomware attack</a>. The Record. March 17, 2023.</p>

	<p class="fn-rtn"><a href="#fn18-rf"><span class="wb-inv">Return to footnote </span>18<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>19</dt>
	<dd id="fn19">
	<p>Sam Lagrone. <a href="https://news.usni.org/2023/04/20/ransomware-attack-hits-marinette-marine-shipyard-results-in-short-term-delay-of-frigate-freedom-lcs-construction">Ransomware Attack Hits Marinette Marine Shipyard, Results in Short-Term Delay of Frigate, Freedom LCS Construction</a>. U.S. Naval Institute (USNI) News. April 20, 2023; Office of the Maine Attorney General. <a href="https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/901b3d47-d21e-426e-87dd-e25266b0db96.shtml">Fincantieri Marine Group, LLC Data Breach Notification</a>. Retrieved February 16, 2024.</p>

	<p class="fn-rtn"><a href="#fn19-rf"><span class="wb-inv">Return to footnote </span>19<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>20</dt>
	<dd id="fn20">
	<p>Charlotte Goldstone. <a href="https://theloadstar.com/freight-crime-on-the-up-as-gangs-become-more-tech-savvy/">Freight crime on the up as hangs become more tech-savvy</a>. The Load Star. January 19, 2024; Transport Asset Protection Association. <a href="https://tapaemea.org/news/a-look-at-cargo-crimes-reported-to-the-tapa-emea-intelligence-system-tis-in-the-first-nine-months-of-2023/">A look at Cargo Crimes Reported to the TAPA EMEA Intelligence System (TIS) in the First Nine Months of 2023</a>. November 30, 2023; Joseph Bernstein. <a href="https://www.buzzfeednews.com/article/josephbernstein/how-pirates-and-hackers-worked-together-to-steal-millions-of">How Pirates and Hackers Worked Together to Steal Millions of Dollars in Diamonds</a>. Buzzfeed News. March 17, 2016; Europol. <a href="https://www.europol.europa.eu/sites/default/files/documents/cyberbits_04_ocean13.pdf">Cyber Bits: Hackers deployed to facilitate drugs smuggling (PDF)</a>. June 2013.</p>

	<p class="fn-rtn"><a href="#fn20-rf"><span class="wb-inv">Return to footnote </span>20<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>21</dt>
	<dd id="fn21">
	<p>U.S. Department of Justice. <a href="https://www.justice.gov/archives/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical">U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure</a>. January 31, 2024; U.S. Department of Justice. <a href="https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian">Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU)</a>. February 15, 2024; U.S. Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a">People’s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection</a>. May 24, 2023.</p>

	<p class="fn-rtn"><a href="#fn21-rf"><span class="wb-inv">Return to footnote </span>21<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>22</dt>
	<dd id="fn22">
	<p>Elaine Dezenski and David Rader. <a href="https://foreignpolicy.com/2023/09/20/china-shipping-maritime-logistics-lanes-trade-ports-security-espionage-intelligence/">How China Uses Shipping for Surveillance and Control</a>. Foreign Policy. September 20, 2023.</p>

	<p class="fn-rtn"><a href="#fn22-rf"><span class="wb-inv">Return to footnote </span>22<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>23</dt>
	<dd id="fn23">
	<p>Ellen Nakashima and Paul Sonne. <a href="https://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare/2018/06/08/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html">China hacked a Navy contractor and secured a trove a highly sensitive data on submarine warfare</a>. The Washington Post. June 8, 2018.</p>

	<p class="fn-rtn"><a href="#fn23-rf"><span class="wb-inv">Return to footnote </span>23<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>24</dt>
	<dd id="fn24">
	<p>Shannon Liao. <a href="https://www.theverge.com/2019/3/5/18251836/chinese-hackers-us-servers-universities-military-secrets-cybersecurity">Chinese hackers reportedly targeted 27 universities for military secrets</a>. The Verge. March 5, 2019</p>

	<p class="fn-rtn"><a href="#fn24-rf"><span class="wb-inv">Return to footnote </span>24<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>25</dt>
	<dd id="fn25">
	<p>Dan De Luce and Jean-Nicholas Fievet. <a href="https://www.nbcnews.com/news/world/china-linked-group-malware-spy-commercial-shipping-cargo-report-eset-rcna152129">China-linked group uses malware to try to spy on commercial shipping, new report says</a>. NBC News. May 14, 2024.</p>

	<p class="fn-rtn"><a href="#fn25-rf"><span class="wb-inv">Return to footnote </span>25<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>26</dt>
	<dd id="fn26">
	<p>Cyber Centre. <a href="/en/guidance/cyber-threat-bulletin-cyber-threat-operational-technology">Cyber threat bulletin: Cyber threat to operational technology</a>. December 16, 2021.</p>

	<p class="fn-rtn"><a href="#fn26-rf"><span class="wb-inv">Return to footnote </span>26<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>27</dt>
	<dd id="fn27">
	<p>Chris Demchak and Michael Thomas. <a href="https://warontherocks.com/2021/10/cant-sail-away-from-cyber-attacks-sea-hacking-from-land/">Can’t Sail Away from Cyber Attacks: ‘Sea-Hacking’ from Land</a>. War on the Rocks. October 15, 2021.</p>

	<p class="fn-rtn"><a href="#fn27-rf"><span class="wb-inv">Return to footnote </span>27<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>28</dt>
	<dd id="fn28">
	<p>Cyber Center. <a href="/en/news-events/joint-advisory-prc-state-sponsored-actors-compromising-and-maintaining-persistent-access-us-critical-infrastructure-and-joint-guidance-identifying-and-mitigating-living-land-0">Joint advisory on PRC state-sponsored actors compromising and maintaining persistent access to U.S. critical infrastructure and joint guidance on identifying and mitigating living off the land</a>. February 7, 2024.</p>

	<p class="fn-rtn"><a href="#fn28-rf"><span class="wb-inv">Return to footnote </span>28<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>29</dt>
	<dd id="fn29">
	<p>Microsoft Threat Intelligence. <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques</a>. Microsoft Security. May 24, 2023.</p>

	<p class="fn-rtn"><a href="#fn29-rf"><span class="wb-inv">Return to footnote </span>29<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>30</dt>
	<dd id="fn30">
	<p>U.S. Bureau of Industry &amp; Security. <a href="https://www.bis.gov/press-release/commerce-department-prohibits-russian-kaspersky-software-u.s.-customers">Commerce Department Prohibits Russian Kaspersky Software for U.S.</a> Customers. June 20, 2024</p>

	<p class="fn-rtn"><a href="#fn30-rf"><span class="wb-inv">Return to footnote </span>30<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>31</dt>
	<dd id="fn31">
	<p>U.S. Bureau of Industry &amp; Security. <a href="https://www.bis.gov/press-release/commerce-department-prohibits-russian-kaspersky-software-u.s.-customers">Commerce Department Prohibits Russian Kaspersky Software for U.S.</a> Customers. June 20, 2024</p>

	<p class="fn-rtn"><a href="#fn31-rf"><span class="wb-inv">Return to footnote </span>31<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>32</dt>
	<dd id="fn32">
	<p>Paul Withers. <a href="https://www.cbc.ca/news/canada/nova-scotia/port-halifax-montreal-cyberattack-website-1.6808370">Cyberattack targets websites for port authorities in Halifax, Montreal</a>. CBC News. April 12, 2023; Cyber Centre. <a href="https://www.cyber.gc.ca/en/alerts-advisories/distributed-denial-service-campaign-targeting-multiple-canadian-sectors">Alert - Distributed Denial of Service campaign targeting multiple Canadian sectors</a>. September 15, 2024; Cyber Centre. <a href="https://www.cyber.gc.ca/en/news-events/cyber-centre-statement-distributed-denial-service-campaign-targeting-multiple-canadian-sectors">Cyber Centre statement on a distributed denial of service (DDoS) campaign targeting multiple Canadian sectors</a>. September 15, 2023.</p>

	<p class="fn-rtn"><a href="#fn32-rf"><span class="wb-inv">Return to footnote </span>32<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>33</dt>
	<dd id="fn33">
	<p>Pierluigi Paganini. <a href="https://securityaffairs.com/151149/hacking/noname-ddos-attack-canadian-airports.html">Pro-Russia hacker group NoName launched a DDoS attack on Canadian airports causing severe disruptions</a>. Security Affairs. September 21, 2023.</p>

	<p class="fn-rtn"><a href="#fn33-rf"><span class="wb-inv">Return to footnote </span>33<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>34</dt>
	<dd id="fn34">
	<p>U.S. Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/sites/default/files/2024-05/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activity-508c.pdf">Defending <abbr title="operational technology">OT</abbr> Operations Against Ongoing Pro-Russia Hacktivist Activity (PDF)</a>. May 1, 2024.</p>

	<p class="fn-rtn"><a href="#fn34-rf"><span class="wb-inv">Return to footnote </span>34<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></section><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-incident-reporting-guidelines-key-information-sharing-requirements-itsm00140</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-incident-reporting-guidelines-key-information-sharing-requirements-itsm00140"/><title><![CDATA[Cyber incident reporting guidelines: Key information sharing requirements – ITSM.00.140]]></title><updated>2026-01-29T14:32:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7045" about="/en/guidance/cyber-incident-reporting-guidelines-key-information-sharing-requirements-itsm00140" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Management series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSM.00.140</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Management series</strong></p>
</div>

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsm00140-cyber-incident-reporting guidelines-e.pdf">Cyber incident reporting guidelines: Key information sharing requirements – ITSM.00.140 (PDF, 506 KB)</a></p>
</div>

<h2 class="text-info mrgn-tp-0">Foreword</h2>

<p>This is an UNCLASSIFIED publication issued under the authority of the Head, Canadian Centre for Cyber Security (Cyber Centre). For more information, please email or phone our Contact Centre:</p>

<p><span class="glyphicon glyphicon-envelope"></span><span class="wb-inv">email</span> <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> |<span class="glyphicon glyphicon-phone"></span><span class="wb-inv">Mobile</span> <a href="tel:613-949-7048">613-949-7048</a> or <a href="tel:+1-833-292-3788">1<span>‑</span>833<span>‑</span>CYBER<span>‑</span>88</a></p>

<h2 class="text-info">Effective date</h2>

<p>This publication takes effect on January 29, 2026.</p>

<h2 class="text-info">Revision history</h2>

<ol><li>First release: January 29, 2026</li>
</ol><h2 class="text-info mrgn-tp-0" id="0">Overview</h2>

<p>Organizing and sharing information during a cyber incident involves a structured approach that ensures the effective communication of relevant details to the Canadian Centre for Cyber Security (Cyber Centre). The purpose of this publication is to clarify the types of information the Cyber Centre considers “actionable.”</p>
</div>
</div>

<section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#1">Introduction</a></li>
	<li><a href="#2">Information sharing during a cyber incident</a>
	<ul><li><a href="#2.1">Contextual information</a></li>
		<li><a href="#2.2">Technical artifacts</a></li>
	</ul></li>
	<li><a href="#tab1">Table 1: Required actionable information and data artifacts</a></li>
</ul><h2 class="h3">List of annexes</h2>

<ul class="list-unstyled"><li><a href="#A">Annex A Pre-cyber incident</a>

	<ul><li><a href="#A1">Business email compromise phishing campaigns</a></li>
		<li><a href="#A2">Living off trusted sites techniques</a></li>
	</ul></li>
	<li><a href="#B">Annex B Recommended information sharing</a>
	<ul><li><a href="#B1">Threat intelligence reports</a></li>
		<li><a href="#B2">Indicators of compromise</a></li>
		<li><a href="#B3">Best practices and security recommendations</a></li>
		<li><a href="#B4">Vulnerability information and patches</a></li>
		<li><a href="#B5">Incident reports</a></li>
		<li><a href="#B6">Anonymous sharing mechanisms</a></li>
		<li><a href="#B7">Automated threat intelligence sharing platforms</a></li>
		<li><a href="#B8">Collaborative analysis and research</a></li>
	</ul></li>
</ul></details></section><section><h2 class="text-info" id="1">Introduction</h2>

<p>For participating entities, this publication should be shared and circulated internally for consultation and pre-approval from your executive team, including legal and operational teams. You should also share this publication with managed security service providers and ensure cross-organizational support for the approach and pre-approval of the type of information to be shared.</p>

<p>In advance of a cyber incident, your organization should decide whether you can and will share these types of information to:</p>

<ul><li>best inform next steps</li>
	<li>assist in network rebuild and recovery</li>
	<li>benefit the resilience of the broader cyber ecosystem. For more details, please read <a href="#A">Annex A: Pre-cyber incidents</a>.</li>
</ul><p>In addition, information sharing serves as a centralized resource for gathering data on cyber threats and vulnerabilities. We recommend that your organization disseminate information amongst the members of your sector. The goal is to enable collaborative efforts to secure critical infrastructure (CI) and protect against cyber threats. The recommended aspects of intra-community information sharing are described in <a href="#B">Annex B: Recommended information sharing</a>.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="2">Information sharing during a cyber incident</h2>

<p>During a cyber security incident, the participating entity could disclose artifacts to the Cyber Centre that would be used to investigate and provide clarity and enrichment to the nature of the compromise. This includes contextual information and technical artifacts.</p>

<h3 id="2.1">Contextual information</h3>

<p>This category includes evidence that provides context to the incident, which assists your organization in understanding the circumstances and implications of the compromise. Contextual information typically consists of user activity anomalies, communications (for example, email) and content. This information helps to provide comprehensive reporting, inform on attribution, and validate the malicious behavior.</p>

<p>This might include the following information:</p>

<ul><li>summary of the observed activity or incident</li>
	<li>information that would provide clarity regarding the form of threat (if known), such as the
	<ul><li>malware or denial of service</li>
		<li>actor involved</li>
		<li>motivation</li>
		<li>vector and impact</li>
	</ul></li>
	<li>how the attacker gained access (whether through phishing, exploiting vulnerabilities or other means)</li>
	<li>timeline of events leading up to, during and after the incident</li>
	<li>scope of the incident, including the type of systems affected and the data that was compromised, including
	<ul><li>what operations are impacted</li>
		<li>what disruptions have resulted from this compromise, including to third-party software</li>
	</ul></li>
	<li>observed network traffic details (if available)</li>
	<li>list of mitigations taken, if any, by the incident handlers</li>
	<li>current status of the incident</li>
	<li>list of indicators of compromise (IOCs) gathered during the investigation</li>
	<li>next steps to be taken</li>
	<li>contact information</li>
</ul><h3 id="2.2">Technical artifacts</h3>

<p>This category includes all data related to the technical aspects of the incident.</p>

<p><a href="#tab1">Table 1: Required actionable information and data artifacts</a> details the specific types of actionable information and data artifacts that the Cyber Centre requires from your organization in the event of a cyber security incident. Additionally, the table highlights the analytical process the Cyber Centre takes to analyze the artifacts and the expected outcomes that stem from the analysis.</p>

<p>It is important to note that:</p>

<ul><li>Internet Protocol (IP) addresses and domains supplied as <abbr title="Indicators of compromise">IoCs</abbr> are presumed not to be owned by the organization, and that the artifacts shared with the Cyber Centre do not contain any information pertaining to Canadian individuals or persons located in Canada.</li>
	<li>At no time will the Cyber Centre share raw or identifying victim data with any external entity
	<ul><li>The Cyber Centre is bound by provisions in the <em>Communications Security Establishment Act</em> [1] and the <em>Privacy Act</em> [2] that govern our activities. CSE may also establish non-disclosure agreements (NDA) with critical infrastructure partners to protect confidential information during information sharing activities.</li>
	</ul></li>
</ul><div class="clearfix"> </div>

<div class="table-responsive">
<table class="table table-bordered" id="tab1"><caption>Table 1: Required actionable information and data artifacts</caption>
	<thead><tr><th class="text-center" scope="col">Technical artifacts</th>
			<th class="text-center" scope="col">Internal analytics process</th>
			<th class="text-center" scope="col">Expected outcomes</th>
		</tr></thead><tbody><tr><td>Suspicious/malicious <abbr title="internet protocol">IP</abbr>s</td>
			<td>
			<ul><li>Cross-reference malicious <abbr title="internet protocol">IP</abbr> with the Cyber Centre’s knowledge base to validate and provide insights, including but not limited to classified indicators</li>
			</ul></td>
			<td>
			<ul><li>Confirm maliciousness</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action</li>
				<br /><li>Share any additional indicators when applicable</li>
			</ul></td>
		</tr><tr><td>Suspicious/malicious domains</td>
			<td>
			<ul><li>Cross-reference malicious domains with the Cyber Centre’s knowledge base including but not limited to classified indicators to validate and identify command and control (C2) infrastructure</li>
				<br /><li>Analyze the behaviour (redirection pattern, domain name system (DNS) queries) to gain insights into the types of malware being distributed through the phishing campaigns and the geographical spread of the threat</li>
			</ul></td>
			<td>
			<ul><li>Confirm maliciousness</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action</li>
			</ul></td>
		</tr><tr><td>Suspicious/malicious file hashes</td>
			<td>
			<ul><li>Cross-reference malicious file hashes with the Cyber Centre’s knowledge base including but not limited to classified indicators to validate and gather the source, behaviour and associated risks</li>
				<br /><li>Compare the hashes of files with those of known malware for detection and identification</li>
			</ul></td>
			<td>
			<ul><li>Confirm maliciousness</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action</li>
				<br /><li>Share any additional indicators when applicable</li>
			</ul></td>
		</tr><tr><td>Suspicious/malicious <abbr title="uniform resource locators">URL</abbr>s</td>
			<td>
			<ul><li>Cross-reference malicious <abbr title="uniform resource locators">URL</abbr>s with the Cyber Centre’s knowledge base including but not limited to Classified indicators to validate and understand the methods used to host and distribute malware</li>
			</ul></td>
			<td>
			<ul><li>Confirm maliciousness</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action</li>
				<br /><li>Share any additional indicators when applicable</li>
			</ul></td>
		</tr><tr><td>Suspicious/malicious documents and files (malware samples)</td>
			<td>
			<ul><li>Run detection heuristics to evaluate the level of maliciousness</li>
				<br /><li>Cross reference to reveal tactic, techniques, and procedures (TTPs), such as the type of malware used, its motives, or its functionality and how it evades detection</li>
			</ul></td>
			<td>
			<ul><li>Confirm maliciousness</li>
				<br /><li>Reveal patterns, tactics, techniques and behaviours</li>
				<br /><li>Share hash value of malicious documents and files</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action, to update antivirus signatures, and to refine security policies</li>
			</ul></td>
		</tr><tr><td>Security logs (event logs, system logs, access logs, Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) logs, network and firewall logs, endpoint detection and response (EDR) logs, <abbr title="domain name system">DNS</abbr> and virtual private network logs, database logs and mail server logs, etc.)</td>
			<td>
			<ul><li>Analyze and apply use case and analytics that complement the commercial tooling and detect evidence of suspicious/malicious activities</li>
			</ul></td>
			<td>
			<ul><li>Reveal patterns, tactics, techniques, and behaviours</li>
				<br /><li>Reveal malicious artifacts (<abbr title="internet protocol">IP</abbr>s, domains, hashes, <abbr title="uniform resource locators">URL</abbr>s, etc.)</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action</li>
			</ul></td>
		</tr><tr><td>Forensic artifacts: Disk images, memory dumps, registry entries, system drives, etc.</td>
			<td>
			<ul><li>Conduct forensic analysis to find evidence of compromise and reconstruct the timeline of events, to determine the extent of the access and exfiltration, the methods used to gain access and identity of the threat actor</li>
			</ul></td>
			<td>
			<ul><li>Reveal patterns, tactics, techniques, and behaviours</li>
				<br /><li>Reveal malicious artifacts (<abbr title="internet protocol">IP</abbr>s, domains, hashes, <abbr title="uniform resource locators">URL</abbr>s, etc.)</li>
				<br /><li>Share with participating entity and the <abbr title="critical infrastructure">CI</abbr> community for action</li>
			</ul></td>
		</tr></tbody></table></div>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="A">Annex A Pre-cyber incident</h2>

<p>Before any confirmation that a cyber incident has occurred, the participant organization is encouraged to share information presented in the following sub-sections of this annex with the Cyber Centre. This information can:</p>

<ul><li>identify gaps</li>
	<li>calibrate the efficiency of the detection</li>
	<li>increase the signal-to-noise ratio</li>
	<li>lower false positives to avoid alert fatigue</li>
</ul><p>Your organization should also share any other information that can be used to retrace a series of events.</p>

<h3 id="A1">Alert rules</h3>

<p>Configuration and criteria are set within the organization’s security monitoring system, such as a security information and event management (SIEM) system or an <abbr title="Intrusion Detection System">IDS</abbr>, used to trigger alerts for potential security incidents. This includes the triggers, their thresholds, filters and correlation rules such as:</p>

<ul><li>excessive login failures</li>
	<li>geographical irregularities</li>
	<li>unusual outbound traffic</li>
	<li>changes in file integrity</li>
</ul><p>Consider implementing endpoint detection and response (EDR) or extended detection and response (XDR) system to assist in detecting and responding to anomalous system activity.</p>

<h3 id="A2">Security logs</h3>

<p>Digital records that capture activities and events related to <abbr title="information technology">IT</abbr> security, such as:</p>

<ul><li>network devices (for example, firewalls, routers, and switches)</li>
	<li>servers and workstations, security appliances (for example, <abbr title="Intrusion Detection System">IDS</abbr>, <abbr title="Intrusion Prevention System">IPS</abbr>, and antivirus software)</li>
	<li>applications (for example, database and web server logs)</li>
</ul><h2 class="text-info" id="B">Annex B Recommended information sharing</h2>

<p>This annex includes the recommended information sharing best practices. By sharing various types of information, critical infrastructure community members can significantly enhance their collective cybersecurity posture, reduce the risk of cyber attacks, and respond more effectively to incidents.</p>

<h3 id="B1">Threat intelligence reports</h3>

<p>Threat intelligence reports offer detailed analyses of specific threats, including the <abbr title="tactic, techniques, and procedures">TTPs</abbr> used by cyber adversaries. These reports can provide insights into the</p>

<ul><li>nature of the threat</li>
	<li>affected systems</li>
	<li>mitigation strategies</li>
	<li>recommended protective measures</li>
</ul><h3 id="B2">Indicators of compromise</h3>

<p><abbr title="Indicators of compromise">IoCs</abbr> are specific artifacts or pieces of information used to detect cyber threats, such as:</p>

<ul><li>malicious <abbr title="internet protocol">IP</abbr> addresses</li>
	<li>uniform resource locators (URLs)</li>
	<li>file hashes</li>
	<li>email signatures</li>
</ul><p>Sharing <abbr title="Indicators of compromise">IoCs</abbr> helps members to quickly identify and respond to potential threats.</p>

<h3 id="B3">Best practices and security recommendations</h3>

<p>Information on effective security measures, policies, and practices that organizations can implement to protect themselves from cyber threats. This includes configuration guidelines, security controls, and preventive strategies.</p>

<h3 id="B4">Vulnerability information and patches</h3>

<p>Sharing details about newly discovered vulnerabilities, potential impacts, and available patches or workarounds. This helps organizations to address vulnerabilities promptly before they can be exploited by threat actors.</p>

<h3 id="B5">Incident reports</h3>

<p>Summaries of security incidents experienced by members, including the nature of the incident, how it was detected, the actions taken, and lessons learned. Sharing incident reports can help others to better prepare for and respond to similar incidents.</p>

<h3 id="B6">Anonymous sharing mechanisms</h3>

<p>Some members may prefer to share sensitive information anonymously to protect their privacy or for legal reasons. Consider providing mechanisms for anonymous sharing, ensuring that valuable information can still be disseminated without exposing the source.</p>

<h3 id="B7">Automated threat intelligence sharing platforms</h3>

<p>Utilizing platforms like structured threat information expression (STIX) and trusted automated exchange of indicator information (TAXII) for the automated exchange of threat intelligence. These platforms facilitate real-time sharing of threat data in a standardized format, enabling faster detection and mitigation of threats.</p>

<h3 id="B8">Collaborative analysis and research</h3>

<p>Joint efforts to analyze specific cyber threats or trends, leveraging the collective expertise and resources of the energy sector members. This collaborative approach can lead to a deeper understanding of complex threats and more effective countermeasures.</p>
</section></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/spotting-malicious-email-messages-itsap00100</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/spotting-malicious-email-messages-itsap00100"/><title><![CDATA[Spotting malicious email messages (ITSAP.00.100)]]></title><updated>2026-01-28T18:26:13Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="732" about="/en/guidance/spotting-malicious-email-messages-itsap00100" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.100</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Awareness series</strong></p>
</div>
</div>

<p>Email is a convenient communication tool for individuals and organizations. It provides an easy way to exchange documents, images, links and various files. However, threat actors can use email for malicious purposes. They frequently target organizations and their networks to steal information. Threat actors are technologically savvy, conscious of vulnerability and aggressively agile. A successful intrusion can quickly lead to data and privacy breaches.</p>

<p>As an employee, you may have access to sensitive corporate information, which can make you a target. You should be wary of malicious emails, which threat actors use to infect devices and systems to access information. Knowing how to spot malicious emails and phishing attempts can help protect your organization's information and networks.</p>

<h2 class="text-info">On this page</h2>

<ul><li><a href="#threat">How threat actors use malicious emails</a></li>
	<li><a href="#spot">How to spot malicious emails</a></li>
	<li><a href="#protect">How to protect against malicious emails</a></li>
	<li><a href="#handle">How to handle malicious emails</a></li>
	<li><a href="#learn">Learn more</a></li>
</ul><h2 class="text-info" id="threat">How threat actors use malicious emails</h2>

<p>Threat actors use malicious emails to conduct a variety of malicious activities, including to:</p>

<ul><li>steal your sign-in details or credentials</li>
	<li>spread malware, including viruses, ransomware and spyware, to infect your device or spread to other devices on your network</li>
	<li>steal your information, corrupt or damage your files</li>
</ul><h3>Phishing attacks</h3>

<p>Phishing is the act of sending fraudulent communications that appear to be legitimate. Phishing emails often contain malicious attachments or links to malicious websites. Threat actors carry out phishing attacks to trick you into disclosing sensitive information, such as credit card numbers, social insurance numbers or banking credentials. Phishing attacks can take the form of emails, texts or phone calls, but this publication focuses on malicious emails.</p>

<p>Threat actors can be highly skilled at creating emails that look legitimate. These emails may contain company logos or trademark information. The subject lines are relevant, and the messages are pertinent. Given our desire to trust and the sheer number of emails we receive daily, it can be easy to believe the content we read in these emails, click on embedded links, or open attachments. However, the attachments may contain malicious software, and the links may direct you to malicious websites.</p>

<p>Some types of malware can scan your contacts and automatically send an infected message to everyone on your contact list. Even if an email comes from someone you know, you should always think twice before clicking links or opening attachments. Configuring your email to preview emails, access links and open attachments could inadvertently allow a threat actor to:</p>

<ul><li>remotely access sensitive device information</li>
	<li>execute malware</li>
	<li>use your device as a foothold to access other network resources</li>
</ul><p>Phishing emails come in various forms. Common methods include:</p>

<ul><li><strong>Spear-phishing</strong>: A threat actor sends emails to specific targets, such as an individual, a group or an organization. A spear-phishing email is crafted using the recipient's personal or professional characteristics and interests. Threat actors often use publicly available information from the individual's social media accounts. Spear-phishing emails require more effort from threat actors, but recipients are more likely to respond to the email, open attachments or click on links.</li>
	<li><strong>Whaling</strong>: A threat actor sends emails to high-profile individuals or senior executives. They create targeted and convincing emails by using personal information about the individual or the organization they work for. Threat actors may use publicly available information from the organization's website or social media accounts.</li>
	<li><strong>Quishing</strong>: A phishing attack using malicious "quick response" (QR) codes in emails that re-directs you to a malicious website when the <abbr title="quick response">QR</abbr> code is scanned. Check the website URL to make sure it is the intended site.</li>
</ul><p>Remember, <strong>no one is immune</strong>. Although anyone can be the target of phishing attacks, the following individuals are more commonly targeted:</p>

<ul><li>senior executives and their assistants</li>
	<li>helpdesk staff</li>
	<li>system administrators</li>
	<li>users who have access to sensitive information</li>
	<li>users who have remote access</li>
	<li>users whose jobs involve interacting with members of the public</li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info" id="spot">How to spot malicious emails</h2>

<p>Threat actors will try to make malicious emails look legitimate. As such, it is important to know how to spot a potentially dangerous one.</p>

<p>Verify the sender's email address to confirm it matches the official address of the organization or individual they claim to be. Know how the organizations and businesses you interact with typically contact you and what type of information they may ask for. For example, a bank should never send links to online banking and ask you to login. You should always access your banking platform through its official app or website.</p>

<p>Malicious emails can be difficult to identify, but there are some clues that can help you:</p>

<ul><li>an unfamiliar or misspelled name or email address of the sender</li>
	<li>an invalid username or domain name in a sender's email address</li>
	<li>altered or unprofessional company logos</li>
	<li>generic or odd greetings</li>
	<li>poor grammar or spelling</li>
	<li>urgent tone and direction to act quickly</li>
	<li>urgent messages about current "hot-button" issues related to personal or political causes, major domestic or international events or crises, or organizational challenges</li>
	<li>unusual requests (for example, most companies do not ask for sensitive or personal information in an email or insist that you collect a package or pay an overdue invoice)</li>
</ul><p>Keep in mind that malicious emails may not always contain telltale poor grammar or spelling, particularly if they were created using generative artificial intelligence (AI) tools.</p>

<p>Always be suspicious of unsolicited emails requesting personal or confidential data. Take proactive steps to verify their legitimacy before responding or supplying any information. If you receive an email requesting personal information, search for the organization's official website and contact them using the phone number provided. This way, you can confirm if the request is genuine.</p>

<h2 class="text-info" id="protect">How to protect against malicious emails</h2>

<p>You can protect yourself and your organization from malicious emails by implementing the following best practices.</p>

<h3>Handle suspicious emails with care</h3>

<p>When in doubt, avoid opening suspicious emails and contact the sender by another means (for example, by phone) to confirm they contacted you.</p>

<h3>Do not click on links, attachments or <abbr title="quick response">QR</abbr> codes in emails</h3>

<p>If you are being asked to log into an account for an unsolicited reason, do not click the link, do not open attached files and avoid scanning <abbr title="quick response">QR</abbr> codes. Instead, visit the organization's website by manually entering the URL in your web browser or by searching through a search engine.</p>

<h3>Report suspicious emails</h3>

<p>If you receive a suspicious email or suspect malicious activity on a work device or a work account, report the incident to your organization's <abbr title="information technology">IT</abbr> and security teams. Follow their instructions and do not forward the email to coworkers. You can also report phishing emails to the <a href="/en">Cyber Centre</a> or the <a href="https://www.antifraudcentre-centreantifraude.ca/index-eng.htm">Canadian Anti-Fraud Centre</a>.</p>

<h3>Use email filters to block malicious content and spam</h3>

<p>Many email programs offer filtering capabilities that allow you to block certain addresses or only accept email from addresses in your contact list. Be careful who you share your email address with, and do not sign up for every mailing list and rewards program offered by retailers. Some businesses will sell your email address to third parties. You can create disposable or "dummy" email addresses to reduce spam. Many online email services also allow you to create email aliases that can be directed to a specific email folder instead of your main inbox.</p>

<h3>Delete items in your junk folder</h3>

<p>Many email platforms let you configure settings to automatically empty your junk folder after a set number of days. If you choose to do so, you should still check your junk folder so that you do not miss potentially important messages.</p>

<h3>Set up client portals</h3>

<p>If your organization requires clients to frequently provide information or documents, set up an online client portal to safely collect them This way, employees will not have to question every email attachment they receive.</p>

<h3>Establish clear policies</h3>

<p>Your organization should define clear policies on configuration settings and <abbr title="artificial intelligence">AI</abbr> use to limit the risk of malicious email messages. These should include:</p>

<ul><li>installing and properly configuring a firewall and anti-malware software</li>
	<li>configuring a protective domain name system (DNS) on your devices, modems and routers</li>
	<li>enabling a software allowed list and regularly updating all software</li>
	<li>implementing quarantine functions in your organization's anti-malware software</li>
	<li>using trusted and reputable <abbr title="artificial intelligence">AI</abbr> detector tools to verify whether content is human or <abbr title="artificial intelligence">AI</abbr>-generated</li>
	<li>omitting sensitive information when using <abbr title="artificial intelligence">AI</abbr> tools</li>
</ul><h3>Additional best practices</h3>

<ul><li>Use secure messaging portals instead of email for communicating your personal information</li>
	<li>Use bookmarks or a search engine to access websites rather than clicking on links</li>
	<li>Be suspicious of emails that are not addressed directly to you or do not use your correct name or salutation</li>
	<li>Do not open attachments or links from an unknown sender or if they have strange file names or multiple file extensions</li>
	<li>Configure your office suite to prevent macros from running without confirmation or to not run macros from email messages</li>
	<li>Deactivate automatic downloads and execution of attachments and images</li>
	<li>Configure your inbox to not load external images to mitigate the risk of tracking pixels (embedded codes in logos or images that can track your location and behaviour)</li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info" id="handle">How to handle malicious emails</h2>

<p>If you receive an offensive, abusive or potentially criminal message, inform your local police. Save the message as authorities may ask you to provide a copy to help with any subsequent investigations. <strong>Do not send the message to anyone else</strong>.</p>

<p>If you accidently interact with a malicious email, remain calm and take the following actions:</p>

<ul><li>Stop using your device</li>
	<li>Disable Wi-Fi or disconnect network cables so the device cannot communicate with the Internet</li>
	<li>Power off the device</li>
	<li>Contact your <abbr title="information technology">IT</abbr> security department if you are using a corporate device. They can disable accounts and other device features</li>
	<li>Change your password, passphrase, or PIN using a different device</li>
	<li>Scan the device using anti-malware software if possible</li>
	<li>Restore network connections only when you believe you have a clean system</li>
	<li>Perform any available updates and security patches on your device</li>
	<li>Monitor your accounts regularly for suspicious activity</li>
</ul><h2 class="text-info" id="learn">Learn more</h2>

<ul><li><a href="/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks">Don't take the bait: Recognize and avoid phishing attacks (ITSAP.00.101)</a></li>
	<li><a href="/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware (ITSAP.00.057)</a></li>
	<li><a href="/en/guidance/best-practices-passphrases-and-passwords-itsap30032">Best practices for passphrases and passwords (ITSAP.30.032)</a></li>
	<li><a href="/en/guidance/how-updates-secure-your-device-itsap10096">How updates secure your device (ITSAP.10.096)</a></li>
	<li><a href="/en/guidance/firewall-security-considerations-itsap80039">Firewall security considerations (ITSAP.80.039)</a></li>
	<li><a href="/en/guidance/protective-domain-name-system-itsap40019">Protective Domain Name System (ITSAP.40.019)</a></li>
	<li><a href="/en/guidance/how-protect-your-organization-malicious-macros-itsap00200">How to protect your organization from malicious macros (ITSAP.00.200)</a></li>
	<li><a href="/en/guidance/application-allow-list-itsap10095">Application allow list (ITSAP.10.095)</a></li>
	<li><a href="/en/guidance/cyber-security-best-practices-managing-email-itsap60002">Cyber security best practices for managing email (ITSAP.60.002)</a></li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/ransomware-how-prevent-and-recover-itsap00099</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/ransomware-how-prevent-and-recover-itsap00099"/><title><![CDATA[Ransomware: How to prevent and recover (ITSAP.00.099)]]></title><updated>2026-01-28T18:16:57Z</updated><summary><![CDATA[This publication provides tips to help your organization prepare for and recover from ransomware attacks.]]></summary><content><![CDATA[<article data-history-node-id="727" about="/en/guidance/ransomware-how-prevent-and-recover-itsap00099" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.099</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Awareness series</strong></p>
</div>
</div>

<p>Ransomware is a type of malware that denies a victim access to a system or data until they pay a sum of money. When ransomware infects a device, it renders the system unusable or encrypts its storage, preventing access to the information and systems. Threat actors have evolved their tactics and often leverage data theft as the primary method of extortion.</p>

<p>Threat actors can exploit vulnerabilities and leverage many attack vectors to infect your network, systems, and devices with ransomware. Regardless of skill, this can be done by using malicious code and services purchased from the dark web. This is known as ransomware-as-a-service. Additionally, threat actors can use artificial intelligence tools to write effective ransomware. This automates the discovery of weak points in a network, bypassing defences, deploying malware and erasing evidence of the intrusion.</p>

<p>This publication provides tips to help your organization prepare for and recover from ransomware attacks.</p>

<h2 class="text-info">On this page</h2>

<ul><li><a href="#ransomware">How ransomware infects devices</a></li>
	<li><a href="#prepare">How to prepare your organization</a></li>
	<li><a href="#protect">How to protect your organization</a></li>
	<li><a href="#recover">How to recover from a ransomware attack</a></li>
	<li><a href="#risks">Risks of paying the ransom</a></li>
	<li><a href="#learn">Learn more</a></li>
</ul><h2 class="text-info" id="ransomware">How ransomware infects devices</h2>

<p>Threat actors can use a compromised device to spread the ransomware to other connected systems and devices on the same network. Ransomware can infect devices when users:</p>

<ul><li>open legitimate-looking but malicious attachments in messages</li>
	<li>click on malicious links or attachments embedded in websites</li>
	<li>open personalized and targeted content in phishing emails, texts and social media</li>
</ul><p>Threat actors shape their malicious content by scouting social and professional contacts for information they can exfiltrate. They may also monitor communication habits before deploying the ransomware.</p>

<p>If a device is infected with ransomware, you will receive a ransom notice on your screen indicating your files have been encrypted and are inaccessible until the ransom is paid. Cybercriminals often request payment in the form of cryptocurrency because of the anonymity it provides. Cryptocurrency enables cybercriminals to move profits internationally, expanding their reach and complicating law enforcement efforts. Other ransom payment methods often include prepaid credit or gift cards. Threat actors typically give a deadline for paying the ransom, after which they may increase the ransom amount, destroy your files or leak your data.</p>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info" id="prepare">How to prepare your organization</h2>

<p>There are several approaches you can take to better protect your networks, systems and devices. The following is a list of actions you can take to strengthen your cyber security.</p>

<h3>Plan ahead</h3>

<p>Developing an incident response plan for your organization is the cornerstone to your cyber defence strategy. An incident response plan helps you detect and respond to cyber security incidents. Your organization should consider major events that could cause an unplanned outage and require you to activate your incident response.</p>

<p>It should include a risk assessment, backup, recovery and communications plans. It should also designate roles for your employees and provide them with detailed instructions in the event of an incident. Your plan should be available offline in the event your systems are unavailable. Additionally, your organization should develop and frequently test a business continuity and disaster recovery plan.</p>

<ul><li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan (ITSAP.40.003)</a></li>
	<li><a href="/en/guidance/developing-your-it-recovery-plan-itsap40004">Developing your <abbr title="information technology">IT</abbr> recovery plan (ITSAP.40.004)</a></li>
</ul><h3>Prepare for recovery</h3>

<p>Once an incident has been contained or resolved, your organization should have a recovery plan in place, which should be tested by conducting simulations or walk-through exercises. The scenarios should test the effectiveness of your response and highlight areas for improvement.</p>

<h3>Back up your data</h3>

<p>Having reliable backups can significantly enhance your ability to recover from a ransomware attack. A backup is a copy of your data and systems that can be restored and provides access to your critical systems in the event of an incident. You should back up your data frequently to ensure it is as close to real time as possible. Create many security barriers between your production systems and your backups. Ensure your backups are encrypted and stored offline without connection to the Internet or local networks. If your backups are connected to your networks, threat actors can infect them, which will hinder your recovery efforts. Testing your backup process is also crucial to a quick and effective recovery.</p>

<ul><li><a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002)</a></li>
	<li><a href="/en/guidance/using-encryption-keep-your-sensitive-data-secure-itsap40016">Using encryption to keep your sensitive data secure (ITSAP.40.016)</a></li>
</ul><h3>Provide security awareness training for employees</h3>

<p>Provide employees with tailored, continuous training on cyber security and device management. This will ensure they don't fall victim to malicious activities such as phishing emails and infected downloads. To learn more about cyber security event management training, consult the <a href="/en/education-community/learning-hub">Cyber Centre Learning Hub</a>. The Learning Hub offers a comprehensive event management course that can be tailored to your organization's business and information technology (IT) needs.</p>

<ul><li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Offer tailored cyber security training to your employees (ITSAP.10.093)</a></li>
</ul><h3>Consider cyber insurance</h3>

<p>Research insurance providers and policy details to determine whether cyber insurance would benefit your organization. An insurance policy may add an additional layer of protection and provide your organization with incident response expertise in the event of a ransomware attack. However, you should make sure insurance policy documents are properly protected in both of your systems. If not, sophisticated ransomware actors could obtain sensitive information on coverage amounts and leverage it in ransom negotiations. Be aware that insurance companies may deny coverage if they deem that your organization did not have adequate cyber security measures in place.</p>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info" id="protect">How to protect your organization</h2>

<p>Ransomware is among the most common type of malware and can be one of the most damaging cyber attacks to your organization. Use the following guidance to protect your organization from ransomware attacks.</p>

<h3>Enforce strong authentication methods</h3>

<p>Activate phishing-resistant multi-factor authentication (MFA) and use strong and unique passphrases or passwords on all devices and for every account.</p>

<p>In addition to using <abbr title="multi-factor authentication">MFA</abbr>, you should encourage employees to use a password manager. Password managers can help users remember and secure passwords or passphrases. Your organization should also consider implementing password vaults for administrative accounts. Password vaults provide greater protection as the passwords or passphrases are cycled and synchronized with your systems.</p>

<ul><li><a href="/en/guidance/steps-effectively-deploying-multi-factor-authentication-mfa-itsap00105">Steps for effectively deploying multi-factor authentication (ITSAP.00.105)</a></li>
	<li><a href="/en/guidance/best-practices-passphrases-and-passwords-itsap30032">Best practices for passphrases and passwords (ITSAP.30.032)</a></li>
	<li><a href="/en/guidance/password-managers-security-itsap30025">Password managers: Security tips (ITSAP.30.025)</a></li>
</ul><h3>Implement the principle of least privilege</h3>

<p>Applying the principle of least privilege can help you manage and monitor user accounts and access. Provide employees with access to only the functions and privileges necessary to complete their tasks. One way to accomplish this is to implement role-based access control which maps users' access rights to their role within the organization.</p>

<h3>Restrict administrative privileges</h3>

<p>You should limit the number of administrative or privileged users for operating systems and applications. Users should never have privileged access on their desktop or laptop systems. Users with administrative privileges should have a separate administrative account with separate credentials, regardless of whether your organization has a cloud, on-premises or hybrid environment.</p>

<p>You should also create different levels of administrative accounts to limit the level of exposure if an administrative account is compromised. In addition, you should Implement required confirmation for any actions that need elevated permissions.<strong> </strong></p>

<p><a href="/en/guidance/managing-and-controlling-administrative-privileges-itsap10094">Managing and controlling administrative privileges (ITSAP.10.094)</a></p>

<h3>Update and patch systems and devices</h3>

<p>Check for updates and patches to improve usability and performance and repair known bugs and vulnerabilities in your software, firmware and operating systems. Threat actors can easily exploit unpatched or unsupported systems and devices.</p>

<p><a href="/en/guidance/how-updates-secure-your-device-itsap10096">How updates secure your device (ITSAP.10.096)</a></p>

<h3>Deactivate macros</h3>

<p>Ensure you deactivate macros as your default to reduce the risk of ransomware being spread through Microsoft Office attachments. Newer versions of Microsoft Office will deactivate macros from the Internet by default.</p>

<p><a href="/en/guidance/how-protect-your-organization-malicious-macros-itsap00200">How to protect your organization from malicious macros (ITSAP.00.200)</a></p>

<h3>Segment networks</h3>

<p>Divide your network into several smaller components. This makes it more difficult for ransomware to spread across the entire network. Your organization should have an inventory of its essential business information that is classified and categorized based on its level of sensitivity or privacy impact. Segment and group infrastructure services that have the same information protection requirements or that must adhere to the same communications security policies.</p>

<p><a href="/en/guidance/top-10-security-actions-no-5-segment-and-separate-information-itsm10092">Action no. 5 segment and separate information (ITSM.10.092)</a></p>

<h3>Set up security tools</h3>

<p>Install antimalware and antivirus software on your devices to detect malicious activity and secure your network with a firewall to protect connected devices. Consider installing domain name system (DNS) filtering on your mobile devices to block malicious websites and filter harmful content. The Canadian Internet Registration Authority offers a free protective <abbr title="domain name system">DNS</abbr> service, <a href="https://www.cira.ca/cybersecurity-services/canadian-shield">Canadian Shield</a>, that prevents you from connecting to malicious websites that may infect your devices or steal personal information.</p>

<p>Implement Domain-based Message Authentication, Reporting and Conformance (DMARC), an email authentication and reporting protocol that helps protect your organization's domains from spoofing, phishing and other malicious activities.</p>

<p>Ensure users access your network using your virtual private network (VPN). A <abbr title="virtual private network">VPN</abbr> creates a secure connection between 2 points and can be used to protect sensitive data while it is in transit.</p>

<ul><li><a href="/en/guidance/protective-domain-name-system-itsap40019">Protective Domain Name System (ITSAP.40.019)</a></li>
	<li><a href="/en/guidance/implementation-guidance-email-domain-protection">Implementation guidance: Email domain protection (ITSP.40.065 v1.1)</a></li>
	<li><a href="/en/guidance/virtual-private-networks-itsap80101">Virtual private networks (ITSAP.80.101)</a></li>
</ul><h3>Seek professional cyber security assistance</h3>

<p>Engaging with a cyber security professional early on may allow you to recover your systems and data more quickly than relying on your internal <abbr title="information technology">IT</abbr> staff when facing a cyber incident.</p>

<h2 class="text-info" id="recover">How to recover from a ransomware attack</h2>

<p>Consider the following steps to help remove and reduce the spread of ransomware.</p>

<h3>Isolate the devices immediately</h3>

<p>Take your devices offline to stop the ransomware from spreading to other connected devices. We recommend you do not power down the device once it's isolated. This allows forensic evidence to be preserved.</p>

<p>Some ransomware strains are designed to stay dormant on a device and quietly spread to other network‑connected devices before encrypting files. In these cases, you may not be able to stop the ransomware from spreading.</p>

<h3>Report the incident</h3>

<p>Consider reporting cyber incidents to law enforcement, such as local police or the <a href="https://www.antifraudcentre-centreantifraude.ca/report-signalez-eng.htm">Canadian Anti-Fraud Centre</a>, as well as to the Cyber Centre online through <a href="https://portal-portail.cyber.gc.ca/en/report/">My Cyber Portal</a></p>

<p>If you are comfortable doing so, share your findings, including the tools, techniques and procedures used by the threat actor, with the Cyber Centre</p>

<p>Communicate the incident to the employees listed in your incident response plan and give them clear direction as to their roles and responsibilities to help manage the incident. This should already be defined within your recovery plan.</p>

<h3>Change passphrases</h3>

<p>Reset credentials including passphrases on all systems, devices and accounts. Threat actors often save this information for future attacks.</p>

<h3>Identify the type of ransomware</h3>

<p>Use the information in the ransom note (such as listed URLs) and the new file extensions your encrypted files inherited to research possible reoccurring attacks and identify the ransomware. This information will also be useful for law enforcement and/or your contracted managed security service if you have one.</p>

<p>If you locate a decryption tool online, or if law enforcement can provide you with one, proceed to remediation.</p>

<p>If there is no decryption tool available online for your strain of ransomware, sanitize your device and reinstall the operating system if law enforcement or a managed security service is not involved.</p>

<ul><li><a href="/en/guidance/sanitization-and-disposal-electronic-devices-itsap40006">Sanitization and disposal of electronic devices (ITSAP.40.006)</a></li>
</ul><h3>Remediate the point of entry</h3>

<p>Before reconnecting your systems and devices to your network or the Internet, identify how the threat actor entered your environment. Once the vectors have been identified, you should apply appropriate security measures to prevent a repeat attack.</p>

<h3>Restore from your backup</h3>

<p>Store your backups offline to mitigate the chance of ransomware infecting your backup files.</p>

<p>Analyze/scan your backup files and ensure they are free of ransomware or any other malware.</p>

<p>Once you are confident, restore your systems and devices from your secure backup.</p>

<h3>Update and patch</h3>

<p>Apply any available updates to your devices, hardware and software. Patch your operating system and ensure all antivirus, antimalware and firewall software is up to date.</p>

<h3>Review the incident and provide ongoing training</h3>

<p>Review the incident with your employees.</p>

<p>You should also provide ongoing training that addresses preventative actions against ransomware attacks, such as learning how to identify suspicious emails and attachments.</p>

<p>Use common threat examples and past occurrences to keep up to date and prepared for the future.</p>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info" id="risks">Risks of paying the ransom</h2>

<p>The decision to pay a cyber threat actor to release your files or devices should not be taken lightly. Before you consider paying ransom, we recommend you contact your local police department to report the cybercrime. Paying the ransom will not guarantee access to your encrypted data or systems. Even if you pay, threat actors may still:</p>

<ul><li>demand more money</li>
	<li>continue to infect your devices and systems or those of other organizations</li>
	<li>retarget your organization with a new attack</li>
	<li>copy, leak or sell your data</li>
</ul><h2 class="text-info" id="learn">Learn more</h2>

<p>Consult the following guidance to learn more:</p>

<ul><li><a href="/en/guidance/ransomware-playbook-itsm00099">Ransomware playbook (ITSM.00.099)</a></li>
	<li><a href="#">Ransomware threat outlook 2025-2027</a></li>
	<li><a href="/en/guidance/cyber-security-considerations-consumers-managed-services-itsm50030">Cyber security considerations for consumers of managed services (ITSM.50.030)</a></li>
	<li><a href="/en/guidance/have-you-been-hacked-itsap00015">Have you been hacked? (ITSAP.00.015)</a></li>
	<li><a href="/en/guidance/preventative-security-tools-itsap00058">Preventative security tools (ITSAP.00.058)</a></li>
	<li><a href="/en/guidance/spotting-malicious-email-messages-itsap00100">Spotting malicious email messages (ITSAP.00.100)</a></li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://www.canada.ca/en/communications-security/news/2025/12/cyber-centre-releases-ransomware-threat-outlook-2025-to-2027.html</id><link rel="alternate" href="https://www.canada.ca/en/communications-security/news/2025/12/cyber-centre-releases-ransomware-threat-outlook-2025-to-2027.html"/><title><![CDATA[Cyber Centre releases Ransomware Threat Outlook 2025 to 2027]]></title><updated>2026-01-28T16:06:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7208" about="/en/news-events/cyber-centre-releases-ransomware-threat-outlook-2025-2027" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/ransomware-playbook-itsm00099</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/ransomware-playbook-itsm00099"/><title><![CDATA[Ransomware playbook (ITSM.00.099)]]></title><updated>2026-01-28T16:05:00Z</updated><summary><![CDATA[The information provided in this publication is intended to inform organizations and help them reduce the risks of ransomware attacks, lessen the impact of these attacks, and take preventative actions.]]></summary><content><![CDATA[<article data-history-node-id="657" about="/en/guidance/ransomware-playbook-itsm00099" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><section><div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format:</strong> <a href="/sites/default/files/itsm00099-ransomware-playbook-e.pdf">Ransomware playbook (ITSM.00.099 - PDF, 1.29 MB)</a></p>
</div>

<h2 class="mrgn-tp-0 text-info" id="overview">Overview</h2>

<p>Ransomware is a type of malware that denies a user’s access to a system or data until they pay a sum of money. It can have a devastating impact on organizations and individuals. Vital data and devices can be rendered inaccessible, leaving organizations unable to conduct business or serve clients.</p>

<p>We have seen an increased number of ransomware attacks affecting Canadian organizations and individuals. The Cyber Centre’s <a href="/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a> (NCTA) specifically notes that ransomware is the top cybercrime threat facing Canada’s critical infrastructure. Ransomware directly disrupts critical infrastructure entities’ ability to deliver critical services, which can put the physical and emotional wellbeing of victims in jeopardy. In the next 2 years, threat actors carrying out ransomware attacks will remain a significant threat to Canada.</p>

<p>Threat actors have adjusted their tactics to include coercing victim organizations to pay a ransom by threatening to release stolen data or authentication credentials to publicly embarrass the organization. The <abbr title="National Cyber Threat Assessment">NCTA</abbr> notes that threat actors will very likely continue leveraging advancements in areas like artificial intelligence (AI) and cryptocurrency while developing new extortion tactics to increase their financial reward. Ransomware incidents have become more sophisticated, targeted and complex. It is increasingly difficult for organizations to defend against and recover from these attacks, especially if an organization has limited cyber security resources.</p>

<p>Threat actors have also become more covert in their operations. They start by gaining access to an organization’s communications systems to identify critical systems and high-value data that could cause reputational damage if leaked to the public. Threat actors then deploy the ransomware to the datasets and systems of highest importance or value, compromising the organization. In addition, threat actors actively monitor the organization’s communications and planned recovery actions to undermine response efforts and further infiltrate networks and connected devices.</p>

<p>The information provided in this publication is intended to inform organizations and help them reduce the risks of ransomware attacks, lessen the impact of these attacks, and take preventative actions. It can also help organizations to articulate business and security requirements and implement relevant policies and procedures related to cybercrime.</p>

<p>This publication introduces ransomware, threat actor motivations and gains, and measures to prevent these attacks and protect your organization. This publication is broken down into 3 sections:</p>

<ul class="lst-spcd"><li><strong>Ransomware explained:</strong> In this section, we define ransomware and outline the common vectors used to infect networks and devices.</li>
	<li><strong>How to defend against cyber threats:</strong> In this section, we provide a list of preventative measures you can take to protect your organization and offer checklists for specific mitigation measures. When you apply these measures, you enhance your cyber hygiene and protection against cyber incidents and threat actors, including ransomware.</li>
	<li><strong>How to recover from ransomware incidents:</strong> This section includes guidance on immediate actions organizations can take when ransomware is discovered, recovery measures, and methods to evaluate the incident and enhance security measures. By following the recommendations in this section, organizations can better respond to an incident and decrease the risk of your organization being a repeat victim of ransomware.</li>
</ul><section class="panel panel-primary mrgn-tp-md"><header class="panel-heading"><h3 class="mrgn-tp-sm">If you believe you are a victim of ransomware:</h3>
</header><div class="panel-body">
<ol class="lst-spcd"><li>Read the advice and guidance on how to recover in <a href="#defend">How to defend against cyber threats</a></li>
	<li>Report the ransomware incident:
	<ol class="lst-lwr-alph"><li>to your local police</li>
		<li>to the <a href="https://www.antifraudcentre-centreantifraude.ca/report-signalez-eng.htm#a1a">Canadian Anti-Fraud Centre</a></li>
		<li>to the <a href="https://portal-portail.cyber.gc.ca/en/report/">Cyber Centre</a></li>
	</ol></li>
	<li>Once your recovery efforts are in place, read <a href="#recover">How to recover from ransomware incidents</a> for advice on how to improve your cyber security environment</li>
</ol></div>
</section></section><section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#overview">Overview</a></li>
	<li><a href="#explained">Ransomware explained</a>
	<ul><li><a href="#how-works">How ransomware works</a></li>
		<li><a href="#vectors">Common ransomware vectors</a></li>
		<li><a href="#targets">Ransomware targets</a></li>
		<li><a href="#payment">Ransomware payment</a></li>
	</ul></li>
	<li><a href="#defend">How to defend against cyber threats</a>
	<ul><li><a href="#cyber-defence">Cyber defence planning</a></li>
		<li><a href="#cyber-security">Cyber security controls</a></li>
		<li><a href="#protect-email">Protect email domains</a></li>
	</ul></li>
	<li><a href="#recover">How to recover from ransomware incidents</a>
	<ul><li><a href="#recovery-process">Recovery process</a></li>
	</ul></li>
	<li><a href="#summary">Summary</a>
	<ul><li><a href="#effective-date">Effective date</a></li>
		<li><a href="#revision-history">Revision history</a></li>
	</ul></li>
</ul><h3>List of figures</h3>

<ul class="list-unstyled"><li><a href="#figure1">Figure 1: How ransomware incidents occur</a></li>
	<li><a href="#figure2">Figure 2: Security controls to reduce the risk of a ransomware incident</a></li>
</ul></details><div class="clearfix"> </div>
</section><section><h2 class="page-header text-info" id="explained">Ransomware explained</h2>

<p>Ransomware is a type of malware that denies a user’s access to files or systems until a sum of money is paid. Ransomware has evolved to also include incidents where data theft and extortion is used in place of encryption. Ransomware incidents can devastate your organization by disrupting your business processes and critical functions that depend on network and system connectivity. For more information on the evolving ransomware threat in Canada, read <a href="/en/guidance/ransomware-threat-outlook-2025-2027">Ransomware threat outlook 2025-2027</a>.</p>

<h3 id="how-works">How ransomware works</h3>

<p>When ransomware infects a device, it either locks the system or encrypts the storage, preventing access to the information and systems on your devices. Threat actors can also use your compromised network to spread the ransomware to other connected systems and devices.</p>

<p>The following actions can lead to ransomware infecting your networks and devices:</p>

<ul class="lst-spcd"><li>visiting unsafe, suspicious, or compromised websites</li>
	<li>opening attachments or files from familiar or unfamiliar sources that have been infected</li>
	<li>clicking on links in emails, social media and peer-to-peer networks</li>
	<li>inserting an infected peripheral device (for example, a USB flash drive) into a different device</li>
	<li>exposing your systems to the Internet unnecessarily or without robust security and maintenance measures, such as
	<ul><li>not implementing intrusion detection and prevention systems (IDPS)</li>
		<li>operating end-of-life or unpatched devices</li>
		<li>not using multi-factor authentication (MFA)</li>
	</ul></li>
</ul><p>If your organization falls victim to ransomware, users or administrators will receive a notification indicating that files have been encrypted and will be inaccessible until the ransom is paid. You may also receive a message on your lock screen indicating that your device is locked and inaccessible until the ransom is paid. The message will instruct you to pay a ransom to unlock the device and retrieve the files.</p>

<p>Cybercriminals often request payment in the form of cryptocurrency because it can be difficult to trace the transfer. <a href="https://fintrac-canafe.canada.ca/intro-eng">The Financial Transactions and Reports Analysis Centre of Canada</a> stated in 2023 that the most prevalent form of money laundering involving virtual currencies is the movement of proceeds derived from fraud and ransomware attacks. You could also be asked to pay with prepaid credit cards or gift cards. Threat actors will give you a time limit to pay the ransom, after which they may increase the ransom amount, destroy your files permanently or leak your data. More sophisticated tactics may include double extortion. A threat actor not only encrypts a victim’s data but also steals it before encryption. This means the victim faces 2 threats: having to pay to decrypt their data and pay again to prevent public release of the stolen data.</p>

<p><a href="/en/guidance/national-cyber-threat-assessment-2025-2026">The National Cyber Threat Assessment (NCTA) 2025-2026</a> states that threat actors are constantly evolving their strategies and adapting their techniques to maximize profits and evade law enforcement detection. These financial incentives combined with the flexibility of the ransomware-as-a-service (RaaS) model have almost certainly bolstered threat actors’ resiliency in the face of law enforcement disruptions.</p>

<p>Ransomware attacks have become more sophisticated and often employ a combination of attack vectors. These may include sending a phishing email to your organization or conducting attacks on authentication, which is when the threat actor uses login attempts or password guessing to access your systems.</p>

<p>Ransomware can also spread to the systems and networks of other organizations connected by supply chains. For example, an organization that provides services to clients via interconnected networks and client management systems could be targeted by ransomware. The threat actor could then use the interconnected networks or client management systems to infect other organizations within the supply chain with ransomware. These organizations would then be locked out of their systems, disrupting their operations.</p>

<p>The new generation of artificial intelligence (AI), agentic <abbr title="artificial intelligence">AI</abbr>, introduces a transformative risk to cyber security by enabling ransomware operations that are:</p>

<ul class="lst-spcd"><li><strong>autonomous:</strong> <abbr title="artificial intelligence">AI</abbr> agents are no longer reliant on human intervention and can act independently throughout the attack lifecycle</li>
	<li><strong>efficient:</strong> activities like reconnaissance, exploitation, encryption, which once took days or weeks, can now be compressed into minutes</li>
	<li><strong>adaptive:</strong> these agents can assess their environment, select optimal tactics, evade detection and recover from failed attempts dynamically</li>
	<li><strong>covert:</strong> <abbr title="artificial intelligence">AI</abbr> with capabilities to erase traces and obfuscate behaviour make forensic investigations much more difficult</li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<p class="mrgn-tp-md">In practice, agentic <abbr title="artificial intelligence">AI</abbr> can discover weak points in a network, bypass defences, deploy malware and erase evidence of the intrusion, all in a single <abbr title="artificial intelligence">AI</abbr>-managed activity stream. However, just as agentic AI poses a new challenge for cyber security, it also offers potential defensive benefits. Security teams could deploy autonomous <abbr title="artificial intelligence">AI</abbr> agents to monitor networks, detect anomalies or even create decoy systems that mislead attackers. They can detect early indicators of intrusion, such as sudden file encryption, unauthorized access attempts, or abnormal lateral movement within systems. Unlike traditional monitoring tools, agentic <abbr title="artificial intelligence">AI</abbr> doesn’t rely solely on known signatures; it uses behavioural analysis and anomaly detection to identify novel or stealthy threats that might otherwise go unnoticed.</p>

<p>When a ransomware threat is detected, agentic <abbr title="artificial intelligence">AI</abbr> can autonomously initiate a rapid incident response. This may include isolating infected endpoints from the network, terminating malicious processes, restoring files from secure backups and notifying human security teams. These actions, which typically take minutes or hours when performed manually, can be executed in seconds, significantly reducing the impact of an attack.</p>

<p>It is crucial to carefully assess the risks and establish appropriate oversight when integrating <abbr title="artificial intelligence">AI</abbr> into an organization’s ransomware detection and mitigation chain. Consider the following safeguards:</p>

<ul class="lst-spcd"><li>Data categorization: Categorize data at every stage (training, validation, inference and monitoring) to evaluate risk factors related to privacy, security, robustness and ethical considerations.</li>
	<li>Beyond standard software assurance: Assess input data quality, model use cases, and system dependencies. Map <abbr title="artificial intelligence">AI</abbr>-vetting procedures to the Cyber Centre’s <a href="/en/guidance/it-security-risk-management-lifecycle-approach-itsg-33">IT security risk management: A lifecycle approach (ITSG-33)</a> security controls, tailored to your organization’s risk profile.</li>
	<li>Continuous monitoring: Employ automated tools for anomaly detection, output drift and system telemetry. Closely monitor for unauthorized model updates or unexpected behavioural changes. Robust auditing, logging and incident response mechanisms must be established for accountability and forensic analysis.</li>
	<li>Guardrails and controls: Implement technical guardrails for data inputs/outputs, application programming interfaces (APIs) and, where applicable, enforce Model-Context-Protocol (MCP) standards. Guardrails should account for the model’s multilingual functionalities and prevent misuse in both human and computer languages.</li>
	<li>Human-in-the-loop oversight: Ensure critical response decisions involve qualified personnel to minimize risks associated with false positives/negatives, hallucinations or adversarial manipulation of the large language models. Prevent high-impact automated decisions without human review.</li>
	<li>Periodic retraining: For locally managed models, perform routine retraining using validated, diverse, and unbiased datasets to maintain resilience and reduce systemic risks.</li>
	<li>Governance and accountability: Develop and maintain organizational policies, roles, and accountability structures focused on overseeing risk management across the <abbr title="artificial intelligence">AI</abbr> lifecycle, in accordance with the National Institute of Standards and Technology's (NIST) <a href="https://www.nist.gov/itl/ai-risk-management-framework">AI Risk Management Framework (RMF)</a> and Cyber Centre guidance. If deployed as part of the Government of Canada (GC), ensure that the Treasury Board of Canada Secretariat (TBS) <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=32592">Directive on Automated Decision-Making</a> is adhered to.</li>
</ul><p>Agentic <abbr title="artificial intelligence">AI</abbr> represents a major shift in the cyber security landscape, offering both enhanced offensive capabilities for attackers and powerful new defensive tools for organizations.</p>

<p>Figure 1 below provides a visual representation of how ransomware can infect an organization’s networks and devices. It highlights the 3 main access vectors commonly used in ransomware incidents:</p>

<ul class="lst-spcd"><li>attacks on authentication (password guessing)</li>
	<li>exploiting vulnerabilities in your software</li>
	<li>executing phishing attacks</li>
</ul><p>Figure 1 also highlights the 3 stages of a ransomware incident:</p>

<ol class="lst-spcd"><li>The threat actor gains access to your network</li>
	<li>They take control of your systems and connected devices</li>
	<li>They deploy the malware payload to infect your systems and connected devices with ransomware</li>
</ol><p>Once the threat actor has full control of your network, systems and devices, they can encrypt your data, delete available connected backup files and often steal your organization’s data. They may threaten to leak this data if you do not pay the ransom, or they may say they will decrypt your data and restore your access to it if you pay the ransom.</p>
<!-- Figure 1 -->

<section class="row"><div class="col-md-12">
<div class="panel panel-default col-md-8 col-md-offset-1">
<div class="panel-body">
<h4 class="text-center" id="figure1">Figure 1 : How ransomware incidents occur</h4>

<figure><img alt="Long description immediately follows" class="img-responsive center-block mrgn-bttm-md" src="/sites/default/files/images/cyber-ransomware-playbook-figure1-e.png" /></figure><details><summary>Long description - How ransomware incidents occur </summary><p>This image depicts the methodology that a threat actor generally uses to gain access to your network, systems and connected devices. There are 3 stages to a ransomware incident. The threat actor:</p>

<ul><li>gains entry to your network, systems or devices</li>
	<li>takes control and deploys the ransomware</li>
	<li>encrypts your data, destroys your backups and steals your organizational data then demands a ransom payment to have your access restored</li>
</ul><p>During the first phase of the ransomware incident, a threat actor usually finds their entry point to your network through:</p>

<ul><li>brute force (password guessing)</li>
	<li>vulnerabilities in your software</li>
	<li>phishing attacks
	<ul><li>the threat actor attempts to solicit confidential information from an individual, group or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain</li>
		<li>phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts</li>
	</ul></li>
</ul><p>Once the threat actor has gained access to your network, they move onto the second phase of the ransomware attack: taking control of your systems and connected devices. They deploy the malware payload and infect your systems and connected devices with ransomware.</p>

<p>Once they have full control, the threat actor will move onto the third phase of the ransomware attack by encrypting your data, deleting available or connected backup files and often stealing your organization’s data. They may threaten to leak this data if you do not pay the ransom, or they may say they will decrypt your data and restore your access to it if you pay the ransom.</p>
</details></div>
</div>
</div>
</section><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h3 id="vectors">Common ransomware vectors</h3>

<p>Threat actors can exploit many vulnerabilities and leverage many attack vectors to infect your network, systems, and devices with ransomware. The following are examples of the most common ransomware vectors used by threat actors.</p>

<h4 class="text-info">Cybercrime-as-a-service</h4>

<p>With cybercrime-as-a-service (CaaS), specialized threat actors sell stolen and leaked data and ready-to-use malicious tools to other cybercriminals online, enabling their illicit activities. The <abbr title="cybercrime-as-a-service">CaaS</abbr> ecosystem is underpinned by flourishing online marketplaces.</p>

<h4 class="text-info">Ransomware-as-a-service</h4>

<p><abbr title="ransomware-as-a-service">RaaS</abbr> is a <abbr title="cybercrime-as-a-service">CaaS</abbr> business model in which threat actors, regardless of their skills, can purchase malware from developers on the dark web. The developers receive a portion of the ransom paid by the victim. Most of the top ransomware groups affecting Canada operate on a <abbr title="ransomware-as-a-service">RaaS</abbr> business model where a core group of ransomware actors sell or lease their ransomware variant to affiliates who launch attacks. The <abbr title="National Cyber Threat Assessment">NCTA</abbr> 2025-2026 judges that the continued popularity of <abbr title="ransomware-as-a-service">RaaS</abbr> is almost certainly contributing to the rise in ransomware incidents by lowering the technical and administrative barriers to entry for more actors to carry out attacks.</p>

<h4 class="text-info">Phishing</h4>

<p>Phishing is a type of social engineering attack that uses text, email or social media to trick users into clicking a malicious link or attachment, revealing sensitive information or making a change in a system. Phishing attempts are often generic mass messages and can appear to be legitimate and from a trusted source, such as a bank. For more information on phishing, read <a href="/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks">Don't take the bait: Recognize and avoid phishing attacks (ITSAP.00.101)</a>.</p>

<h4 class="text-info">Drive-by download</h4>

<p>Drive-by download occurs when a user unknowingly visits an infected website and unintentionally downloads and installs malware onto their device or system.</p>

<h4 class="text-info">Malvertising</h4>

<p>Malvertising injects malicious code into legitimate online advertisements. When a user clicks the ad, malware spreads to their device. Some malvertising does not even rely on user interactions and can distribute malicious code simply by being displayed.</p>

<h4 class="text-info">Exposed services</h4>

<p>Exposed services, such as Remote Desktop Protocol (RDP) and content management systems, allow access to your systems. Threat actors can use a variety of tactics, such as exploiting common vulnerabilities and password spraying, to access your devices via these exposed systems and deploy ransomware.</p>

<h4 class="text-info">Email spoofing</h4>

<p>Threat actors can use managed service provider (MSP) identities and other third-party identities to spoof emails or conduct phishing attacks against your organization. To better protect your organization from these types of threats, read our publication <a href="/en/guidance/cyber-security-considerations-consumers-managed-services-itsm50030">Cyber security considerations for consumers of managed services (ITSM.50.030)</a>.</p>

<h4 class="text-info">Supply chain attacks</h4>

<p>Supply chain attacks allow threat actors to infiltrate a service supply organization and force an update to connected customers, which can then infect their systems and devices with ransomware. The Cyber Centre provides guidance on how to secure your organization’s supply chain in our publication <a href="/en/guidance/supply-chain-security-small-and-medium-sized-organizations-itsap00070">Cyber supply chain security for small and medium-sized organizations (ITSAP.00.070)</a>.</p>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h3 id="targets">Ransomware targets</h3>

<p>In the <abbr title="National Cyber Threat Assessment">NCTA</abbr> 2025-2026, the Cyber Centre assessed that ransomware directed against Canada will almost certainly continue to target large enterprises and critical infrastructure providers. This, however, does not mean that other organizations or individuals are safe from the threat of ransomware. Any organization can be the victim of ransomware given the need for data to carry out core business functions. The <abbr title="National Cyber Threat Assessment">NCTA</abbr> states that in the next 2 years, ransomware actors will almost certainly escalate their extortion tactics and refine their capabilities to increase pressure on victims to pay ransoms and evade law enforcement detection.</p>

<p>As with most cybercrimes, ransomware attacks are financially motivated. Threat actors will target organizations of any size and demand a ransom amount based on what they believe an organization will pay to recover its encrypted data.</p>

<p>Ransomware attacks can have major impacts, including:</p>

<ul><li>privacy and data breaches</li>
	<li>reputational damage</li>
	<li>productivity loss</li>
	<li>legal repercussions</li>
	<li>recovery costs</li>
	<li>damage to infrastructure and operations</li>
</ul><p>Ransomware actors are mostly opportunistic and do not necessarily target specific industries. However, ransomware is the top cybercrime threat facing Canada’s critical infrastructure because it can immobilize critical business operations, destroy or damage important business data and reveal sensitive information. In addition to the financial losses associated with repairing and restoring systems and operations, ransomware attacks can disrupt critical services and jeopardize the safety and wellbeing of victims and those that rely on their services.</p>

<p>Critical infrastructure is an attractive target for ransomware actors because they perceive these entities as more willing to pay large ransoms to prevent disruptions to critical operations. According to the <abbr title="National Cyber Threat Assessment">NCTA</abbr>, ransomware victims in 2023 were becoming less likely to pay ransom demands. The perceived opportunities to earn high profits, combined with victims’ reduced willingness to pay, has almost certainly encouraged more technically sophisticated ransomware groups to elevate their extortion techniques and hire skilled affiliates capable of targeting critical infrastructure entities to extract larger ransom payouts.</p>

<p>Small and medium-sized organizations are also targets, as threat actors consider their security measures to be weaker and more susceptible to attacks. Small and medium-sized Canadian organizations that are victims of ransomware will likely continue to give into ransom demands rather than face losing business or having to rebuild their networks. They likely also fear the potentially destructive consequences of refusing payment.</p>

<p>Cyber threat actors often steal information during a ransomware attack. Threat actors can hold data for ransom, sell it or use it to gain an unfair competitive advantage by exploiting proprietary or patented information. The theft of organizational information, including intellectual property and customer and client data, can have both short- and long-term financial consequences for victims. These include impacts to global competitiveness, reputational damage and identity theft.</p>

<p>Vendor concentration is increasing organizations’ vulnerability to cyber threats like ransomware. A small number of large digital service providers, each with a large user base, provide many technology services. A cyber incident involving a single, dominant service provider can therefore affect an entire sector. Cyber threat actors target dominant vendors to steal customer data or demand ransom payments. The compromise of dominant service providers can amplify the impact of cyber security incidents. Cyber threat activity against services that are digital chokepoints (single points of failure within supply chains) can cause cascading and system-wide disruptions to the economy and society and endanger national security.</p>

<p>Finally, the cyber threat surface is expanding. In addition to the ongoing adoption and deployment of the Internet of Things (for example, connected vehicles), the boom in <abbr title="artificial intelligence">AI</abbr> platforms and services is forecasted to drive demand for supporting infrastructure and lead to the transfer of even more data to cloud environments. It is also likely that <abbr title="artificial intelligence">AI</abbr>-focused organizations are now more prominent targets for cyber threat actors and ransomware.</p>

<h3 id="payment">Ransomware payment</h3>

<p>The decision to pay a cybercriminal to release your files is difficult, and you will likely feel pressured to give into their demands. Before you even consider paying, contact your local police department to report the cybercrime. Paying the ransom will not guarantee access to your encrypted data or systems.</p>

<p>The decision to pay the ransom is up to your organization, but it is important to be fully aware of the risks associated with paying. For example, threat actors may use wiper malware, which alters or permanently deletes your files once you pay the ransom. Paying the ransom also validates <abbr title="ransomware-as-a-service">RaaS</abbr> as a business model, which will encourage its growth and fund new attacks. Payment may also be used to fund other illicit activities, possibly including organized crime, terrorism or state-sponsored violence. Furthermore, it may be unlawful to pay ransom under laws against terrorism, money laundering, funding criminal organization activities, or sanctions legislation. Even if you pay, threat actors may still:</p>

<ul class="lst-spcd"><li>demand more money</li>
	<li>continue to infect your devices and systems or those of other organizations</li>
	<li>retarget your organization with a new attack</li>
	<li>copy, leak or sell your data</li>
</ul><p>The <abbr title="National Cyber Threat Assessment">NCTA</abbr> 2025-2026 displays the relative number of Canadian ransomware incidents reported to the Cyber Centre by Canadian victims between 2021 and 2024. Based on our data, the number of ransomware incidents has increased, on average, by 26% each year. Since many ransomware incidents go unreported, it is almost certain that the true number of ransomware incidents impacting Canada is higher than what is displayed. <a href="https://www.statcan.gc.ca/en/survey/business/5244">The Canadian Survey of Cyber Security and Cybercrime (CSCSC)</a>, conducted by Statistics Canada on behalf of Public Safety Canada, reported that the total recovery costs associated with cyber security incidents in 2023 doubled to $1.2 billion CAD.</p>
</section><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!-- How to defend against cyber threats -->

<section><h2 class="page-header text-info" id="defend">How to defend against cyber threats</h2>

<p>Ransomware is among the most common types of malware and can be one of the most damaging cyber attacks to your organization. Single mitigation measures are not robust enough to combat the evolving threat of ransomware. Your organization should adopt a defence-in-depth (multi-layer) strategy to protect its devices, systems, and networks from ransomware and other types of malware and cyber attacks. Your strategy should include multiple layers of defence with several mitigation measures or security controls at each layer.</p>

<h3 id="cyber-defence">Cyber defence planning</h3>

<p>There are many approaches you can take to better protect your networks, systems, and devices. The following is a list of security controls you can implement to strengthen your cyber security posture.</p>

<h4 class="text-info">Develop your backup plan</h4>

<p>Develop and implement a backup plan for your organization. A backup is a copy of your data and systems that can be restored in the event of an incident. There are several types of backups you can implement to protect your organization’s information:</p>

<ul class="lst-spcd"><li><strong>Full:</strong> You may want to do a full backup periodically (weekly or monthly) and before major system upgrades. A full backup is the most expensive and time-consuming option, depending on the amount of information being backed up and your storage requirements.</li>
	<li><strong>Differential:</strong> A differential backup only creates a copy of data that has changed since your last full backup.</li>
	<li><strong>Incremental:</strong> With incremental backups, you are only storing the data that has changed since your last full or differential backup. Each increment is saved as an incremental volume. If you need to restore data, you must process each increment, which can be time consuming.</li>
</ul><h5>Storing your backups</h5>

<p>There are 3 options for storing your backups: online, offline, and in the cloud.</p>

<p>Online backups are:</p>

<ul class="lst-spcd"><li>stored within the physical space of your organization</li>
	<li>readily available should you need to initiate your recovery process</li>
	<li>susceptible to data loss in the event of a natural disaster or power surge</li>
	<li>vulnerable to ransomware if connected to your systems or networks</li>
</ul><p>Offline backups (also known as cold backups) are:</p>

<ul class="lst-spcd"><li>stored in separate physical locations from your organization’s main centre</li>
	<li>disconnected from your networks</li>
</ul><p>Although data loss and theft are still possible, but having backups offline can prevent threat actors from accessing and infecting your backups with ransomware.</p>

<p>Cloud backups are:</p>

<ul class="lst-spcd"><li>stored on a cloud platform, often maintained by a cloud service provider (CSP)</li>
	<li>available through your <abbr title="cloud service provider">CSP</abbr>’s server and can be accessed from anywhere</li>
	<li>encrypted in the cloud for additional security, but data loss and cyber attacks (including ransomware) can still occur</li>
</ul><h5>Protecting your backups</h5>

<p>Many ransomware variants are designed to locate, spread to and delete your system backups. Threat actors see this action as additional assurance to receive payment from your organization. If the ransomware spreads to your backups, you will be unable to restore and recover your systems and data, which ultimately halts your business operations. Most commonly, backups stored online or in the cloud are susceptible to ransomware. Storing your organization’s backups offline offers you the most protection against ransomware incidents.</p>

<p>Your organization should implement an offline backup process. Your backups will not be connected to your networks or devices, which ensures ransomware cannot locate and delete your backups. Ensure your organization has multiple backups stored offline and conducts the backup process frequently, to guarantee data is as close to real time as possible. Testing your backups is also a crucial element to your backup and recovery process. To ensure an additional layer of protection, you should encrypt your backups. The Cyber Centre’s <a href="/en/guidance/guidance-becoming-cryptographically-agile-itsap40018">Guidance on becoming cryptographically agile (ITSAP.40.018)</a> and the <a href="/en/cyber-security-readiness/cross-sector-cyber-security-readiness-goals-toolkit">Cyber Security Readiness Goals Cross-Sector Toolkit</a> provide information on strong and agile encryption for data in transit.</p>

<p>Having a secondary backup in the cloud is also a recommended approach to enhancing your ability to recover. These backups will ideally be managed by a <abbr title="cloud service provider">CSP</abbr> within their secure cloud infrastructure. <abbr title="cloud service provider">CSP</abbr>s will provide an additional layer of security for your organization. Note that your organization is always legally responsible for protecting its data. You should ensure that the service provider you select can support your security, backup and recovery requirements with proper safeguards. You should also consider data residency, which refers to the geographical location where your data is stored. Your organization may have regulatory and policy requirements to ensure data is stored in Canada. If you plan to contract a vendor for offsite storage, make sure that they have security measures, incident management processes and a disaster recovery plan in place.</p>

<p><strong>Note:</strong> Your <abbr title="cloud service provider">CSP</abbr> can also be a victim of ransomware, which can indirectly impact your organization. You may not be able to access the data you have stored in the cloud, which can significantly impact your ability to do business. You may also face issues with data integrity and confidentiality.</p>

<p><strong>Recommendation:</strong> The recommended approach to backing up your information is to have multiple backups in multiple locations. You should have 2 or more backups stored offline and inaccessible by your networks and internet connection. You could then have a secondary backup in the cloud with your <abbr title="cloud service provider">CSP</abbr>. You should implement a schedule to test your backups on a regular basis (for example, monthly). Having 1 or more backup files available provides your organization with an increased chance of recovering and getting back to business more quickly if you are the victim of ransomware, or any other cyber incident.</p>

<p>For more information on developing your backup plan, see <a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002)</a>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h4 class="text-info">Develop your cyber incident response plan</h4>

<p>Developing an incident response plan for your organization is the keystone to your cyber defence strategy. You should also consider developing a disaster recovery plan for your organization. In these 2 plans, your organization considers major events that could cause an unplanned outage and could require you to activate your recovery response. Your incident response plan helps you detect and respond to cyber security incidents. Your disaster recovery plan focuses on how the organization recovers and resumes critical business functions after an incident.</p>

<p>There are many benefits to developing an incident response plan:</p>

<ul class="lst-spcd"><li>Effective incident management lessens the impact of a cyber incident</li>
	<li>A practiced plan will help you make good decisions when under the pressure of managing a real incident</li>
	<li>Key actions are approved in advance, allowing financial authorities and resources to be available in the immediate steps of your incident response</li>
	<li>A well-managed response, with clear communication throughout, builds trust with stakeholders and customers</li>
	<li>Learning from incidents identifies gaps in and issues with your response capability</li>
</ul><p>Your incident response plan should cover several key elements. The main goal is to recover from an incident as quickly as possible. The following checklist provides an overview of the key elements you should include in your incident response plan. It is not a comprehensive list of incident response requirements, but it does provide a structured approach and action items that your organization can implement.</p>

<p>By following this checklist in the preliminary stages of your incident response plan, you can identify your risks, devise a plan of action to mitigate them and prepare your organization for an efficient recovery that will allow you to get back to business quickly.</p>

<p>For more information on developing your incident response plan, read <a href="https://www.cyber.gc.ca/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan (ITSAP.40.003)</a>.</p>

<h5>Cyber incident response plan checklist</h5>

<p>Use the following incident response plan checklist to ensure your incident response is complete.</p>

<ul class="lst-spcd"><li>Conduct a risk assessment:
	<ul><li>identify key systems and assets that are critical to your business operations</li>
		<li>analyze the likelihood and impact of these systems being compromised</li>
		<li>prioritize your response efforts to ensure the most critical systems and assets are protected and backed up offline frequently and securely</li>
	</ul></li>
	<li>Develop policies and procedures:
	<ul><li>develop an incident response policy that establishes the authorities, roles and responsibilities for your organization</li>
		<li>establish and communicate pre-authorizations to contract assistance to key incident response contacts</li>
	</ul></li>
	<li>Establish your cyber incident response team (CIRT):
	<ul><li>create a <abbr title="cyber incident response team">CIRT</abbr> to
		<ul><li>assess, document, and respond to incidents</li>
			<li>restore your systems, recover information</li>
			<li>reduce the risk of another ransomware incident occurring</li>
		</ul></li>
		<li>include employees with various qualifications and have cross-functional support from other business lines</li>
		<li>designate backup responders to act for any absent <abbr title="cyber incident response team">CIRT</abbr> members in the event of an incident</li>
	</ul></li>
	<li>Deliver training:
	<ul><li>tailor your training programs to your organization’s business needs and requirements and to your employees’ roles and responsibilities</li>
		<li>ensure your training includes the cyber security controls listed (for example, spotting malicious emails and phishing attacks and using strong passphrases)</li>
		<li>for advice and guidance on cyber security event management training, email the Cyber Centre Learning Hub at <a href="mailto:education@cyber.gc.ca">education@cyber.gc.ca</a>. The Learning Hub offers a comprehensive event management course that can be tailored to your organization’s business and information technology (IT) needs</li>
	</ul></li>
	<li>Identify stakeholders:
	<ul><li>identify the internal and external key stakeholders who will be notified during an incident. You may have to alert third parties, such as clients and <abbr title="managed service provider">MSP</abbr>s</li>
		<li>depending on the incident, you may need to contact law enforcement and possibly a lawyer</li>
	</ul></li>
	<li>Develop a communications plan:
	<ul><li>detail how, when and with whom your team communicates</li>
		<li>include a central point of contact for employees to report suspected or known incidents</li>
		<li>ensure you have external contact information for all members and backup members of your <abbr title="cyber incident response team">CIRT</abbr>, key personnel and key stakeholders</li>
		<li>prepare sample media statements that can be tailored to cyber incidents as they occur</li>
		<li>consider retaining a third-party ransomware recovery organization that can guide you through your incident response and recovery process</li>
	</ul></li>
</ul><h5>Incident response process</h5>

<p>Your incident response process will follow a 4-phase lifecycle.</p>

<p><strong>Phase 1: Prepare</strong></p>

<ul class="lst-spcd"><li>Assign policies</li>
	<li>Define goals</li>
	<li>Test backup processes</li>
	<li>Test patch and update processes</li>
	<li>Track vulnerabilities</li>
	<li>Develop test exercises</li>
</ul><p><strong>Phase 2: Observe</strong></p>

<ul class="lst-spcd"><li>Develop a monitoring strategy (for example, frequency, included networks)</li>
	<li>Monitor your networks and connected devices for threats</li>
	<li>Generate event and incident reports regularly</li>
	<li>Analyze the data and determine whether you need to activate your response</li>
</ul><p><strong>Phase 3: Resolve</strong></p>

<ul class="lst-spcd"><li>Analyze your findings to fully understand the incident</li>
	<li>Determine which mitigation measures need to be put in place (for example, disconnect devices)</li>
	<li>Run antimalware and antivirus software</li>
	<li>Patch vulnerabilities</li>
	<li>Restore your systems and data via your backup</li>
	<li>Preserve evidence and document steps taken</li>
</ul><p><strong>Phase 4: Understand</strong></p>

<ul class="lst-spcd"><li>Identify the root cause of the incident</li>
	<li>Evaluate your incident response and highlight areas requiring improvement</li>
	<li>Meet with your response team and develop lessons learned and future initiatives to improve your response</li>
</ul><p>Use these 4 phases to structure your plan and your response. A primary part of your incident response should include reporting cybercrimes:</p>

<ul class="lst-spcd"><li>to your local police department</li>
	<li>online to the <a href="https://www.antifraudcentre-centreantifraude.ca/report-signalez-eng.htm#a1a">Canadian Anti-Fraud Centre</a></li>
	<li>online to the <a href="https://portal-portail.cyber.gc.ca/en/report/">Cyber Centre</a></li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h4 class="text-info" id="recoveryplan">Develop your recovery plan</h4>

<p>Your recovery plan should complement your backup plan and incident response plans. When developing your recovery response, consider many variables and clearly identify and document what is to be recovered, by whom, when and where.</p>

<h5>Guidelines for your recovery plan</h5>

<p>Use the following guidelines for your recovery plan.</p>

<p><strong>Planning</strong></p>

<ul class="lst-spcd"><li>Identify stakeholders, including clients, vendors, business owners, systems owners and managers</li>
	<li>Identify your response team members and their roles and responsibilities</li>
	<li>Take inventory of your hardware and software assets</li>
	<li>Identify and prioritize critical business functions, applications and data</li>
	<li>Prepare emergency documentation—such as a contact list for all employees, clients, service providers and suppliers—to ensure you can react quickly and efficiently in the event of a ransomware incident</li>
	<li>Conduct a tabletop exercise to ensure all participants are aware of their roles and required actions in the event of a ransomware attack</li>
	<li>Invest in cyber security insurance if you determine it to be beneficial for your organization. This may add an additional layer of protection and may also provide your organization with incident response expertise in the event of a ransomware attack</li>
</ul><p><strong>Measuring</strong></p>

<ul class="lst-spcd"><li>Set clear recovery objectives</li>
	<li>Define data backup and recovery strategies</li>
	<li>Test your plan</li>
</ul><p><strong>Communicating</strong></p>

<ul class="lst-spcd"><li>Develop a communications plan to inform key stakeholders</li>
	<li>Develop a training program for employees to ensure everyone is aware of their roles, responsibilities and the order of operations during an incident</li>
	<li>Connect with your <abbr title="managed service provider">MSP</abbr>s to identify areas where they can assist you with your recovery efforts</li>
	<li>Engage IT security specialists prior to an event to ensure you have subject-matter experts weighing in on your response and recovery efforts</li>
</ul><p>To create an effective plan, you should identify your organization’s critical data, applications and functions. Critical data may include financial records, proprietary assets and personal information. Critical applications are the systems running key functions that are imperative to your business. You will need to restore critical data, applications and functions immediately to ensure business continuity in the event of an unplanned outage or incident. You should consider conducting a risk assessment to help identify critical business functions and the relevant threat and vulnerability risks.</p>

<p>To ensure your response is effective, your organization should run through specific scenarios such as a cyber attack, a significant power outage or a natural disaster. This will help you identify key participants and stakeholders, address significant risks, develop mitigation strategies and determine recovery time and effort.</p>

<p>You can conduct a business impact analysis (BIA) to predict how disruptions or incidents will harm your operations, business processes, systems and finances. Almost all recovery processes will require a significant period without Internet connectivity to evict the attackers. Plan for this downtime in your <abbr title="business impact analysis">BIA</abbr>.</p>

<p>In your <abbr title="business impact analysis">BIA</abbr>, you should also assess the data you collect and the applications you use to determine their criticality and choose priorities for immediate recovery. It is also critical to take note of your recovery efforts, documenting what went well and what areas require improvement.</p>

<p>To learn more about developing your recovery plan, read <a href="/en/guidance/developing-your-it-recovery-plan-itsap40004">Developing your IT recovery plan (ITSAP.40.004)</a>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h4 class="text-info" id="accounts">Manage user and administrator accounts</h4>

<p>Oversee the creation and assignment of user and administrator accounts with secure access in mind. Consider creating separate accounts for non-administrative functions (for example, access to email and limited access to internal systems) to reduce the risk of ransomware infecting your administrator accounts and the system access associated with those accounts. You should limit administrator accounts to those who need full or specialized access to your organization’s network, systems and devices. Ensure you have complete segregation of duties for backup administrators relative to primary/production administrators. Pay particular attention to possible common or federated authorization management systems, such as directory services or cloud identity providers.</p>

<p>Your organization should use dedicated administrative workstations (DAWs) to create secure environments exclusively for privileged operations. Removing public Internet access from administrative workstations can substantially reduces risk of compromise. Remote access to privileged accounts should be performed on <abbr title="dedicated administrative workstations">DAWs</abbr> governed entirely by the system’s security policies and used exclusively for this purpose.</p>

<p>If a threat actor gains access to an administrative account, they can use the elevated privileges to affect your organization’s operating environment, attack your network or access sensitive information. Attackers can also learn what detection and recovery activities exist on your systems, which may help them avoid discovery and prevent you from stopping further attacks.</p>

<p>To manage access to your systems and data, apply the principle of least privilege. That is, only provide employees with access to the functions and privileges necessary to complete their tasks. You should also use the principle of least privilege when allowing remote access to your devices. Ensure you activate <abbr title="multi-factor authentication">MFA</abbr> at all access points into your network. Consider using single sign-on (SSO) access where possible to enhance the security of your devices and connected networks. Restrict administrative privileges and require confirmation for any actions that need elevated access rights and permissions.</p>

<p>When assigning administrator accounts or privileged access to users, your organization should take the following measures:</p>

<ul class="lst-spcd"><li>use strong authentication methods for your accounts
	<ul><li>use <abbr title="multi-factor authentication">MFA</abbr> for all administrative accounts</li>
		<li>use a unique passphrase for each privileged account</li>
		<li>change default passwords to unique passphrases for applications and devices</li>
		<li>authenticate users before they are granted access to applications or devices</li>
	</ul></li>
	<li>ensure that unique, identifiable accounts are attributed to individual users</li>
	<li>log and monitor actions on privileged accounts</li>
	<li>provide training on expected behaviours for privileged account users</li>
	<li>remove special access privileges when users no longer require them</li>
	<li>decommission and delete user accounts when someone leaves the organization</li>
</ul><p>To address the modern challenges of securing remote workers, protecting hybrid cloud environments and defending against cyber security threats, we recommend you implement a zero trust (ZT) security model. <abbr title="zero trust">ZT</abbr>’s central tenet is that no subject (application, user or device) in an information system is trusted by default. Trust must be reassessed and verified every time a subject requests access to a new resource. The degree of access provided is dynamically adjusted based on the level of trust established with the subject. <abbr title="zero trust">ZT</abbr> involves adopting a new mindset to security by always assuming a breach and focusing on protecting resources (for example, services and data). For more information about <abbr title="zero trust">ZT</abbr> security models, read <a href="/en/guidance/zero-trust-approach-security-architecture-itsm10008">A zero trust approach to security architecture (ITSM.10.008)</a>. In addition to managing your accounts, it is also imperative to manage the decommissioning and disconnecting of obsolete or retired systems and devices. These systems and devices must be removed from your network, sanitized and disposed of securely.</p>

<p>For more information on managing access and administrative accounts, read:</p>

<ul class="lst-spcd"><li><a href="/en/guidance/top-10-it-security-actions-no3-managing-controlling-administrative-privileges-itsm10094">Top 10 IT security actions - Managing and controlling administrative privileges (ITSM.10.094)</a></li>
	<li><a href="/en/guidance/best-practices-passphrases-and-passwords-itsap30032">Best practices for passwords and passphrases (ITSAP.30.032)</a></li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h3 id="cyber-security">Cyber security controls</h3>

<p>When implementing and maintaining a defence-in-depth model, your organization must layer security controls throughout your networks to protect the security, confidentiality, integrity and availability of your networks, devices and information.</p>

<p>As shown in Figure 2 below, a variety of security controls, layered throughout your networks, can better defend your organization from ransomware. Some of the cyber security controls identified in Figure 2 can be applied at various stages or in various areas within your network and systems. For example, logging, alerting and network segmentation should be applied in all layers of your defence-in-depth strategy.</p>

<p>To proactively mitigate threats during the first stage of a ransomware incident, it is essential to have key preventative measures and cyber security controls in place before an incident occurs. By implementing the following controls as part of your security environment, you can strengthen your organization’s ability to detect, contain, and minimize the impact of ransomware threats early on.</p>

<ul class="lst-spcd"><li>Provide your employees with tailored cyber security training to ensure they are aware of attack vectors like phishing and know how to identify suspicious emails or links</li>
	<li>Use strong passphrases to deter authentication attacks</li>
	<li>Implement <abbr title="multi-factor authentication">MFA</abbr> for your organization’s devices and systems</li>
	<li>Create an application allow list to control who or what is allowed access to your networks and systems. Application allow lists help to prevent malicious applications from being downloaded and infecting your server</li>
	<li>Scan your hardware, software and operating system for vulnerabilities. Apply patches and updates to mitigate the risk of the vulnerabilities being exploited by a threat actor</li>
	<li>Segment your network to ensure sensitive and high-value information is in a separate zone of your network</li>
	<li>Set up monitoring and logging functionality for your systems and networks and ensure you receive automated alerts if any anomalies are detected</li>
	<li>Protect systems that are connected or exposed to the Internet with
	<ul><li>encryption</li>
		<li>firewalls</li>
		<li><abbr title="implementing intrusion detection and prevention systems">IDPS</abbr></li>
		<li>frequent vulnerability assessments</li>
	</ul></li>
	<li>Deactivate macros to decrease the risk of ransomware being spread through attachments and ensure that users cannot reactivate them</li>
	<li>Block advertising to prevent ads, especially malvertising, from being displayed</li>
</ul><p>To help mitigate the threats that take place during the second stage of a ransomware incident, you can implement the following measures to better protect your systems and networks and prevent ransomware from spreading across your network and connected devices:</p>

<ul class="lst-spcd"><li>Use security tools, such as antivirus and antimalware software</li>
	<li>Use firewalls and <abbr title="implementing intrusion detection and prevention systems">IDPS</abbr> on your networks to help protect potential entry points against threat actors</li>
	<li>Apply the principle of least privilege</li>
</ul><p>In the third stage of a ransomware incident, the top pre-emptive mitigation measure for your organization is its backup plan. Ensure you have multiple copies of your backups stored offline. By having your backups disconnected from all networks, network-based threat actors will be less likely able to delete them or infect them with ransomware. Ensure that you test your backups and restore processes on a regular basis. Address any issues immediately to ensure your backup files are ready for your organization to recover quickly in the event of a ransomware incident.</p>

<p>The following section provides more detailed guidance on the various security controls your organization can implement. For more information on security controls, read:</p>

<ul class="lst-spcd"><li><a href="/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations">Baseline cyber security controls for small and medium organizations</a></li>
	<li><a href="/en/guidance/top-measures-enhance-cyber-security-small-and-medium-organizations-itsap10035">Top measures to enhance cyber security for small and medium organizations (ITSAP.10.035)</a></li>
</ul><section class="row"><div class="col-md-12">
<div class="panel panel-default col-md-8 col-md-offset-1">
<div class="panel-body">
<h4 class="text-center" id="figure2">Figure 2: Security controls to reduce the risk of a ransomware incident</h4>

<figure><img alt="Long description immediately follows" class="img-responsive center-block mrgn-bttm-md" src="/sites/default/files/images/cyber-ransomware-playbook-figure-2-e.png" /></figure><details><summary>Long description - Security controls to reduce the risk of a ransomware incident </summary><p>Figure 2 shows the same methodology that a threat actor uses to conduct a ransomware attack but highlights where security controls can be implemented to mitigate and attempt to prevent the ransomware attack from occurring.</p>

<p>In the first stage of a ransomware incident, under the “gains access” section of this diagram, there are some preventative mitigation measures that can be put in place to protect your organization. The following is a list of cyber security controls that can be implemented at the forefront of your cyber security environment:</p>

<ul class="lst-spcd"><li>Provide your employees with tailored cyber security training to ensure they are aware of attack vectors like phishing and how to identify suspicious emails or links</li>
	<li>Use of strong passwords, or preferably passphrases, to attempt to prevent threat actors from being successful in brute force attacks</li>
	<li>Implement <abbr title="multi-factor authentication">MFA</abbr> for your organization’s devices</li>
	<li>Create an application allow list to control who or what is allowed access to your networks and systems. Application allow lists help to prevent malicious applications from being downloaded and infecting your server</li>
	<li>Scan your hardware, software and operating system for vulnerabilities. Apply patches and updates to mitigate the risk of the vulnerabilities being exploited by a threat actor</li>
	<li>Segment your network to ensure sensitive and high-value information is in a different zone of your network</li>
	<li>Setup monitoring and logging functionality for your systems and networks and ensure you receive automated alerts if any anomalies are detected</li>
	<li>Protect your systems that are connected or exposed to the Internet with
	<ul><li>encryption</li>
		<li>firewalls</li>
		<li><abbr title="multi-factor authentication">MFA</abbr></li>
		<li>frequent vulnerability assessments</li>
	</ul></li>
	<li>Disable macros to decrease the risk of ransomware being spread through Microsoft Office attachments</li>
</ul><p>In the second stage of a ransomware incident, under the “takes control” section of this diagram, there are some mitigation measures you can implement to enhance the protection of your systems and networks and to prevent ransomware from spreading across your network and connected devices:</p>

<ul class="lst-spcd"><li>Implement security tools, such as antivirus and antimalware software and firewalls, to your networks to add layers of protection to potential entry points for threat actors</li>
	<li>Apply the principle of least privilege in which you provide individuals only the set of access privileges that are essential for them to perform authorized tasks</li>
</ul><p>In the third stage of a ransomware incident, under “threat actor impacts organization,” the number 1 mitigation measure you can implement for your organization is your backup plan. Ensure you have multiple copies of your backups stored offline and, if possible, in the cloud through a <abbr title="cloud service provider">CSP</abbr>. By having your backups disconnected from your network, threat actors cannot delete them or infect them with ransomware. Ensure you test your backup and restore processes frequently and adjust any issues immediately to ensure your backup files are ready for your organization to recover quickly in the event of a ransomware incident.</p>
</details></div>
</div>
</div>
</section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h4 class="text-info">Create an application allow list</h4>

<p>An application allow list is a corporate portfolio of approved software. The list is enforced so that only approved software gets installed in an organization’s various systems. An allow list selects and approves specific applications and application components (for example, executable programs, software libraries or configuration files) to run on organizational systems. Application allow lists help to prevent malicious applications from being downloaded and infecting your server.</p>

<p>Your organization can create a list of applications that are authorized for use in the workplace or that are known to be from a trustworthy vendor. When a user launches an application, it is compared against the allow list and is only permitted if it appears on the list. Hashing is used to verify the application’s integrity and generates a value from a string of text that is unique to every application. If an application is updated or patched, the hash changes to ensure that you are only running the newest version of the application. A complementary measure to application allow listing is enforcing the use of approved signatures from approved software vendors for all types of software.</p>

<p>By implementing an application allow list, your organization will enhance your cyber defence posture and prevent incidents such as ransomware.</p>

<p>For more information on applications allow lists, read <a href="/en/top-top-10-it-security-action-items-no-10-implement-application-allow-lists-itsm10095">Implement application allow lists (ITSM.10.095)</a>.</p>

<h4 class="text-info">Use protective domain name system</h4>

<p>Domain name system (DNS) is a protocol that maps domain names that are easily read by the human eye to Internet Protocol (IP) addresses that are easily read by machines. <abbr title="Domain name system">DNS</abbr> is often referred to as the address book for the Internet. <abbr title="Domain name system">DNS</abbr> is used for both human-initiated actions (for example, visiting a website) and machine-initiated actions (for example, running an update).</p>

<p>Protective <abbr title="Domain name system">DNS</abbr> is a tool that your organization can implement to block employees from visiting potentially malicious domains on the Internet when using corporate devices. Protective <abbr title="Domain name system">DNS</abbr> identifies malicious domains against your organization’s blocklist, which is a listing of domains and <abbr title="Internet Protocol">IP</abbr> addresses that users are not permitted to visit using corporate assets or while on an organizational network. For more information on <abbr title="Domain name system">DNS</abbr>, read <a href="/en/guidance/protective-domain-name-system-itsap40019">Protective Domain Name System (ITSAP.40.019)</a> and <a href="/en/guidance/domain-name-system-dns-tampering-itsap40021">Domain Name System (DNS) tampering (ITSAP.40.021)</a>.</p>

<p>You should also consider implementing protective <abbr title="Domain name system">DNS</abbr> filtering on any mobile devices used by your employees, especially if they can connect to your network and systems remotely. You can do this by manually configuring <abbr title="Domain name system">DNS</abbr> settings on your organization’s devices, through a mobile device management (MDM) tool. For more information on protecting mobile devices, read <a href="/en/guidance/security-considerations-edge-devices-itsm80101">Security considerations for edge devices (ITSM.80.101)</a>.</p>

<p>Canadians can use a free public <abbr title="Domain name system">DNS</abbr> application called <a href="https://www.cira.ca/en/canadian-shield/">Canadian Shield</a>. The application is provided by the Canadian Internet Registration Authority (CIRA) and ensures personal devices always use a trusted <abbr title="Domain name system">DNS</abbr> and filter out malicious <abbr title="Internet Protocol">IP</abbr> addresses. Canadian Shield can be set up on your router or gateway to better protect your entire network. We recommend applying its Protected <abbr title="Domain name system">DNS</abbr> resolver, which is designed to offer enhanced malware and phishing blocking. Replacing the default <abbr title="Domain name system">DNS</abbr> server settings on your devices with a trusted <abbr title="Domain name system">DNS</abbr> server can better protect your devices.</p>

<h4 class="text-info">Establish perimeter defences</h4>

<p>Protecting your network, connected systems and devices against cyber threats can seem daunting. Perimeter defences protect the boundary between 2 network security zones through which your traffic is routed. Defending this boundary with basic security protocols like firewalls, antivirus and antimalware software and <abbr title="implementing intrusion detection and prevention systems">IDPS</abbr> significantly enhances your overall protection. Installing anti-phishing software is another way to strengthen your organization’s cyber security. Anti-phishing software blocks phishing emails to prevent attacks from occurring or spreading further.</p>

<p>Ensure that users access the network using your organization’s virtual private network (VPN). A <abbr title="virtual private network">VPN</abbr> acts as a secure tunnel through which you can send and receive data on an existing physical network. Using a <abbr title="virtual private network">VPN</abbr> provides a secure connection between 2 points, such as your laptop and your organization’s network.</p>

<h4 class="text-info">Implement logging and alerting</h4>

<p>Implementing continuous monitoring of your networks will help you establish a baseline of acceptable activity patterns within your organization. Establishing monitoring capabilities, such as intrusion detection systems (IDS) for your networks, can help your organization manage risk. Your monitoring system should generate logs that can be reviewed by IT specialists and management when necessary. You should limit access to your logs to those who need to review them.</p>

<p>You should also implement automatic alerting within your monitoring practices so that anomalies in activity patterns are flagged and reviewed. Automatic alerting should also identify potential vulnerabilities and events that require you to take risk mitigation action. The alerts will indicate that something out of the ordinary has occurred. Your organization can then review these anomalies to determine what occurred, whether there is a risk to the organization, and what can be done to mitigate the risk. Your organization’s logging and alerting system should not permit modifications to be made to your logs once they have been received from the system. Logs should be timestamped to assist you in understanding what led to an event or an incident.</p>

<p>If your organization becomes the victim of ransomware or another type of cyber incident, your logs could provide insight into how the incident occurred. They could also show what controls or mitigation measures can be implemented to better protect your networks and systems from future incidents.</p>

<p>For more information on implementing logging and alerting, read <a href="/en/guidance/network-security-logging-monitoring-itsap80085">Network security logging and monitoring (ITSAP.80.085)</a>.</p>

<h4 class="text-info">Assess vulnerabilities</h4>

<p>A vulnerability assessment can identify and prioritize known vulnerabilities that cybercriminals could exploit to gain access to applications, systems, and data. This assessment can involve:</p>

<ul class="lst-spcd"><li>vulnerability scanning to identify known vulnerabilities within applications</li>
	<li>penetration testing, which simulates attacks that cybercriminals might perform to evaluate how well the infrastructure withstands them</li>
	<li>security assessments and audits to identify misconfigurations that could lead to security vulnerabilities</li>
	<li>intrusion detection to monitor for intrusions and intrusion attempts</li>
	<li>threat hunting to identify and eradicate threats using computer forensics, cyber threat intelligence and malware analysis</li>
</ul><h4 class="text-info">Segment your networks</h4>

<p>Segmenting your network involves dividing your networks into smaller sections or zones so that traffic is directed and flows through the different sections of the network. This allows you to stop traffic flow in certain zones and prevent it from flowing to other areas in your network. In the same manner, segmentation also allows you to isolate and stop the spread of malware to different sections of your network, and to control and restrict access to your information. When segmenting your network, ensure your IT and operational technology (OT) networks are identified, separated and monitored. These networks should be air-gapped, meaning that you should physically or conceptually isolate secure computer networks from unsecure networks, such as those that connect to the Internet. In addition to segmenting your IT and <abbr title="operational technology">OT</abbr> networks, you should also identify interdependencies between them and implement measures that can be put in place during a cyber incident to protect critical information and functions.</p>

<p>For more information on segmenting your networks, read <a href="/en/guidance/top-10-security-actions-no-5-segment-and-separate-information-itsm10092">Segment and separate information (ITSM.10.092)</a>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h4 class="text-info">Constrain development and scripting environments and deactivate macros</h4>

<p>If your organization uses the Microsoft Windows operating system, you may want to consider constraining your development and scripting environments. With Windows specifically, Microsoft developed an automated system administration capability through an interface powered by their shell scripting language, known as PowerShell. It is a powerful and important part of the system administration toolkit. It can be used to fully control Microsoft Windows systems and has many benefits for organizations. However, threat actors can exploit PowerShell and inject malicious code into your devices’ memory. More concerning is the fact that PowerShell is a trusted source and therefore a threat actor’s code injection typically will not be blocked by antivirus or antimalware software or by your systems’ event logs. To make it harder for malicious PowerShell behaviour to be obfuscated, organizations should ensure that standard users are allowed to modify the relevant registry keys or the transcript folder.</p>

<p>Organizations should also consider using protected event logging to prevent sensitive information, such as passwords in script blocks that are logged to the event log, from being leaked.</p>

<p>Many organizations also have development tools, such as Python, Perl, PHP and .NET, that threat actors can exploit for malicious purposes. Isolate these tools from the user environment.</p>

<p>Macros are another security consideration when using Windows. Macros are written sequences that imitate user keystrokes and mouse commands to automatically repeat tasks in applications. Macros are used in many Microsoft Office products to automate processes and data flows. They are embedded in the code of the files, enabling users to create shortcuts for specific tasks (for example, sort worksheets alphabetically, unmerge all merged cells or unhide all rows and columns).</p>

<p>Threat actors can create malicious macros and include them in documents that they may then send to employees in your organization. To decrease the risk of ransomware being spread through Office attachments, you should set your user defaults to deactivate macros and ensure that users cannot re-activate them. You should also ensure that macros cannot contain sensitive information, such as personal credentials, and use organization-developed or signed macros that are verified by technical authorities within your organization.</p>

<p>For more information on macros, read <a href="/en/guidance/how-protect-your-organization-malicious-macros-itsap00200">How to protect your organization from malicious macros (ITSAP.00.200)</a>.</p>

<h4 class="text-info">Patch and update</h4>

<p>To protect your connected devices from ransomware, you should check the operating system, software and firmware regularly for updates and install security patches. There are a variety of patches available, but the following 3 types are most applied:</p>

<ul class="lst-spcd"><li>bug fix patch: repairs functionality issues in software (for example, an error that causes unexpected device behaviour)</li>
	<li>security patch: addresses security vulnerabilities to protect the system from threats (for example, malware infecting devices through security flaws)</li>
	<li>feature patch: adds new functions to the software (for example, enhancements to application performance and speed)</li>
</ul><p>For more information on patching and updating your devices, read <a href="/en/guidance/top-10-it-security-action-items-no2-patch-operating-systems-and-applications-itsm10096">Patch operating systems and applications (ITSM.10.096)</a>.</p>

<h4 class="text-info">Manage passwords and passphrases</h4>

<p>Your organization should implement passphrases in place of passwords where possible. Using strong passphrases is 1 step in protecting your systems and sensitive information, but it is not enough to prevent a threat actor from gaining access. Password guessing is a common tactic used by threat actors to gain access to networks and systems. If using passphrases is not possible, you should use strong, unique passwords combined with <abbr title="multi-factor authentication">MFA</abbr>.</p>

<p>Subsection ‘<a href="#accounts">Manage user and administrator accounts</a>’ provides details on adopting <abbr title="multi-factor authentication">MFA</abbr> in your account and access management practices. In combination with using <abbr title="multi-factor authentication">MFA</abbr>, you should encourage employees to use a password manager. Password managers can be beneficial for remembering and securing passwords or passphrases required to access your networks and systems.</p>

<p>Your organization should also consider implementing password vaults for administrative accounts. Password vaults ensure a higher level of protection since the passwords or passphrases are cycled and synchronized with your systems. This ensures a password or passphrase can only be used once. It also provides tracing capabilities that can determine who used a password or passphrase at a given time for specific access.</p>

<p>For more information on the implementation and use of password managers, read <a href="/en/guidance/password-managers-security-itsap30025">Password managers: Security tips (ITSAP.30.025)</a> and <a href="/en/guidance/best-practices-passphrases-and-passwords-itsap30032">Best practices for passphrases and passwords (ITSAP.30.032)</a>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h3 id="protect-email">Protect email domains</h3>

<p>Threat actors may leverage misconfigurations or gaps in cyber security protocols to advance their goals. They often target email systems with the aim of gaining unauthorized access, stealing sensitive information or disrupting communication channels. Email accounts house a large amount of private information, including personal data, financial details and confidential business exchanges. Ensuring secure email communications is important to prevent breaches that could compromise the integrity of these exchanges. Email security also protects against malware and phishing attacks, which are frequently initiated via deceptive emails.</p>

<p>Consider implementing technical security measures to protect your organization’s domains from email spoofing, prevent the delivery of malicious messages sent fraudulently on behalf of your domain and identify the infrastructure used by threat actors. These measures also help prevent phishing emails from being delivered to your organization. You can reduce a threat actor’s chance of carrying out successful malicious email campaigns by implementing the following 3 security protocols that act jointly to protect email domains from being spoofed. For more information, read <a href="/en/guidance/quick-guide-email-configuration">Quick guide to email configuration (ITSAP.60.003)</a>.</p>

<h4 class="text-info">Sender Policy Framework</h4>

<p>Sender Policy Framework (SPF) is a system that uses features of <abbr title="Domain name system">DNS</abbr> and allows domain owners to specify which servers are authorized to send emails on behalf of their domain. If you receive an email from an <abbr title="Internet Protocol">IP</abbr> address that is not specifically permitted by the <abbr title="Sender Policy Framework">SPF</abbr> record, it is likely not legitimate. When an email is sent, the recipient's mail server checks the <abbr title="Sender Policy Framework">SPF</abbr> record of the sender's domain to see if the sending mail server is on the authorized list. If the sending mail server is included in the <abbr title="Sender Policy Framework">SPF</abbr> record (a "pass"), the email is considered legitimate and is usually delivered. However, if the sending mail server is not listed in the <abbr title="Sender Policy Framework">SPF</abbr> record (a "fail"), the recipient's mail server may handle the email cautiously, possibly rejecting it or marking it as spam.</p>

<h4 class="text-info">DomainKeys Identified Mail</h4>

<p>DomainKeys Identified Mail (DKIM) is an email authentication protocol that enhances the security of email messages by allowing the sender to digitally sign them. When an email system that supports <abbr title="DomainKeys Identified Mail">DKIM</abbr> receives a <abbr title="DomainKeys Identified Mail">DKIM</abbr>-signed message, it retrieves the record associated with the message’s <abbr title="DomainKeys Identified Mail">DKIM</abbr> header and verifies the message’s signature using the published public key. This <abbr title="DomainKeys Identified Mail">DKIM</abbr> check cryptographically confirms that the message was sent by an authorized sender and was not altered in transit. If the signature is not valid, or if no <abbr title="DomainKeys Identified Mail">DKIM</abbr> record is available, the message will fail <abbr title="DomainKeys Identified Mail">DKIM</abbr>. Messages that fail this <abbr title="DomainKeys Identified Mail">DKIM</abbr> check may be rejected.</p>

<p><abbr title="DomainKeys Identified Mail">DKIM</abbr> ensures the integrity of email communication, making sure that emails have not been tampered with. It allows recipient servers to check the message's authenticity and to confirm it originates from the claimed domain. This helps prevent spoofing and impersonation attempts.</p>

<h4 class="text-info">Domain-based Messaged Authentication, Reporting and Conformance</h4>

<p>Domain-based Messaged Authentication, Reporting and Conformance (DMARC) policy and verification can enhance your security protocols and protect your email domains from being spoofed. It builds on <abbr title="DomainKeys Identified Mail">DKIM</abbr> and <abbr title="Sender Policy Framework">SPF</abbr> to ensure emails are authenticated before transmission, guaranteeing that they originated from the intended domain, and are sent to legitimate recipients. If an email passes through the <abbr title="Domain-based Messaged Authentication, Reporting and Conformance">DMARC</abbr> validation, it will be delivered to the intended recipient. If the email fails <abbr title="Domain-based Messaged Authentication, Reporting and Conformance">DMARC</abbr> validation, the receiving email system applies the policy specified in the sending domain’s <abbr title="Domain-based Messaged Authentication, Reporting and Conformance">DMARC</abbr> record and will either deliver the email, deliver the email but mark it as suspicious or reject the email. Unlike some other solutions that rely on a single point of failure, <abbr title="Domain-based Messaged Authentication, Reporting and Conformance">DMARC</abbr> uses a resilient strategy that covers both the source and target sides of email communication. It conducts a comprehensive security check on sender information, recipient details, subject lines, body text and other message characteristics.</p>

<p>For more information on email domain protection, read <a href="/en/guidance/implementation-guidance-email-domain-protection">Implementation guidance: Email domain protection (ITSP.40.065)</a> and <a href="/en/guidance/email-security-best-practices-itsm60002">Email security best practices (ITSM.60.002)</a>.</p>
</section><!-- How to recover from ransomware incidents --><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<section><h2 class="page-header text-info" id="recover">How to recover from ransomware incidents</h2>

<p>Recovering from a ransomware incident can be a lengthy process and recovering your organization’s brand and reputation can take even longer. Assuming your organization will eventually encounter some form of malware can help you develop your planned response and could speed up your recovery processing time. By adhering to the guidance provided in this document, your organization will not only reduce the time it takes to recover from an attack but can also reduce the likelihood of an attack or minimize the impact of an infection.</p>

<h3 id="recovery-process">Recovery process</h3>

<p>As described in subsection ‘<a href="#recoveryplan">Develop your recovery plan</a>’, having reliable backups that are secured and stored offline can significantly enhance your ability to recover from a ransomware attack. If your organization has been hit with ransomware, there are immediate steps you can take to minimize the impact of the infection.</p>

<h4 class="text-info">Immediate response actions</h4>

<p>Threat actors can infiltrate your network and can gain insight into components and data in your systems, devices that are connected to your system and your communications. Once you become aware of an infiltration, you should assume that the threat actor is still on your network and is aware of what is happening in your organization. As such, you should implement an alternative communication method (for example, external email accessed by a device not connected to your network) that cannot be accessed by them. This will also block the threat actor from gaining insight into your intended incident response plans and recovery actions. Your organization can follow the checklist below when taking immediate action, ideally within the first few hours, against a ransomware attack.</p>

<h5>Immediate response checklist: Detection, analysis, containment and eradication</h5>

<p>Determine what is infected and isolate systems and devices</p>

<ul class="lst-spcd"><li>Determine which devices and systems are infected with the ransomware</li>
	<li>Isolate all systems and devices</li>
	<li>Disconnect the infected systems and devices from the Internet and any internal network connection to reduce the risk of the infection spreading to other connected devices</li>
	<li>Determine what data, including data in transit, has been impacted by the ransomware</li>
	<li>Establish the likelihood that the confidentiality or integrity of the data has been compromised. Inform data managers and stakeholders of potential impacts</li>
	<li>Deactivate your <abbr title="virtual private network">VPN</abbr>s, remote access servers, <abbr title="single sign-on">SSO</abbr> resources and cloud-based or public-facing assets as additional measures to contain the ransomware infection</li>
</ul><p>Report to law enforcement</p>

<ul class="lst-spcd"><li>Report the ransomware attack to local law enforcement. Ransomware is considered a cybercrime and may be investigated by law enforcement</li>
	<li>Report the ransomware attack to the Canadian Anti-Fraud Centre and the Cyber Centre online via <a href="https://portal-portail.cyber.gc.ca/en/">My Cyber Portal</a></li>
	<li>If you have been infected with a known type of ransomware, check if law enforcement can provide you with a decryption key</li>
</ul><p>Assemble your <abbr title="cyber incident response team">CIRT</abbr></p>

<ul class="lst-spcd"><li>Communicate the incident details to your <abbr title="cyber incident response team">CIRT</abbr> (established while creating your incident response plan)</li>
	<li>Provide clear direction to <abbr title="cyber incident response team">CIRT</abbr> members on their roles and responsibilities in managing the incident</li>
	<li>Document the known details to ensure your <abbr title="cyber incident response team">CIRT</abbr> has an initial understanding of what has occurred</li>
	<li>Triage the systems impacted by the ransomware for restoration and recovery. This will guide your <abbr title="cyber incident response team">CIRT</abbr> on where to focus immediate actions</li>
</ul><p>Change credentials</p>

<ul class="lst-spcd"><li>Reset credentials, like passwords and passphrases, for administrator and user accounts</li>
	<li>Ensure you are not changing any credentials that are required to restore your backup or that may lock you out of systems needed during the recovery process</li>
	<li>Create temporary administrator accounts to begin your recovery and monitor whether the threat actor is leveraging your original accounts</li>
</ul><p>Wipe and reinstall</p>

<ul class="lst-spcd"><li>Safely wipe your infected devices to remove any malware, bugs or viruses</li>
	<li>Reinstall the operating system to rid your devices of the infection</li>
	<li>Update the basic input/output system and reload firmware</li>
</ul><p>Run security software</p>

<ul class="lst-spcd"><li>Run antivirus and antimalware diagnostics on your backup to make sure it is clean before you begin the restore process</li>
	<li>Restore your systems into a clean, network-isolated location and then ensure they are at the very latest patch state for all software. This can be time consuming and may “break” system dependencies that will have to be resolved</li>
	<li>Scan any files that might have been accessed by the threat actor or extracted from a compromised system</li>
	<li>Download the Cyber Centre’s free malware detection and analysis tool <a href="/en/tools-services/assemblyline">Assemblyline</a></li>
	<li>Address any items flagged by the scans</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h4 class="text-info">Recovery actions</h4>

<p>Although isolating your infrastructure from the Internet can temporarily disrupt your business, it is the most important course of action. Isolation will temporarily remove the threat actor’s access to your infrastructure, allowing you to gain control and further your incident investigation, response and recovery.</p>

<p>Once you have completed the steps identified in the checklist above and you are certain that your backups and devices are clear of any malware or viruses and are at the most recent patch state, you should begin your recovery process, as outlined in the following subsections.</p>

<h5>Remediate the point of entry</h5>

<p>To recover successfully and avoid reinfection, you will need to identify how the threat actor was able to enter your network, systems and devices and address the vulnerability immediately. Ensure you remediate the point of entry prior to reconnecting your systems or devices to your network or the Internet to thwart the threat actor’s ability to gain access in the same manner.</p>

<h5>Implement your backup plan</h5>

<p>Ensure your organization is protected by having a detailed backup plan in place. You will execute this plan if your main systems and data storage are compromised and need to be restored with your copied information. The backup plan will ensure your organization can restore critical systems and data and get back to business quickly. You should recover your systems using offsite backups that are not connected to your networks. Prior to restoring from a backup, scan and analyze it with a known uncorrupted system to ensure it has not been compromised by the threat actor.</p>

<h5>Restore your systems</h5>

<p>Following your incident response plan, identify the critical systems and data that need to be recovered first. Ensure that these systems and data have not been impacted by the ransomware attack and that they do not have signs of any other malware infection.</p>

<p>There are several options to consider when implementing your recovery strategy. You should choose a recovery strategy that meets your business needs and security requirements.</p>

<h5>Engage cyber security professional assistance</h5>

<p>Procuring professional services from a highly rated cyber security agency or professional can be helpful when preparing for and responding to a ransomware incident. If your organization has a cyber insurance policy, your provider will often include the assistance of a third-party cyber security professional in the event of an incident like a ransomware attack. They will provide you with incident response expertise and a recovery strategy tailored to your organization. They may also deploy an incident handling team to lead your organization’s response and recovery process. If you do engage professional cyber security assistance, ensure you clearly identify the service expectations, roles and responsibilities. The introduction of cyber insurance as a proactive measure of protection against ransomware can encourage enterprises to align their cyber security postures with insurance policy standards. However, if insurance policy documents are not properly protected, sophisticated ransomware actors could obtain that sensitive information on coverage amounts and leverage it in ransom negotiations to maximize their payment from companies.</p>

<h5>Inform stakeholders</h5>

<p>When an incident occurs, and especially when it compromises your systems and data, it is imperative that you inform key stakeholders, clients and employees. You should consider preparing a statement in advance that can be tailored to the incident, as well as a contact list of all stakeholders to be notified. Ransomware attacks can jeopardize your organization’s reputation, so your communications plan must be implemented swiftly following an incident. This will ensure your stakeholders are informed and able to enact their own incident response plans, if necessary.</p>

<h5>Analyze the incident</h5>

<p>It is crucial to determine the root cause of the incident. Identify how the threat actor gained access to your network and deployed the ransomware. A ransomware incident is often an indication of a more serious hack or intrusion by the threat actor. If you do not identify how a threat actor gained access or apply appropriate security measures to prevent it from happening again, threat actors may continue to exploit the vulnerability.</p>

<p>Note that to succeed in forensics, a high-integrity forensic record of events must be available. As for backups, monitoring and logging must have strong segregation of duties to withstand the hostile attention of attackers.</p>

<p>A vital step in your incident analysis is determining what systems, accounts and information the threat actor accessed. This will allow you to determine the extent of the damage, such as what accounts were compromised and what data was exfiltrated. In turn, this will inform your approach to control the attack, prepare and implement a proper response and execute a successful recovery.</p>
</section><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!-- Summary -->

<section><h2 class="page-header text-info" id="summary">Summary</h2>

<p>Ransomware is an ever-present threat to all organizations, regardless of their size. Ransomware incidents can lead to financial loss, data breaches and reputational damage for your organization. Preparing your organization and applying proactive measures to protect your network, connected devices and information is critical for your ability to respond to and recover from ransomware.</p>

<p>If your organization has fallen victim to ransomware, conducting a lessons-learned exercise post-recovery is an excellent way of implementing further mitigation measures and correcting actions and strategies that did not go as planned. Revise your incident response plan based on these lessons learned to ensure your organization has the most robust response and recovery plans possible.</p>

<p>Consider reporting cyber incidents to law enforcement, such as local police or the Canadian Anti-Fraud Centre, and to the Cyber Centre online via My Cyber Portal. If you are comfortable doing so, share your findings, including the tools, techniques and procedures used by the threat actor, with the Cyber Centre. This will assist the Cyber Centre in providing alerts and guidance to the public and will help individuals and organizations protect their assets from the same ransomware attack. Sharing your lessons learned can benefit other organizations and the broader cyber security community.</p>

<h3 id="effective-date">Effective date</h3>

<p>This publication takes effect on December 11, 2025.</p>

<p>This is an UNCLASSIFIED publication that has been issued under the authority of the Head of the Canadian Centre for Cyber Security (Cyber Centre). For more information, contact the Cyber Centre:</p>

<ul class="lst-spcd"><li>by email: <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a></li>
	<li>by phone: <a href="tel:+1-613-949-7048">613-949-7048</a> or <a href="tel:+1-833-292-3788">1-833-CYBER-88</a></li>
</ul><p>This version supersedes Ransomware playbook, dated November 30, 2021.</p>

<h3 id="revision-history">Revision history</h3>

<ol class="lst-spcd"><li>First release: November 30, 2021</li>
	<li>Second release: January 28, 2026</li>
</ol></section><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/ransomware-threat-outlook-2025-2027</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/ransomware-threat-outlook-2025-2027"/><title><![CDATA[Ransomware Threat Outlook 2025-2027]]></title><updated>2026-01-28T16:00:00Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6940" about="/en/guidance/ransomware-threat-outlook-2025-2027" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="well well-sm">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/cse-ransomware-threat-outlook-2025-2027.pdf">Ransomware Threat Outlook 2025-2027 (PDF, 1.8 MB)</a></p>
</div>

<div class="clearfix"> </div>

<section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#1">Executive summary</a></li>
	<li><a href="#2">Assessment base and methodology</a></li>
	<li><a href="#3">Estimative language</a></li>
	<li><a href="#4">About the Cyber Centre </a></li>
	<li><a href="#5">Message from the Head of the Cyber Centre</a></li>
	<li><a href="#6">Key judgments</a></li>
	<li><a href="#7">The threat ecosystem</a></li>
	<li><a href="#8">The state of ransomware in Canada</a></li>
	<li><a href="#9">Cyber snapshots</a></li>
	<li><a href="#10">Myths and misconceptions</a></li>
	<li><a href="#11">Outlook</a></li>
	<li><a href="#12">Glossary</a></li>
	<li><a href="#13">References</a></li>
</ul></details></section><h2 class="text-info" id="1">Executive summary</h2>

<p>This assessment is an update to the <a href="/en/guidance/baseline-cyber-threat-assessment-cybercrime">Canadian Centre for Cyber Security's (Cyber Centre) Baseline cyber threat assessment: Cybercrime</a>, published in 2023. It is intended to provide an update on the ransomware threat to Canada and to inform Canadian organizations about the early history of ransomware, emerging and projected trends, and ransomware’s impact on Canada and Canadian organizations. It will also debunk common myths and misconceptions on cyber hygiene and responding to cyber incidents. While this report is intended to inform Canadian organizations of all sizes, including public sector entities and critical infrastructure, all Canadians can benefit from reading this report and increasing their knowledge of the ransomware ecosystem.</p>

<p>For the purposes of this assessment, ransomware generally refers to a type of malware that denies a user access to a system or data until a sum of money is paid. However, the Cyber Centre recognizes that ransomware has evolved to also include incidents where data theft and extortion are used in place of encryption.</p>

<p>Ransomware emerged as an informal method of cybercrime that used basic encryption and extortion. However, it has quickly evolved over the past decades into an interconnected and sophisticated ecosystem where threat actors communicate and conduct payments through borderless online spaces that are difficult to access on the dark web.</p>

<p>We assess that threat actors carrying out ransomware attacks impacting Canadian organizations are almost certainly opportunistic and financially motivated. All Canadian organizations, regardless of size or sector, are at risk of being targeted by ransomware. In addition to impacting the infrastructure, data, supply chain, and operations of organizations, a ransomware attack can also impact Canadians’ livelihoods by disrupting the critical services they depend on.</p>

<h2 class="text-info" id="2">Assessment base and methodology</h2>

<p>The key judgments in this assessment rely on reporting from multiple sources, both classified and unclassified. The judgments are based on the knowledge and expertise in cyber security. Defending the Government of Canada’s information systems provides the Cyber Centre with a unique perspective to observe trends in the cyber threat environment, which also informs our assessments. The Communications Security Establishment Canada’s (CSE) foreign intelligence mandate also provides valuable insight into adversary behaviour in cyberspace. While we must always protect classified sources and methods, we provide the reader with as much justification as possible for our judgments.</p>

<p>Our judgments are based on an analytical process that includes evaluating the quality of available information, exploring alternative explanations, mitigating biases and using probabilistic language. We use the terms “we assess” or “we judge” to convey an analytic assessment. We use qualifiers such as “possibly,” “likely,” and “very likely” to convey probability.</p>

<p>Assessments and analyses in this report are based on information available as of <strong>September 4, 2025</strong>.</p>

<section><h3 class="mrgn-tp-lg" id="3">Estimative language</h3>

<div class="row">
<div class="col-md-12">
<div class="panel panel-default">
<div class="panel-body">
<figure><p class="mrgn-bttm-lg">The chart below matches estimative language with approximate percentages. These percentages are not derived via statistical analysis but are based on logic, available information, prior judgments, and methods that increase the accuracy of estimates.</p>
<img alt="Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/tarp-language-chart-transparent-e.png" /><details class="brdr-tp brdr-rght brdr-bttm brdr-lft mrgn-bttm-sm"><summary>Long description - Estimative language chart </summary><ul class="list-unstyled mrgn-tp-md"><li>1 to 9% Almost no chance</li>
	<li>10 to 24% Very unlikely/very improbable</li>
	<li>25 to 39% Unlikely/improbable</li>
	<li>40 to 59% Roughly even chance</li>
	<li>60 to 74% Likely/probably</li>
	<li>75 to 89% Very likely/very probable</li>
	<li>90 to 99% Almost certainly</li>
</ul></details></figure></div>
</div>
</div>
</div>
</section><div class="pull-right small text-muted mrgn-bttm-md"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<section><h2 class="text-info" id="4">About the Cyber Centre</h2>

<p>The Cyber Centre is Canada’s technical and operational authority on cyber security. Part of CSE, we are the single unified source of expert advice, guidance, services, and support on cyber security for Canadians and Canadian organizations. The Cyber Centre works in close collaboration with Government of Canada departments, critical infrastructure, Canadian businesses, and international partners to prepare for, respond to, mitigate, and recover from cyber events. The Cyber Centre is outward-facing and welcomes partnerships that help build a stronger, more resilient cyberspace in Canada. In line with the National Cyber Security Strategy, the Cyber Centre represents a more cooperative approach to cyber security in Canada. The Cyber Centre helps raise Canada’s cyber security bar so that Canadians can live and work online safely and with confidence.</p>
</section><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<section><h2 class="text-info" id="5">Message from the Head of the Cyber Centre</h2>

<p>At a time when cybercriminals continue to target Canadian businesses, critical infrastructure, and government systems, education on these threats has never been more important. As Canada’s national authority on cyber security, the Cyber Centre is committed to helping Canadians understand, prepare for, defend against, and respond to the digital threats that impact our economy, our institutions, and our daily lives.</p>

<p>Among these threats, ransomware continues to stand out as one of the most disruptive, costly, and persistent challenges facing Canadian organizations of every size. This is why this report, the Ransomware Threat Outlook 2025 to 2027, provides a forward-looking view of the ransomware landscape we anticipate in the next 2 years. Our analysis draws on reporting from across Canada and around the world, classified intelligence from our foreign partners, and insights from the private sector. Together, these perspectives let us identify not only the tools, tactics, and procedures of today’s most prolific cybercrime operators, but also the likely trends and evolutions that will define this threat tomorrow.</p>

<p>As you will read in this report, ransomware is big business. Despite some concerning trends, Canadians can rest assured that the Cyber Centre is keeping pace to address these threats and is developing new tools to defend Canadian networks and systems.</p>

<p>Our objectives are clear: to equip decision makers with the knowledge they need to manage their risk, to strengthen Canada’s resilience, and to safeguard the trust Canadians place in our digital systems. Only by working together can we blunt the impact of ransomware and ensure Canada is secure and resilient in an ever-evolving cyber landscape.</p>

<p>In partnership,</p>

<p><strong>Rajiv Gupta</strong><br />
Head, Canadian Centre for Cyber Security</p>
</section><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<section><h2 class="text-info" id="6">Key judgments</h2>

<ul><li>The ransomware threat in Canada continues to increase and evolve quickly. Threat actors are leveraging various sophisticated tactics to carry out cybercrime. We assess that ransomware actors operating against Canadian targets are almost certainly opportunistic and financially motivated. All organizations, as well as individuals, in Canada almost certainly risk being targeted by ransomware at some point and should bolster their cyber resilience accordingly.</li>
	<li>Ransomware threat actors have demonstrated adaptability to changes in the digital landscape and will very likely continue leveraging advancements in areas like artificial intelligence (AI) and cryptocurrency while developing new extortion tactics to increase their financial reward.</li>
	<li>We assess that basic cyber hygiene practices like regular software updates, implementing multi-factor authentication (MFA) and backups, and being cautious of phishing attempts continue to help Canadians and Canadian organizations strengthen their baseline cyber threat readiness. Cyber security practices are not just an optional extension of one’s business. They are integral to protecting critical data and operations, and to safeguarding Canadians who are reliant on the services of organizations responsible for this data.</li>
	<li>Understanding and mitigating the ransomware ecosystem requires continued cooperation and diligence among law enforcement, government agencies, private organizations, and the Canadian public. We assess that threat actors carrying out ransomware attacks will remain a significant threat to Canada in the next 2 years.</li>
</ul></section><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<section><h2 class="text-info" id="7">The threat ecosystem</h2>

<p>Between the 1990s and the 2020s, cybercrime changed drastically, bringing about significant shifts in how threat actors and Canadians engage with one another. Understanding the evolution of ransomware provides insight into how cybercriminals take advantage of technological advancements and how changes in the ecosystem have increased the prevalence and pervasiveness of cyber threats. It also helps identify key indicators for future trends.</p>

<h3>The evolution of ransomware</h3>

<ul><li><strong>1989</strong>: Harvard professor, <strong>Dr. Joseph L. Popp</strong> sent around 20,000 malware-infected floppy disks that used symmetric cryptography to encrypt file names to AIDS researchers in 90 countries. Victims were instructed to send a cheque of up to $378 to a post office box in Panama to receive a decryptor disk to restore their systems. The only individuals who reportedly paid the ransom were investigators. Dr. Popp was arrested and charged with blackmail. This was one of the first documented ransomware attacks. However, following Dr. Popp’s arrest, ransomware incidents remained relatively uncommon until the widespread adoption of the Internet in the 21st century.<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup></li>
	<li><strong>2009</strong>: The emergence of <strong>Bitcoin</strong> in 2009 as the first decentralized cryptocurrency, and the surge in popularity of alternative cryptocurrencies in the subsequent years, significantly enhanced cybercriminals’ ability to process payments and launder money from illicit online activities. By providing threat actors with avenues for untraceable funds, Bitcoin helped ransomware become a profitable industry.<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup></li>
	<li><strong>2012</strong>: The <strong>Reveton</strong> ransomware was deployed as a malware that installs itself on a victim’s network when they click on a compromised website. The ransomware impersonated law enforcement agencies purporting to have seized control of the device due to the user’s supposed criminal online activity. Victims were threatened with jail time and were ordered to pay a ransom through a prepaid debit card. According to open-source reporting, the operators of Reveton sold the malware to third parties, increasing the number of victims. This marked the first reported occurrence of Ransomware-as-a-Service (RaaS).<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup></li>
	<li><strong>2013</strong>: The <strong>CryptoLocker</strong> ransomware first infected Windows computers in September 2013, using malicious attachments in spam and phishing emails as the primary method of delivery. CryptoLocker was one of the first ransomware variants to use sophisticated encryption. Once a device was encrypted, a ransom note would appear, ordering victims to pay a sum to regain access to their files. Cryptocurrency was included as a payment option. The FBI reports that within the first 2 months of operation, the threat actor group had amassed over USD 27 million in ransom. CryptoLocker was distributed through the GameOver Zeus botnet, which was attributed to a Russian cybercriminal. In June 2014, a multinational law enforcement collaboration announced that it successfully disrupted the GameOver Zeus botnet and seized CryptoLocker servers.<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup></li>
	<li><strong>2015</strong>: The group behind the <strong>SamSam</strong> ransomware emerged as the first group to consistently engage in targeted attacks against critical infrastructure and larger corporations, including government entities and healthcare organizations in the United States and Canada. This behaviour is now commonly known as “big game hunting” since critical infrastructure and other sensitive organizations are perceived to be more likely to pay larger ransom demands to avoid critical service disruptions or protect sensitive information. In 2018, 2 Iranian men were indicted in the United States on federal charges for deploying the SamSam ransomware to over 200 victims and causing over USD 30 million in losses<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>.</li>
	<li><strong>2017</strong>: The May 2017 <strong>WannaCry</strong> attack was publicly identified as the fastest-spreading and largest-scale global ransomware incident at the time. Once a device was infected, WannaCry—which exploited a Microsoft vulnerability—spread rapidly through a network, infecting other vulnerable machines without human interaction. Although Microsoft had patched the vulnerability months prior, users who failed to install the update were susceptible to the attack. In a single day, the attack infected over 230,000 computers in 150 countries, bringing unprecedented global attention to ransomware.<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup></li>
	<li><strong>2019</strong>: After an American security company failed to meet payment deadlines set by the <strong>Maze</strong> ransomware group, the group published around 700 MB of the company’s stolen data on their dedicated leak site to increase pressure on the company to comply with the ransom demand. This is the first known instance of a ransomware group publicly releasing victim data and using double extortion methods. Threat actors publishing sensitive corporate information also eliminated backups as an effective sole mitigation tactic<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup>.</li>
	<li><strong>2020s</strong>: The popularization of <abbr title="ransomware-as-a-service">RaaS</abbr> and the development of affiliate-based business models that license malware and distribute profits has lowered the technical barriers to entry for cybercriminals. The rise of initial access brokers has also increased the efficiency of active ransomware groups. By selling network access to threat actors, these brokers reduce the time required to execute an attack. The spread of secure communication platforms and dark web marketplaces and forums has also enhanced threat actors’ ability to actively sell their services, network with cybercriminals, and engage with victims.<sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup></li>
</ul><h3>The modern ransomware landscape</h3>

<p>The modern ransomware landscape is a highly sophisticated and interconnected threat ecosystem that is constantly evolving. Understanding current and emerging trends in the ransomware landscape can help Canadians recognize and better prepare for ransomware risks.</p>

<h4>Multi-extortion ransomware attacks</h4>

<p>As Canadian organizations expand and bolster their baseline cyber resilience, cybercriminals continually look to modify and adapt their tradecraft to best extort victims across their entire supply chain. We assess that the transition from single extortion to multi-extortion methods is indicative of cybercriminals’ increased sophistication and of their motivation to increase both the impact of their attacks and the likelihood of victims paying the ransom.</p>

<p>According to open-source reporting, potential multi-extortion strategies include distributed denial-of-service (DDoS) attacks and contacting third-party entities associated with an organization—including its suppliers, partners, or customers—for ransom.<sup id="fn9-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup> In addition to financial losses and sensitive data leaks, multi-extortion attacks can damage an organization’s reputation due to service outages or the revictimization of victims.</p>

<h4>Exfiltration-only attacks</h4>

<p>Although most ransomware groups will likely continue to use encryption in their ransomware, we assess that the trend of threat actors adopting exfiltration-only attacks is a notable shift in behaviour. In November 2024, the ransomware group Hunters International focused primarily on exfiltration-only attacks and extortion.<sup id="fn10-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup> In January 2025, Hunters International very likely rebranded to World Leaks, an extortion-based group that provides its custom-built data exfiltration tool to affiliates for them to use against victims.<sup id="fn11-rf"><a class="fn-lnk" href="#fn11"><span class="wb-inv">Footnote </span>11</a></sup> Open-source reporting attributes the growing trend toward exfiltration-only attacks to how quickly and simply these attacks can be deployed and executed compared with encryption-based attacks<sup id="fn12-rf"><a class="fn-lnk" href="#fn12"><span class="wb-inv">Footnote </span>12</a></sup>.</p>

<h4>Evolutions in victim demography</h4>

<p>Critical infrastructure and large corporations remain attractive targets for ransomware actors. However, based on recent developments in victim demography, we assess that no organization is immune to cyber incidents. Businesses with fewer cyber security resources may face more challenges in responding to sophisticated ransomware attacks.</p>

<p>Ransomware actors often leverage initial access points such as unpatched software, compromised credentials, phishing, or remote desk protocol. This can generate particular vulnerabilities for entities with minimal capabilities to invest in information technology (IT) infrastructure or cyber security training for employees.<sup id="fn13-rf"><a class="fn-lnk" href="#fn13"><span class="wb-inv">Footnote </span>13</a></sup></p>

<p>The impacts of ransomware—including operational downtime, supply chain delays, diminished consumer trust and recovery costs—can have serious impacts on small and medium businesses and could be the deciding factor on whether these businesses are able to remain commercially viable.<sup id="fn14-rf"><a class="fn-lnk" href="#fn14"><span class="wb-inv">Footnote </span>14</a></sup> Organizations with few internal cyber security specialists also often hire third-party managed service providers (MSPs) to handle <abbr title="information technology">IT</abbr> and information management services. Because of their expansive client networks and access to sensitive information, <abbr title="managed service providers">MSPs</abbr> are attractive targets for cybercriminals.<sup id="fn15-rf"><a class="fn-lnk" href="#fn15"><span class="wb-inv">Footnote </span>15</a></sup></p>

<h4>Artificial intelligence</h4>

<p>We assess that, as <abbr title="artificial intelligence">AI</abbr> becomes more sophisticated and more integrated into Canadian organizations, some cybercriminals will almost certainly adopt <abbr title="artificial intelligence">AI</abbr> capabilities to target victims and lower technical barriers to entry into the ransomware ecosystem. Threat actors have been leveraging improvements in generative <abbr title="artificial intelligence">AI</abbr>, particularly large language models, across various stages of ransomware attacks, including:</p>

<ul><li>developing malware</li>
	<li>generating deepfakes</li>
	<li>automating negotiations with victims</li>
	<li>conducting vulnerability research</li>
	<li>implementing social engineering strategies</li>
</ul><p>This contributes to reducing the skill and resource constraints that cybercriminals typically face.<sup id="fn16-rf"><a class="fn-lnk" href="#fn16"><span class="wb-inv">Footnote </span>16</a></sup></p>

<h4>Decentralized finance and cryptocurrency</h4>

<p>We assess that ransomware actors will continue to leverage cryptocurrency because of the anonymity it offers compared with mainstream financial assets. Increased regulatory pressures and law enforcement action against virtual financial crimes have further encouraged threat actors to find ways to hide their transactions.<sup id="fn17-rf"><a class="fn-lnk" href="#fn17"><span class="wb-inv">Footnote </span>17</a></sup></p>

<p>Cryptocurrency helps cybercrime profits transcend borders, increasing the scope of threat actors’ illicit activities and posing challenges for law enforcement investigations. In 2023, the Financial Transactions and Reports Analysis Centre of Canada stated that the movement of proceeds derived from fraud and ransomware attacks is the most prevalent form of money laundering involving virtual currencies.<sup id="fn18-rf"><a class="fn-lnk" href="#fn18"><span class="wb-inv">Footnote </span>18</a></sup></p>

<div class="well">
<h5 class="text-center mrgn-tp-sm">Virtual assets</h5>

<dl class="dl-horizontal"><dt>Cryptocurrency</dt>
	<dd>Cryptocurrencies are digital tokens that depend on cryptographic techniques to pseudo-anonymously transfer funds through a public ledger (blockchain) that records transactions between cryptocurrency wallet addresses. Cybercriminals often use cryptocurrency like Bitcoin (BTC) for illicit transactions.<sup id="fn19-rf"><a class="fn-lnk" href="#fn19"><span class="wb-inv">Footnote </span>19</a></sup></dd>
	<dt>Privacy coins</dt>
	<dd>Privacy coins are a type of cryptocurrency that provide greater anonymity because they operate on their own blockchain to conceal users’ identities and transaction histories. Examples include Monero (XMR), Zcash (ZEC), and Dash (DASH)<sup id="fn20-rf"><a class="fn-lnk" href="#fn20"><span class="wb-inv">Footnote </span>20</a></sup>.</dd>
</dl></div>

<div class="well">
<h5 class="text-center mrgn-tp-sm">Obfuscation and laundering techniques</h5>

<dl class="dl-horizontal"><dt>Chain hopping</dt>
	<dd>Chain hopping is when cybercriminals transfer funds from one blockchain to another to obfuscate the funds’ illicit origins.<sup id="fn21-rf"><a class="fn-lnk" href="#fn21"><span class="wb-inv">Footnote </span>21</a></sup></dd>
	<dt>Mixers</dt>
	<dd>Mixers are services that break links between the original and final address of cryptocurrency funds to hide the funds’ illicit origins<sup id="fn22-rf"><a class="fn-lnk" href="#fn22"><span class="wb-inv">Footnote </span>22</a></sup>.</dd>
</dl></div>

<h4>Geopolitical influence on ransomware</h4>

<p>Geopolitical conflicts are increasingly extending into the digital environment as more governments engage in cybercrime, including ransomware, as an alternative means to retaliate against adversaries or bypass international sanctions. Cybercriminal engagement varies by state: some states provide resources and protection to cybercriminals directly while others quietly permit cybercrime as long as it aligns with their political interests and does not impact victims within their country.<sup id="fn23-rf"><a class="fn-lnk" href="#fn23"><span class="wb-inv">Footnote </span>23</a></sup></p>

<p>During the Russian invasion of Ukraine in 2022, the ransomware group Conti publicly threatened to retaliate against Western countries that launched cyber attacks against Russian critical infrastructure.<sup id="fn24-rf"><a class="fn-lnk" href="#fn24"><span class="wb-inv">Footnote </span>24</a></sup> According to open-source reporting, amid ongoing conflict in the Middle East, a ransomware group linked to the Islamic Republic of Iran began offering higher proceeds to actors who engaged in cyber attacks on Iran’s adversaries.<sup id="fn25-rf"><a class="fn-lnk" href="#fn25"><span class="wb-inv">Footnote </span>25</a></sup></p>

<p>The Cyber Centre continues to monitor how geopolitics impact cybercrime and the degree to which state actors engage with cybercriminals in pursuit of their countries’ strategic objectives.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="8">The state of ransomware in Canada</h2>

<p>The majority of the top ransomware groups impacting Canada are almost certainly financially motivated and opportunistic. We assess that the core membership of these groups is most likely Russian speaking and operating out of the Commonwealth of Independent States (CIS), although their affiliates operate globally.</p>

<p>As outlined in the Cyber Center’s <a href="/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a>, law enforcement actions and geopolitical events can cause fluctuations in cybercrime activity. However, we assess that ransomware incidents in Canada are on the rise overall and continue to increase annually across most sectors.</p>

<p>Ransomware payments have fluctuated over the past 4 years, which could be a result of fewer or smaller payments made by victims combined with an increase in the total number of Canadian victims. Although most financially motivated ransomware actors operate opportunistically, Canadian critical infrastructure will likely continue to be a desirable target due to the perception that these organizations are more inclined to pay ransom demands to minimize disruptions.</p>

<p>The Cyber Centre observed an increase in the number of ransomware incidents in 2024 compared with 2023. We assess that it is very likely that <abbr title="ransomware-as-a-service">RaaS</abbr> has lowered technical barriers to entry for threat actors into the ransomware ecosystem and allowed for the proliferation of sophisticated tactics, techniques, and procedures (TTPs) that are leveraged against Canadians and Canadian organizations. We assess that, due to underreporting, the number of ransomware incidents and payments is almost certainly higher than what is shown in the figures below.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center"><strong>Figure 1: Growth from 2021 of Canadian ransomware incidents known to the Cyber Centre</strong></figcaption><img alt="Growth from 2021 of Canadian ransomware incidents known to the Cyber Centre - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/img-ransomware-2025-e.png" /></figure><details><summary>Long description - Figure 1: Growth from 2021 of Canadian ransomware incidents known to the Cyber Centre</summary><p>A chart indicates that, despite a small reduction in total recorded ransomware incidents in 2022, there has been a 26% average year-over-year increase from 2021 to 2024, and that average is estimated to continue through 2025.</p>
</details></div>
</div>

<p>In 2024, the top 3 ransomware threats to Canada were:</p>

<ul><li><strong>Akira:</strong> Akira is a <abbr title="ransomware-as-a-service">RaaS</abbr> group that emerged in April 2023 and is very likely connected to the disbanded ransomware group Conti.<sup id="fn26-rf"><a class="fn-lnk" href="#fn26"><span class="wb-inv">Footnote </span>26</a></sup> The group operates 2 ransomware variants. It exfiltrates victim data before encrypting victim devices and leverages stolen data to perform double extortion.<sup id="fn27-rf"><a class="fn-lnk" href="#fn27"><span class="wb-inv">Footnote </span>27</a></sup> Akira has been used to impact industries in manufacturing and telecommunications globally and in Canada.<sup id="fn28-rf"><a class="fn-lnk" href="#fn28"><span class="wb-inv">Footnote </span>28</a></sup></li>
	<li><strong>Play:</strong> Play is a ransomware group that emerged in June 2022 as a closed group and shifted to a <abbr title="ransomware-as-a-service">RaaS</abbr> model in November 2023. The group operates a ransomware variant by the same name and leverages a double extortion model.<sup id="fn29-rf"><a class="fn-lnk" href="#fn29"><span class="wb-inv">Footnote </span>29</a></sup> Play has been used to impact organizations in the information and technology and professional services sectors globally and in Canada.<sup id="fn30-rf"><a class="fn-lnk" href="#fn30"><span class="wb-inv">Footnote </span>30</a></sup></li>
	<li><strong>Medusa:</strong> Medusa is a <abbr title="ransomware-as-a-service">RaaS</abbr> group that emerged in June 2021. The group operates a ransomware variant by the same name and leverages a double extortion model. Medusa has been used to impact various critical infrastructure organizations, as well as information and communications technology sectors globally and in Canada.<sup id="fn31-rf"><a class="fn-lnk" href="#fn31"><span class="wb-inv">Footnote </span>31</a></sup></li>
</ul><p>Ransomware can have severe impacts on an organization’s business operations and the security of their sensitive information. It can also damage an organization’s reputation. All of this can impact an organization’s competitiveness across its sector and within the broader Canadian economy.<sup id="fn32-rf"><a class="fn-lnk" href="#fn32"><span class="wb-inv">Footnote </span>32</a></sup></p>

<h3>Canadian Survey of Cyber Security and Cybercrime</h3>

<p>Statistics Canada conducts the Canadian Survey of Cyber Security and Cybercrime (CSCSC) on behalf of Public Safety Canada. This survey gathers information on the financial and operational effects of cybercrime on Canadian businesses. It also gathers information on the readiness of Canadian businesses toward implementing proactive cyber security and managing security incidents. The most recent <abbr title="Canadian Survey of Cyber Security and Cybercrime">CSCSC</abbr> data, published in October 2024, uses information gathered in 2023 from a sample of over 12,000 Canadian organizations. The survey provides key insights into the prevalence and impacts of cyber incidents, including ransomware, in addition to evolutions in security postures and procedures among Canadian businesses.<sup id="fn33-rf"><a class="fn-lnk" href="#fn33"><span class="wb-inv">Footnote </span>33</a></sup></p>

<section class="panel panel-primary"><div class="panel-body center-block">
<p class="text-center"><strong>13%</strong> of businesses reporting cyber security incidents identified <strong>ransomware</strong> as the method of attack, a 2% increase since the 2021 <abbr title="Canadian Survey of Cyber Security and Cybercrime">CSCSC</abbr>.</p>
</div>
</section><section class="panel panel-primary"><div class="panel-body center-block">
<p class="text-center">Following an increase of CAD 200 million from 2019 to 2021, the total recovery costs associated with cyber security incidents in 2023 <strong>doubled</strong> to <strong>CAD 1.2 billion</strong>.</p>
</div>
</section><section class="panel panel-primary"><div class="panel-body center-block">
<p class="text-center">Approximately <strong>22% of businesses</strong> reported that formal training was provided to non-<abbr title="information technology">IT</abbr> workers to improve and progress their cyber security skills.</p>
</div>
</section><section class="panel panel-primary"><div class="panel-body center-block">
<p class="text-center">There was an <strong>11% decrease</strong> in organizations employing <strong>cyber security workers</strong>, primarily due to the use of third-party cyber security consultants and <abbr title="managed service providers">MSPs</abbr>.</p>
</div>
</section></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="9">Cyber snapshots</h2>

<p>Across Canada, organizations are increasingly forced to reckon with the evolving cyber threat landscape. Ransomware can have serious consequences for business functions, supply chain management, and customer confidence when cybercriminals disrupt operations, steal or leak sensitive information.</p>

<p>We assess that ransomware actors will continue to target Canada and Canadian organizations in the next 2 years. Examining publicly reported case studies of ransomware incidents can help contextualize the impacts to business functions and communities that rely on these organizations’ services. Understanding the real-life implications of ransomware can help Canadians recognize the severity of the issue and recognize how they, their businesses, and their communities may be impacted.</p>

<h3>Public sector</h3>

<h4>Example one</h4>

<p>A Canadian entity in the public sector reported that they were the victim of a cyber security breach. The breach caused widespread technical outages, leaving services unavailable for months. Rather than pay the ransom, the entity chose to rebuild their systems.</p>

<p>Following the initial detection of suspicious activity, the entity engaged with its incident response team, external security consultants, law enforcement, and legal counsel to investigate and contain the breach.</p>

<p>An impact assessment revealed that threat actors initially accessed the network but remained dormant for months before exfiltrating data. The stolen data included information on staff and their dependants. The data also included information on customers, contractors, stakeholders, volunteers, and job applicants, including personal, medical, and financial information.</p>

<h4>Example two</h4>

<p>A Canadian public sector organization was the target of a ransomware attack that significantly disrupted operations.</p>

<p>Within days, the organization contained the incident and recovered most of their services from system backups. It maintained that no ransom was paid and that, following a forensic analysis, it found no evidence that the threat actors retrieved any sensitive or personal information.</p>

<p>Despite the restoration of some services, certain systems remained unusable for months after the incident. Recovery and rebuilding costs were estimated in the millions of dollars.</p>

<h3>Private sector</h3>

<p>Two Canadian logistics companies experienced a breach involving customers’ personal information.</p>

<p>The entities reported the attack to the potentially affected parties, relevant federal authorities, and the Office of the Privacy Commissioner of Canada (OPC). The <abbr title="Office of the Privacy Commissioner of Canada">OPC</abbr> launched an immediate investigation to evaluate the effectiveness of the precautions in place to safeguard the sensitive information.</p>

<p>A ransomware group claimed responsibility for the attack and alleged to have stolen a significant volume of documents.</p>

<h3>Retail sector</h3>

<p>A large Canadian health retailer reported a ransomware attack that forced operations to be shut down for days while systems were rebuilt.</p>

<p>The organization refused to pay the ransom and deployed countermeasures to protect their networks from additional compromise. External experts and law enforcement were engaged to contain the threat and restore systems. The entity stated that the ransomware attack compromised data related to their human resources and finance departments, including some employee data.</p>

<h3>Education sector</h3>

<p>An education technology organization announced that a threat actor had leveraged a compromised credential for a customer support portal to gain access to sensitive data. The impacted databases contained information from millions of individuals.</p>

<p>The organization reported the incident to relevant law enforcement authorities, and made the decision to pay the ransom. Despite assurances from the threat actor that the stolen information would be deleted, it was announced that the threat actor continued to contact victims in an attempt to re-extort them with the same data from the initial incident.</p>

<h3>Energy sector</h3>

<p>A Canadian entity in the energy sector confirmed that it was the victim of a ransomware attack that resulted in the leak of sensitive personal and banking information from many current and former customers. The entity notified all impacted customers and offered credit monitoring and identity protection at no cost.</p>

<p>The entity confirmed that they did not pay the ransom demand and enacted their incident response protocols, engaging with cyber security experts to assess the impact of the attack and rebuild and restore impacted systems.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="10">Myths and misconceptions</h2>

<p>A key step to Canadians bolstering their baseline resilience to cyber attacks is debunking common misconceptions and beliefs. This includes Canadians building a better understanding of their proximity to threats and the sensitivity of their personal or business information, as well as taking important steps for incident response.</p>

<h3>“We’re too small to be a target”</h3>

<p>We assess that any Canadian organization, small or large, can likely be susceptible to cyber threats and the impacts of ransomware. Although some ransomware groups maintain a self-proclaimed “moral code,” whereby they refrain from targeting certain organizations (for example, hospitals, charities, government agencies, religious institutions), others will target any organization.<sup id="fn34-rf"><a class="fn-lnk" href="#fn34"><span class="wb-inv">Footnote </span>34</a></sup></p>

<p>Groups that are more technically sophisticated and well resourced may conduct proactive research on companies to identify those most likely to pay ransom demands. Meanwhile, other threat actors prioritize increasing dedicated leak site posts, regardless of victim size, to bolster their reputation.</p>

<p>Smaller businesses often use <abbr title="managed service providers">MSPs</abbr> to manage parts of their operations, or integrate parts of their supply chains with multiple other entities. This can increase the threat surface for these businesses if those third parties experience compromises.</p>

<div class="well well-sm">
<p><strong>Resources:</strong></p>

<ul><li><a href="/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations">Baseline cyber security controls for small and medium organizations</a></li>
	<li><a href="/en/guidance/top-measures-enhance-cyber-security-small-and-medium-organizations-itsap10035">Top measures to enhance cyber security for small and medium organizations</a></li>
	<li><a href="/en/malicious-cyber-activity-targeting-information-technology-managed-service-providers">Malicious cyber activity targeting information technology managed service providers</a></li>
</ul></div>

<h3>“We don’t need all these cyber security tools and rules”</h3>

<p>Every time Canadians leave their homes, it is very likely that they mitigate any potential risks by closing their windows, locking their doors, and turning on their security systems.</p>

<p>Similarly, implementing basic cyber hygiene practices can significantly reduce the likelihood of ransomware attacks. Routine training and education for employees help foster personal diligence and strengthened cyber security awareness. This can have a tremendous impact in preventing common forms of entry for ransomware, including:</p>

<ul><li>spoofed websites</li>
	<li>phishing messages</li>
	<li>compromised login credentials</li>
</ul><p>Flagging suspicious content and taking a moment to think critically and validating URLs and email addresses as well as are simple steps that individuals can take to prevent malware infections.<sup id="fn35-rf"><a class="fn-lnk" href="#fn35"><span class="wb-inv">Footnote </span>35</a></sup> Other measures that individuals and organizations can take to protect themselves against ransomware include:</p>

<ul><li>routine backups</li>
	<li>automatic updates</li>
	<li>security tools</li>
</ul><div class="well well-sm">
<p><strong>Resources:</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/steps-effectively-deploying-multi-factor-authentication-mfa-itsap00105">Steps for effectively deploying multi-factor authentication (MFA)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/best-practices-passphrases-and-passwords-itsap30032">Best practices for passphrases and passwords</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/password-managers-security-itsap30025">Password managers: Security tips</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-security-hygiene-best-practices-your-organization-itsap10102">Cyber hygiene best practices for your organization</a></li>
</ul></div>

<h3>“Paying the ransom is the easiest way to get our data back”</h3>

<p>There is no guarantee that threat actors will unlock systems or return stolen data if organizations that experience a ransomware attack pay the demanded ransom. Threat actors can copy the data and use it to revictimize an organization or its customers for more money.<sup id="fn36-rf"><a class="fn-lnk" href="#fn36"><span class="wb-inv">Footnote </span>36</a></sup></p>

<p>Cyber insurance as a proactive protection measure against ransomware can encourage organizations to align their cyber security postures with insurance policy standards. However, if insurance policy documents are not properly protected on an organization’s website or systems, sophisticated ransomware actors could obtain information on coverage amounts and leverage it in ransom negotiations to maximize their payment.<sup id="fn37-rf"><a class="fn-lnk" href="#fn37"><span class="wb-inv">Footnote </span>37</a></sup></p>

<h3>“I don’t run a business, so why should I care about ransomware?”</h3>

<p>In the current digital landscape, countless organizations likely collect and store your sensitive information. If those corporations suffer a ransomware attack, your personal data could be indirectly compromised. A ransomware attack can lead to spillover effects that can impact Canadians, regardless of their job or their diligence with data. When cyber attacks disrupt organizations that provide essential services, they can severely limit public access to pharmaceuticals, transportation, internet services, and other critical resources.</p>

<h3>“I don’t care if my data is out there—they can have it”</h3>

<p>Organizations are increasingly responsible for handling immense amounts of personal data from Canadian customers, from sensitive financial details to contact information and health records. In the aftermath of a ransomware attack, threat actors often sell compromised consumer data on the dark web. Once your data has been compromised, it will very likely remain in this ecosystem. This increases your vulnerability to threats like targeted phishing email campaigns, which can then impact your clients, family, and friends.<sup id="fn38-rf"><a class="fn-lnk" href="#fn38"><span class="wb-inv">Footnote </span>38</a></sup></p>

<p>Business owners should be concerned about their data security since a compromise of their information (such as intellectual property) can directly impact their reputation, financial security, and market competitiveness.</p>

<section class="panel panel-primary"><header class="panel-heading"><h4 class="panel-title">Reporting ransomware</h4>
</header><div class="panel-body">
<p>If you or your organization experience a ransomware attack, we advise you to report it to your local authorities, the Canadian Anti-Fraud Centre, and the Cyber Centre (through <a href="/en/incident-management">My Cyber Portal</a> or by email at <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>).</p>

<p>Reporting cyber attacks allows relevant authorities to properly investigate attacks and identify the source of the compromise to protect your organization and others from future incidents.</p>

<p>Understanding the ransomware landscape in Canada depends on our comprehension of the size and nature of threat actors. By reporting cyber attacks, you help contribute to a safer, smarter Canada.</p>
</div>
</section></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="11">Outlook</h2>

<p>We assess that ransomware will remain a significant threat to Canada, requiring substantial attention from Canadians in the coming years. As organizations become more integrated into the digital landscape, increasing exploitation opportunities for threat actors, their infrastructure and sensitive data will very likely continue to be at risk of compromise by ransomware.</p>

<p>Cyber threat actors have, and will continue to, evolve their TTPs, including extortion tactics and victim demography, to increase the impact of their attacks and their opportunities to reap financial reward. However, Canadian organizations can do a lot to protect themselves from these threats. It is crucial that Canadian organizations looking to safeguard their systems and information consider cyber security at the core of everything they do. This includes implementing fundamental cyber security practices such as patching operational technology, enabling automatic updates and <abbr title="multi-factor authentication">MFA</abbr>, and encouraging secure-by-design. Canadian organizations should also take advantage of the tools available to them — such as the malware detection and analysis tool, Assemblyline, developed by the Cyber Centre — to continuously monitor their networks and stay vigilant of evolving threats.</p>

<p>Continued collaboration between domestic law enforcement, the private sector, and international allies will be required to bolster understanding of the threat ecosystem and to coordinate appropriate proactive and responsive actions to prevent the global impact and spread of ransomware.</p>

<p>The Cyber Centre works around the clock to detect and defend against ransomware and other similar cyber threats. One of the ways we do this is by providing pre-ransomware notifications to warn potential victims during the initial stage of a ransomware incident. Through these notifications, cyber defenders can pinpoint and stop ransomware attacks before any data is compromised. In the 2024 to 2025 fiscal year, we issued 336 pre-ransomware notifications to over 300 Canadian organizations, resulting in an economic savings of up to CAD 18 million.</p>

<p>For more information on how Canadians and Canadian organizations can protect themselves against the ransomware threat and bolster their overall cyber resilience, we encourage them to consult our <a href="https://www.cyber.gc.ca/en/cyber-security-readiness/cyber-security-readiness-goals-securing-our-most-critical-systems">Cyber Security Readiness Goals</a>, <a href="https://www.cyber.gc.ca/en/guidance/ransomware-playbook-itsm00099">Ransomware Playbook</a>, and other <a href="https://www.cyber.gc.ca/en/guidance">cyber security guidance</a> available on the Cyber Centre website.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="12">Glossary</h2>

<dl class="dl-horizontal"><dt>Artificial intelligence (AI)</dt>
	<dd>A subfield of computer science that develops intelligent computer programs to behave in a way that would be considered intelligent if observed in a human (for example, solve problems, learn from experience, understand language, interpret visual scenes).</dd>
	<dt>Big game hunting</dt>
	<dd>The practice of targeting critical infrastructure and other sensitive organizations because they are perceived to be more likely to pay larger ransoms to avoid critical service disruptions or to protect sensitive information.</dd>
	<dt>Botnet</dt>
	<dd>A network of computers forced to work together on the command of an unauthorized remote user. This network of compromised computers is used to attack other systems.</dd>
	<dt>Commonwealth of Independent States (CIS)</dt>
	<dd>A regional organization established in 1991 that comprises 9 member states previously part of the Soviet Union: Armenia, Azerbaijan, Belarus, Kazakhstan, Kyrgyzstan, Moldova, Russia, Tajikistan, and Uzbekistan.</dd>
	<dt>Cryptocurrency</dt>
	<dd>Virtual assets that use cryptography to protect and affirm their ownership. Units of cryptocurrency are called “coins,” such as Bitcoin and Ether. Cryptocurrency transactions are generally recorded on their respective blockchains. “Tokens” represent a certain value of “coins” and can be used to buy certain goods and services. Cryptocurrencies operate on a peer-to-peer system and are not managed by a central authority like a bank, government, or country.</dd>
	<dt>Cyber insurance</dt>
	<dd>A specialized product intended to help businesses manage losses caused by computer networking threats such as data breaches and cyber extortion. Cyber insurance can cover a range of cyber events, including confidential data breaches, cyber extortion, and technology disruptions.</dd>
	<dt>Dark web</dt>
	<dd>An unindexed segment of the Internet that is only accessible through specialized software or network proxies. Due to the inherently anonymous and private nature of the dark web, it facilitates a complex ecosystem of cybercrime and illicit goods and services trade.</dd>
	<dt>Decryptor</dt>
	<dd>A specialized tool designed to help businesses recover encrypted files without having to pay attackers for decryption keys.<sup id="fn39-rf"><a class="fn-lnk" href="#fn39"><span class="wb-inv">Footnote </span>39</a></sup></dd>
	<dt>Dedicated leak sites</dt>
	<dd>Websites where ransomware threat actors publish data stolen from companies that refuse to pay the ransom. These sites can contain sensitive information such as login credentials, intellectual property, and personal and financial data. They put victim organizations at risk of security breaches, identity theft, financial fraud, reputational damage, and legal consequences.<sup id="fn40-rf"><a class="fn-lnk" href="#fn40"><span class="wb-inv">Footnote </span>40</a></sup></dd>
	<dt>Deepfakes</dt>
	<dd>Content that has been digitally manipulated and is intended to deceive. This includes artificially generated images, audio, and videos.</dd>
	<dt>Distributed denial of service (DDoS)</dt>
	<dd>A type of cyber attack in which threat actors aim to disrupt or prevent legitimate users from accessing a networked system, service, website, or application.</dd>
	<dt>Double extortion</dt>
	<dd>When ransomware actors exfiltrate files before encrypting them and threaten to leak sensitive information publicly if the ransom is not paid.</dd>
	<dt>Encryption</dt>
	<dd>Converting information from one form to another to hide its content and prevent unauthorized access.</dd>
	<dt>Exfiltration</dt>
	<dd>The unauthorized transfer of data from a network, system, or device.<sup id="fn41-rf"><a class="fn-lnk" href="#fn41"><span class="wb-inv">Footnote </span>41</a></sup></dd>
	<dt>Generative <abbr title="artificial intelligence">AI</abbr></dt>
	<dd>A class of <abbr title="artificial intelligence">AI</abbr> models that emulate the structure and characteristics of input data to generate synthetic content. This can include images, audio, text, and other digital content.<sup id="fn42-rf"><a class="fn-lnk" href="#fn42"><span class="wb-inv">Footnote </span>42</a></sup></dd>
	<dt>Initial access brokers</dt>
	<dd>Threat actors that sell access to corporate networks.<sup id="fn43-rf"><a class="fn-lnk" href="#fn43"><span class="wb-inv">Footnote </span>43</a></sup></dd>
	<dt>Large language models</dt>
	<dd>Artificial neural networks that are trained on very large sets of language data using self- and semi-supervised learning. Large language models initially generated text via next-word prediction but can now take prompts so that users can complete sentences or generate entire documents on a given topic. Training on exceptionally large datasets allows the model to learn sophisticated linguistic structures and the biases or inaccuracies found in that data.</dd>
	<dt>Malware</dt>
	<dd>Malicious software designed to infiltrate or damage a computer system, without the owner’s consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware.</dd>
	<dt>Managed service providers (MSP)</dt>
	<dd>Companies that offer a range of information management and information technology services. This includes physical, virtual, or cloud infrastructure, as well as providers who manage stored data primarily in a virtual environment.</dd>
	<dt>Multi-factor authentication (MFA)</dt>
	<dd>A tactic that can add an additional layer of security to your devices and accounts. Multi-factor authentication requires additional verification (like a PIN or fingerprint) to access your devices or accounts. Two-factor authentication is a type of multi-factor authentication.</dd>
	<dt>Phishing</dt>
	<dd>An attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, typically for financial gain. Phishers attempt to trick users into disclosing sensitive personal data, such as credit card numbers or online banking credentials, which they may then use to commit fraudulent acts.</dd>
	<dt>Ransomware</dt>
	<dd>Type of malware that denies a user access to a system or data until a sum of money is paid.</dd>
	<dt>Ransomware-as-a-Service (RaaS)</dt>
	<dd>A core group of developers sell or lease their ransomware variant to other threat actors, called affiliates. The core developers will allow affiliates to deploy their ransomware in exchange for upfront payment, subscription fees, a cut or profits, or all 3.</dd>
	<dt>Social engineering</dt>
	<dd>The practice of obtaining confidential information by manipulating legitimate users. A social engineer will often trick people into revealing sensitive information over the phone or online. Phishing is a type of social engineering.</dd>
	<dt>Symmetric cryptography</dt>
	<dd>A cryptographic key is used to perform a cryptographic operation and its inverse operation (for example, encrypt and decrypt, create a message authentication code and verify the code).</dd>
	<dt>Tactics, techniques, and procedures (TTP)</dt>
	<dd>The behaviour of an actor. A tactic is the highest-level description of this behaviour, while techniques give a more detailed description of behaviour in the context of a tactic, and procedures an even lower-level, highly detailed description in the context of a technique.<sup id="fn44-rf"><a class="fn-lnk" href="#fn44"><span class="wb-inv">Footnote </span>44</a></sup></dd>
	<dt>Vulnerability</dt>
	<dd>A flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization’s assets or operations.</dd>
</dl></section><!--FOOTNOTE SECTION EN--><aside class="wb-fnote" role="note"><h2 class="text-info" id="13">References</h2>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p>Kurt Baker, “<a href="https://www.crowdstrike.com/en-us/cybersecurity-101/ransomware/history-of-ransomware/?__cf_chl_rt_tk=UIj85aW1_uPWYtx1XhwnX2DFKanbaN4dCeUUeNt2xg4-1753969253-1.0.1.1-U_mvkOxTntsn8QDFU9C5Df73xbudYr0nkuJ6TxtGWUU">History of Ransomware</a>,” CrowdStrike, October 9, 2022; “<a href="https://www.knowbe4.com/ransomware-knowledgebase/aids-trojan">AIDS Trojan or PC Cyborg Ransomware</a>,” KnowBe4; Ryan Estes, “<a href="https://www.watchguard.com/wgrd-security-hub/secplicity-blog/dr-joseph-l-popp-jr-and-first-ever-ransomware-aids-trojan">Dr. Joseph L Popp Jr and The First-Ever Ransomware – The AIDS Trojan</a>,” WatchGuard, February 18, 2025; Kaveh Waddell, “<a href="https://www.theatlantic.com/technology/archive/2016/05/the-computer-virus-that-haunted-early-aids-researchers/481965/">The Computer Virus That Haunted Early AIDS Researchers</a>,” The Atlantic, May 10, 2016.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>“<a href="https://www.europol.europa.eu/cms/sites/default/files/documents/Europol Spotlight - Cryptocurrencies - Tracing the evolution of criminal finances.pdf">Cryptocurrencies: Tracing the evolution of criminal finances (PDF)</a>,” Europol, January 26, 2022; “<a href="/en/guidance/cyber-threat-bulletin-modern-ransomware-and-its-evolution">Cyber threat bulletin: Modern ransomware and its evolution</a>,” Canadian Centre for Cyber Security, November 30, 2020; Kurt Baker, “<a href="https://www.crowdstrike.com/en-us/cybersecurity-101/ransomware/history-of-ransomware/?__cf_chl_rt_tk=UIj85aW1_uPWYtx1XhwnX2DFKanbaN4dCeUUeNt2xg4-1753969253-1.0.1.1-U_mvkOxTntsn8QDFU9C5Df73xbudYr0nkuJ6TxtGWUU">History of Ransomware</a>,” CrowdStrike, October 9, 2022.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p>“<a href="https://arcticwolf.com/resources/blog/the-history-of-ransomware/">The History of Ransomware</a>,” Arctic Wolf, June 5, 2024; “<a href="https://www.fbi.gov/news/stories/new-internet-scam">New Internet Scam</a>,” FBI, August 9, 2012; Orlaith Traynor, “<a href="https://cybelangel.com/ransomware-story-reveton-to-maze/">From Reveton to Maze: Tracing the Evolution of Ransomware</a>,” CyberAngel, August 27, 2020.</p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p>“<a href="https://www.fbi.gov/news/stories/gameover-zeus-botnet-disrupted">GameOver Zeus Botnet Disrupted</a>,” FBI, June 2, 2014; Matthew Kosinski, “<a href="https://www.ibm.com/think/topics/ransomware">What is ransomware?</a>” IBM, June 4, 2024; “<a href="https://www.fbi.gov/news/press-releases/u.s.-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware-charges-botnet-administrator">U.S. Leads Multi-National Action Against GameOver Zeus Botnet and Cryptolocker Ransomware, Charges Botnet Administrator</a>,” United States Department of Justice, June 2, 2014; “<a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-modern-ransomware-and-its-evolution">Cyber threat bulletin: Modern ransomware and its evolution</a>,” Canadian Centre for Cyber Security, November 30, 2020; “<a href="https://www.fbi.gov/news/stories/ransomware-on-the-rise">Ransomware on the Rise</a>,” FBI, January 20, 2015; Ivan Belcic, “<a href="https://www.avast.com/c-cryptolocker">What is CryptoLocker Ransomware and How to Remove it</a>,” Avast. February 27, 2020.</p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p>“<a href="https://www.security.com/threat-intelligence/samsam-targeted-ransomware-attacks">SamSam: Targeted Ransomware Attacks Continue</a>,” Symantec, October 30, 2018; “<a href="https://www.justice.gov/archives/opa/pr/two-iranian-men-indicted-deploying-ransomware-extort-hospitals-municipalities-and-public;">Two Iranian Men Indicted for Deploying Ransomware to Extort Hospitals, Municipalities, and Public Institutions, Causing Over $30 Million in Losses</a>,” United States Department of Justice, November 28, 2018; “<a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-modern-ransomware-and-its-evolution">Cyber threat bulletin: Modern ransomware and its evolution</a>,” Canadian Centre for Cyber Security, November 30, 2020; “<a href="https://www.crowdstrike.com/en-us/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/#:~:text=The%20Future%20of%20INDRIK%20SPIDER%20and%20Big%20Game%20Hunting&amp;text=Since%20they%20were%20first%20identified,be%20a%20growing%20eCrime%20threat.">Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware</a>,” CrowdStrike. November 14, 2018.</p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p>Veronic Drake, “<a href="https://flashpoint.io/blog/the-history-and-evolution-of-ransomware-attacks/">The History and Evolution of Ransomware Attacks</a>,” Flashpoint, July 29, 2022; Martin Zugec “<a href="https://www.bitdefender.com/en-us/blog/businessinsights/the-origin-of-ransomware-exploring-the-evolution-of-one-of-cybersecuritys-most-prolific-threats">The Origin of Ransomware – Exploring the evolution of one of cybersecurity’s most prolific threats</a>,” Bitdefender. May 23, 2022; Jennifer Gregory, “<a href="https://www.ibm.com/think/x-force/wannacry-worm-ransomware-changed-cybersecurity">Wannacry: how the widespread ransomware changed cybersecurity</a>,” IBM, October 30, 2020.</p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p>Veronic Drake, “<a href="https://flashpoint.io/blog/the-history-and-evolution-of-ransomware-attacks/">The History and Evolution of Ransomware Attacks</a>,” Flashpoint, July 29, 2022; Lawrence Abrams, “<a href="https://www.bleepingcomputer.com/news/security/allied-universal-breached-by-maze-ransomware-stolen-data-leaked/">Allied Universal Breached by Maze Ransomware, Stolen Data Leaked</a>,” Bleeping Computer, November 21, 2019.</p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 8</dt>
	<dd id="fn8">
	<p>“<a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-modern-ransomware-and-its-evolution">Cyber threat bulletin: Modern ransomware and its evolution</a>,” Canadian Centre for Cyber Security, November 30, 2020; “<a href="https://arcticwolf.com/resources/blog/the-history-of-ransomware/">The History of Ransomware</a>,” Arctic Wolf, June 5, 2024.</p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote</span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 9</dt>
	<dd id="fn9">
	<p>“<a href="https://www.checkpoint.com/cyber-hub/ransomware/what-is-triple-extortion-ransomware/">What is Triple Extortion Ransomware?</a>” Check Point; Kevin Poireault, “<a href="https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/ransomware-trends-multi-extortion-tactics.html">Ransomware Trends: The Rise of Multi-Extortion Tactics</a>,” Infosecurity Europe. February 11, 2025; “<a href="https://www.paloaltonetworks.ca/cyberpedia/what-is-multi-extortion-ransomware#phases">What is Multi-Extortion Ransomware?</a>” Palo Alto Networks.</p>

	<p class="fn-rtn"><a href="#fn9-rf"><span class="wb-inv">Return to footnote</span>9<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 10</dt>
	<dd id="fn10">
	<p>Mahmoud Zohdy, et al., “<a href="https://www.group-ib.com/blog/hunters-international-ransomware-group/">The beginning of the end: the story of Hunters International</a>,” Group-IB, April 2, 2025.</p>

	<p class="fn-rtn"><a href="#fn10-rf"><span class="wb-inv">Return to footnote</span>10<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 11</dt>
	<dd id="fn11">
	<p>Mahmoud Zohdy, et al., “<a href="https://www.group-ib.com/blog/hunters-international-ransomware-group/">The beginning of the end: the story of Hunters International</a>,” Group-IB, April 2, 2025.</p>

	<p class="fn-rtn"><a href="#fn11-rf"><span class="wb-inv">Return to footnote</span>11<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 12</dt>
	<dd id="fn12">
	<p>“<a href="https://www.lmgsecurity.com/online-extortion-is-the-new-ransomware-why-hackers-just-want-your-data/?srsltid=AfmBOor9dFI0rzm_NJrC_E7O8bwgkOFjtxrivLbtTTdDyDSA_4GjYW08">Online Extortion Is the New Ransomware: Why Hackers Just Want Your Data</a>,” LMG Security, July 10, 2025; “<a href="https://www.helpnetsecurity.com/2025/04/28/companies-impacted-ransomware-attacks/">Ransomware attacks are getting smarter, harder to stop</a>,” Help Net Security, April 28, 2025; Phil Muncaster, “<a href="https://www.infosecurity-magazine.com/news/only-fifth-ransomware-attacks/">Only a Fifth of Ransomware Attacks Now Encrypt Data</a>,” Infosecurity Magazine, February 25, 2025.</p>

	<p class="fn-rtn"><a href="#fn12-rf"><span class="wb-inv">Return to footnote</span>12<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 13</dt>
	<dd id="fn13">
	<p>Jamie MacColl, et al. “<a href="https://www.rusi.org/explore-our-research/publications/occasional-papers/ransomware-victim-insights-harms-individuals-organisations-and-society">Ransomware: Victim Insights on Harms to Individuals, Organisations and Society</a>,” Royal United Services Institute, January 16, 2024.</p>

	<p class="fn-rtn"><a href="#fn13-rf"><span class="wb-inv">Return to footnote</span>13<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 14</dt>
	<dd id="fn14">
	<p>Aliasgar Dohadwala, “<a href="https://www.forbes.com/councils/forbestechcouncil/2025/02/27/the-ransomware-epidemic-why-smes-are-the-new-primary-target/">The Ransomware Epidemic: Why SMEs Are the New Primary Target</a>,” Forbes, February 27, 2025.</p>

	<p class="fn-rtn"><a href="#fn14-rf"><span class="wb-inv">Return to footnote</span>14<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 15</dt>
	<dd id="fn15">
	<p>“<a href="https://www.cyber.gc.ca/en/guidance/malicious-cyber-activity-targeting-information-technology-managed-service-providers">Malicious Cyber Activity Targeting Technology Managed Service Providers</a>,” Canadian Centre for Cyber Security, December 20, 2018.</p>

	<p class="fn-rtn"><a href="#fn15-rf"><span class="wb-inv">Return to footnote</span>15<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 16</dt>
	<dd id="fn16">
	<p>Lucia Stanham, “<a href="https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/ai-powered-cyberattacks/"><abbr title="artificial intelligence">AI</abbr>-Powered Cyberattacks</a>,” CrowdStrike, January 16, 2025; Jambul Tologonov and John Fokker, “<a href="https://www.trellix.com/blogs/research/analysis-of-black-basta-ransomware-chat-leaks/">Analysis of Black Basta Ransomware Chat Leaks</a>,” March 18, 2025; “<a href="https://research.checkpoint.com/2025/funksec-alleged-top-ransomware-group-powered-by-ai/#single-post">FunkSec – Alleged Top Ransomware Group Powered by <abbr title="artificial intelligence">AI</abbr></a>,” Check Point Research, January 10, 2025.</p>

	<p class="fn-rtn"><a href="#fn16-rf"><span class="wb-inv">Return to footnote</span>16<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 17</dt>
	<dd id="fn17">
	<p>TRM Blog, “<a href="https://www.trmlabs.com/resources/blog/unmasking-embargo-ransomware-a-deep-dive-into-the-groups-ttps-and-blackcat-links">Unmasking Embargo Ransomware: A Deep Dive Into the Group’s TTPs and BlackCat Links</a>,” TRM, August 8, 2025; TRM Blog, “<a href="https://www.trmlabs.com/resources/blog/ransomware-in-2024-latest-trends-mounting-threats-and-the-government-response">Ransomware in 2024: Latest Trends, Mounting Threats, and the Government Response</a>,” TRM, October 10, 2024.</p>

	<p class="fn-rtn"><a href="#fn17-rf"><span class="wb-inv">Return to footnote</span>17<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 18</dt>
	<dd id="fn18">
	<p>Jim Bronskill, “<a href="https://globalnews.ca/news/10148020/cryptocurrency-criminal-use-fintrac/">Criminal use of cryptocurrency to keep growing, Canada’s Fintrac warns</a>,” Global News, December 4, 2023.</p>

	<p class="fn-rtn"><a href="#fn18-rf"><span class="wb-inv">Return to footnote</span>18<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 19</dt>
	<dd id="fn19">
	<p>“<a href="https://www.chainalysis.com/blog/2025-crypto-crime-report-introduction/">2025 Crypto Crime Trends: Illicit Volumes Portend Record Year as On-Chain Crime Becomes Increasingly Diverse and Professionalized</a>,” Chainalysis, January 15, 2025; MacKenzie Sigalos, “<a href="https://www.cnbc.com/2021/06/13/what-is-monero-new-cryptocurrency-of-choice-for-cyber-criminals.html">Why some cyber criminals are ditching bitcoin for a cryptocurrency called monero</a>,” CNBC, June 14, 2021; “<a href="https://rcmp.ca/en/gazette/cryptocurrency-expert-demystifies-digital-assets">Cryptocurrency expert demystifies digital assets</a>,” Royal Canadian Mounted Police, October 20, 2020.</p>

	<p class="fn-rtn"><a href="#fn19-rf"><span class="wb-inv">Return to footnote</span>19<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 20</dt>
	<dd id="fn20">
	<p>“<a href="https://www.chainalysis.com/blog/privacy-coins-anonymity-enhanced-cryptocurrencies/">Privacy Coins 101: Anonymity-Enhanced Cryptocurrencies</a>,” Chainalysis, April 18, 2023; “<a href="https://www.europol.europa.eu/cms/sites/default/files/documents/Europol%20Spotlight%20-%20Cryptocurrencies%20-%20Tracing%20the%20evolution%20of%20criminal%20finances.pdf">Cryptocurrency: Tracing the Evolution of Criminal Finances (PDF)</a>,” Europol, January 26, 2022.</p>

	<p class="fn-rtn"><a href="#fn20-rf"><span class="wb-inv">Return to footnote</span>20<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 21</dt>
	<dd id="fn21">
	<p>TRM Blog, “<a href="https://www.trmlabs.com/resources/blog/trm-phoenix-solves-crypto-investigators-chain-hopping-problem">TRM Phoenix Solves Crypto Investigators’ ‘Chain-Hopping’ Problem</a>,” TRM, August 24, 2022.</p>

	<p class="fn-rtn"><a href="#fn21-rf"><span class="wb-inv">Return to footnote</span>21<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 22</dt>
	<dd id="fn22">
	<p>“<a href="https://www.europol.europa.eu/cms/sites/default/files/documents/Europol%20Spotlight%20-%20Cryptocurrencies%20-%20Tracing%20the%20evolution%20of%20criminal%20finances.pdf">Cryptocurrency: Tracing the Evolution of Criminal Finances (PDF)</a>,” Europol, January 26, 2022.</p>

	<p class="fn-rtn"><a href="#fn22-rf"><span class="wb-inv">Return to footnote</span>22<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 23</dt>
	<dd id="fn23">
	<p>“<a href="https://www.spambrella.com/geopolitical-influence-on-ransomware-trends-risks/">Geopolitical Influences on Ransomware: Trends and Risks</a>,” Spambrella.</p>

	<p class="fn-rtn"><a href="#fn23-rf"><span class="wb-inv">Return to footnote</span>23<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 24</dt>
	<dd id="fn24">
	<p>“<a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-cyber-threat-activity-related-russian-invasion-ukraine">Cyber threat bulletin, Cyber threat activity related to the Russian invasion of Ukraine</a>,” Canadian Centre for Cyber Security, July 14, 2022.</p>

	<p class="fn-rtn"><a href="#fn24-rf"><span class="wb-inv">Return to footnote</span>24<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 25</dt>
	<dd id="fn25">
	<p>Daryna Antoniuk, “<a href="https://therecord.media/iran-ransomware-group-pay2keyi2p-israel-us-targets">Iranian ransomware group offers bigger payouts for attacks on Israel, US</a>,” The Record, July 8, 2025.</p>

	<p class="fn-rtn"><a href="#fn25-rf"><span class="wb-inv">Return to footnote</span>25<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 26</dt>
	<dd id="fn26">
	<p>Daryna Antoniuk, “<a href="https://therecord.media/akira-ransomware-early-victims-conti-links">Akira ransomware compromised at least 63 victims since March, report says</a>,” The Record, July 26, 2023.</p>

	<p class="fn-rtn"><a href="#fn26-rf"><span class="wb-inv">Return to footnote</span>26<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 27</dt>
	<dd id="fn27">
	<p>Steven Campbell, Akshay Suthar, Connor Belfiore, “<a href="https://arcticwolf.com/resources/blog/conti-and-akira-chained-together/">Conti and Akira: Chained Together</a>,” July 26, 2023.</p>

	<p class="fn-rtn"><a href="#fn27-rf"><span class="wb-inv">Return to footnote</span>27<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 28</dt>
	<dd id="fn28">
	<p>Ionut Arghire, “<a href="https://www.securityweek.com/akira-ransomware-drops-30-victims-on-leak-site-in-one-day/">Akira Ransomware Drops 30 Victims on Leak Site in One Day</a>,” November 19, 2024; Morgan Demboski, “<a href="https://news.sophos.com/en-us/2023/12/21/akira-again-the-ransomware-that-keeps-on-taking/">Akira, again: The ransomware that keeps on taking</a>,” Sophos, December 21, 2023.</p>

	<p class="fn-rtn"><a href="#fn28-rf"><span class="wb-inv">Return to footnote</span>28<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 29</dt>
	<dd id="fn29">
	<p>Ionut Arghire, “<a href="https://www.securityweek.com/fbi-aware-of-900-organizations-hit-by-play-ransomware/">FBI Aware of 900 Organizations Hit by Play Ransomware</a>,” Security Week, June 5, 2025.</p>

	<p class="fn-rtn"><a href="#fn29-rf"><span class="wb-inv">Return to footnote</span>29<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 30</dt>
	<dd id="fn30">
	<p>Cj Arsley Mateo, Darrel Tristan Virtusio, Sarah Pearl Camiling, Andrei Alimboyao, Nathaniel Morales, Jacob Santos, Earl John Bareng, “<a href="https://www.trendmicro.com/en_ca/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html">Play Ransomware Group’s New Linux Variant Targets ESXi, Shows Ties With Prolific Puma</a>,” Trend Micro, July 19, 2024.</p>

	<p class="fn-rtn"><a href="#fn30-rf"><span class="wb-inv">Return to footnote</span>30<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 31</dt>
	<dd id="fn31">
	<p>James Coker, “<a href="https://www.infosecurity-magazine.com/news/medusa-claims-victims-2025/">Medusa Ransomware Claims 40+ Victims in 2025, Confirmed Healthcare Attacks</a>,” Inforsecurity Magazine, March 7, 2025; Jonathan Grieg, “<a href="https://therecord.media/medusa-ransomware-targeting-critical-infrastructure-orgs">CISA: More than 300 critical infrastructure orgs attacked by Medusa ransomware</a>,” The Record, March 12, 2025.</p>

	<p class="fn-rtn"><a href="#fn31-rf"><span class="wb-inv">Return to footnote</span>31<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 32</dt>
	<dd id="fn32">
	<p>“<a href="https://www.cyber.gc.ca/en/guidance/introduction-cyber-threat-environment#defn-intellectual-property">An introduction to the cyber threat environment</a>,” Canadian Centre for Cyber Security, October 28, 2022.</p>

	<p class="fn-rtn"><a href="#fn32-rf"><span class="wb-inv">Return to footnote</span>32<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 33</dt>
	<dd id="fn33">
	<p>“<a href="https://www23.statcan.gc.ca/imdb/p2SV.pl?Function=getSurvey&amp;SDDS=5244">Canadian Survey of Cyber Security and Cybercrime</a>,” Public Safety, October 18, 2024.</p>

	<p class="fn-rtn"><a href="#fn33-rf"><span class="wb-inv">Return to footnote</span>33<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 34</dt>
	<dd id="fn34">
	<p>“<a href="https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem">Ransomware, extortion and the cyber crime ecosystem</a>,” National Cyber Security Centre, September 11, 2023.</p>

	<p class="fn-rtn"><a href="#fn34-rf"><span class="wb-inv">Return to footnote</span>34<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 35</dt>
	<dd id="fn35">
	<p>“<a href="https://www.getcybersafe.gc.ca/en/protect-your-business-against-ransomware#A">Protect your business against ransomware</a>,” Get Cyber Safe, January 14, 2025.</p>

	<p class="fn-rtn"><a href="#fn35-rf"><span class="wb-inv">Return to footnote</span>35<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 36</dt>
	<dd id="fn36">
	<p>“<a href="https://www.cyber.gc.ca/en/guidance/ransomware-how-prevent-and-recover-itsap00099#devices">Ransomware: How to prevent and recover</a>,” Canadian Centre for Cyber Security, April 18, 2024.</p>

	<p class="fn-rtn"><a href="#fn36-rf"><span class="wb-inv">Return to footnote</span>36<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 37</dt>
	<dd id="fn37">
	<p>Anne Neuberger, “<a href="https://www.ft.com/content/3b172a2a-4be5-4ef4-87cb-7fdcdee2ad99">The ransomware battle is shifting – so should our response</a>,” Financial Times, October 4, 2024; “<a href="https://www.marsh.com/en/services/cyber-risk/insights/ransomware-a-persistent-challenge-in-cyber-insurance-claims.html">Ransomware: A persistent challenge in cyber insurance claims</a>,” Marsh, June 11, 2024.</p>

	<p class="fn-rtn"><a href="#fn37-rf"><span class="wb-inv">Return to footnote</span>37<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 38</dt>
	<dd id="fn38">
	<p>Celina Aalders, “<a href="https://www.cbc.ca/news/canada/nova-scotia/cybersecurity-official-weighs-in-on-nova-scotia-power-breach-1.7560875">Canada’s cybersecurity head offers rare insight into Nova Scotia Power breach</a>,” June 14, 2025.</p>

	<p class="fn-rtn"><a href="#fn38-rf"><span class="wb-inv">Return to footnote</span>38<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 39</dt>
	<dd id="fn39">
	<p>Brenda Robb, “<a href="https://www.blackfog.com/understanding-ransomware-decryptors-and-how-they-can-be-used/#toc_What_Is_a_Ransomware_Decryptor_and_How_Does">Understanding Ransomware Decryptors and How They Can Be Used</a>,” BlackFog, July 24, 2025.</p>

	<p class="fn-rtn"><a href="#fn39-rf"><span class="wb-inv">Return to footnote</span>39<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 40</dt>
	<dd id="fn40">
	<p>“<a href="https://www.group-ib.com/resources/knowledge-hub/dedicated-leak-sites/">Dedicated Leak Sites (DLS): Here’s what you should know</a>,” Group-IB.</p>

	<p class="fn-rtn"><a href="#fn40-rf"><span class="wb-inv">Return to footnote</span>40<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 41</dt>
	<dd id="fn41">
	<p>“<a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf">Security and Privacy Controls for Information Systems and Organizations</a>,” National Institute of Standards and Technology.</p>

	<p class="fn-rtn"><a href="#fn41-rf"><span class="wb-inv">Return to footnote</span>41<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 42</dt>
	<dd id="fn42">
	<p>“<a href="https://csrc.nist.gov/glossary/term/generative_artificial_intelligence">Computer Security Resource Center Glossary</a>,” National Institute of Standards and Technology.</p>

	<p class="fn-rtn"><a href="#fn42-rf"><span class="wb-inv">Return to footnote</span>42<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 43</dt>
	<dd id="fn43">
	<p>Sule Tatar, “<a href="https://arcticwolf.com/resources/glossary/what-are-initial-access-brokers/">Initial Access Brokers</a>,” Arctic Wolf.</p>

	<p class="fn-rtn"><a href="#fn43-rf"><span class="wb-inv">Return to footnote</span>43<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 44</dt>
	<dd id="fn44">
	<p>“<a href="https://csrc.nist.gov/glossary/term/tactics_techniques_and_procedures">Computer Security Resource Center Glossary</a>,” National Institute of Standards and Technology.</p>

	<p class="fn-rtn"><a href="#fn44-rf"><span class="wb-inv">Return to footnote</span>44<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-security-considerations-drone-use-itsap00143</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-security-considerations-drone-use-itsap00143"/><title><![CDATA[Cyber security considerations for drone use (ITSAP.00.143)]]></title><updated>2026-01-27T19:41:05Z</updated><summary><![CDATA[Drones are mobile vehicle systems that can function with varying degrees of autonomy from human operators. Depending on their design and function, they may also be called remotely operated systems, remotely piloted aircraft systems, or uncrewed ground/underwater vehicles. Understanding the risks associated with the use of drones for business or operational purposes will enhance your organization’s ability to protect your systems, data, and networks.]]></summary><content><![CDATA[<article data-history-node-id="7172" about="/en/guidance/cyber-security-considerations-drone-use-itsap00143" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.143</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Awareness series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg"><!--<div class="mrgn-bttm-md well well-sm col-md-4 pull-right mrgn-lft-md col-sm-12 col-xs-12">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/ITSAP00101-e.pdf">Don't take the bait: Recognize and avoid phishing attacks&nbsp;- ITSAP.00.101 (PDF,&nbsp;307&nbsp;KB)</a></p>
</div>-->
<p>Drones are mobile vehicle systems that can function with varying degrees of autonomy from human operators. Depending on their design and function, they may also be called remotely operated systems, remotely piloted aircraft systems, or uncrewed ground/underwater vehicles.</p>

<p>Before deploying a drone, you should conduct a threat risk assessment (TRA). A <abbr title="threat risk assessment">TRA</abbr> will help to identify potential security threats and determine the appropriate cyber security measures required to mitigate them. Understanding the risks associated with the use of drones for business or operational purposes will enhance your organization’s ability to protect your systems, data, and networks.</p>

<section><h2 class="threat risk assessment h3">On this page</h2>

<ul><li><a href="#Types">Types of drones</a></li>
	<li><a href="#drones-work">How drones work</a></li>
	<li><a href="#risks">Risks associated with drones</a></li>
	<li><a href="#Ai-risks">Artificial intelligence risks</a></li>
	<li><a href="#software-risks">Management platforms and software risks</a></li>
	<li><a href="#Considerations-vendor">Considerations for vendor selection</a></li>
	<li><a href="#Considerations-own">Considerations with own-made drones</a></li>
	<li><a href="#Securing">Securing your drone</a></li>
	<li><a href="#More">Learn more</a></li>
</ul></section><section><h2 class="text-info" id="Types">Types of drones</h2>

<p>There are many styles of drones that have different forms and serve varying purposes. They can be generally categorized into 3 main types based on their design and intended use: commercial, own-made and professional.</p>

<div>
<h3>Commercial drones</h3>

<p>These drones are produced by commercial organizations and used to support business and individual activities. Commercial drones have a wide range of applications, depending on the field or line of business. Some examples include aerial photography, agricultural spraying and package delivery. Commercial drones generally use commodity parts with low-security supply chains.</p>

<h3>Own-made drones</h3>

<p>These drones are built and created by individuals or organizations, often for personal use. Own-made drones can also be organization-made and used to control features that would typically be managed by third parties. These drones generally use a mix of custom-made hardware, software and parts, which allows for more visibility into supply chains.</p>

<h3>Professional drones</h3>

<p>Professional drones are used in critical environments, such as military or search and rescue. These drones are used for tasks like perimeter surveillance, emergency response and industrial inspection. They typically feature components that have complete visibility and control of supply chain contents.</p>

<p>Professional drones can be used for many purposes, including:</p>

<ul><li>recreation</li>
	<li>surveillance</li>
	<li>commerce</li>
	<li>data collection</li>
	<li>infrastructure monitoring and inspection</li>
	<li>emergency response</li>
	<li>public safety</li>
	<li>security</li>
</ul></div>
</section><section><h2 class="text-info" id="drones-work">How drones work</h2>

<p>Drones can operate without a physical connection to a controller (for example, untethered and remote). They work semi-autonomously by using stability control, following a pre-programmed path or by human control. Some drones are capable of fully autonomous modes of operation, using onboard systems to navigate and perform tasks without real-time human input. An example of autonomous mode are drones that follow a pattern. Some drones connect to the Internet or require data to be transmitted through the Internet. Most rely on satellite systems to provide global positioning and timing services.</p>

<p>A drone’s functionality is supported by 2 main components: on-board and off-board systems.</p>

<p>On-board systems include:</p>

<ul><li>central control computer</li>
	<li>communication modules</li>
	<li>movement and stability controls</li>
	<li>positioning and navigation tools (like GPS and visual or acoustic sensors)</li>
	<li>data collection tools (like camera and microphones)</li>
</ul><p>Off-board systems include:</p>

<ul><li>a control station (like a computer or mobile device)</li>
	<li>a user interface for monitoring and issuing commands</li>
	<li>data display and storage systems</li>
</ul></section><section><h2 class="text-info" id="risks">Risks associated with drones</h2>

<p>Drones are susceptible to a variety of cyber threats that can compromise their functionality and the data they collect. Most notably, drones can pose significant risk to your organization when connected directly or indirectly to your network. They are untrusted devices meaning their connection can be leveraged by threat actors as an attack vector or used to gain remote access to your environment.</p>

<p>Another common risk involves drones being misled through satellite navigation interference. For example, signals can be jammed or spoofed to create false signals and prevent communications from reaching the drone. This can cause the drone to go off course without realising that it has changed trajectory. Unintentional electromagnetic interference can also disrupt drone communication signals.</p>

<p>If your drone is compromised, threat actors may be able to:</p>

<ul><li>take control of the drone from the current authorized operator</li>
	<li>steal authentication and encryption mechanisms used by drones to gain access</li>
	<li>acquire images, the location of the operator and other data captured by sensors</li>
	<li>access sensitive information through drone images that contain metadata, revealing operational activities (for example, timestamps and location coordinates)</li>
	<li>exploit vulnerabilities in other systems by injecting malware</li>
</ul></section><section><h2 class="text-info" id="Ai-risks">Artificial intelligence risks</h2>

<p>Drones with artificial intelligence (AI) functionality may be vulnerable to different attack methods. Manipulated inputs to the drone can cause AI models to misinterpret data, leading to incorrect decisions. Consider the following examples of AI-related attacks.</p>

<div>
<h3>Data manipulation</h3>

<p>Images can be manipulated to deceive AI navigation systems by altering sensor inputs or physical objects. This can cause navigation systems to misinterpret information and may lead to incorrect or unexpected operational outcomes.</p>

<h3>Data poisoning</h3>

<p>Threat actors can corrupt training data through data poisoning attacks. This can result in faulty AI decision-making.</p>

<h3>Swarm attacks</h3>

<p>Threat actors can conduct swarm attacks which enable multiple AI-functioning drones to operate autonomously and collaboratively to overwhelm defences.</p>

<h3>Denial of service attacks</h3>

<p>Threat actors can gain unauthorized access to perform arbitrary code execution (for example, using commands or code to disable the drone or its process) due to traditional software vulnerabilities.</p>
</div>
</section><section><h2 id="software-risks">Management platforms and software risks</h2>

<p>Drone management platforms or the software used to operate and manage drones rely on:</p>

<ul><li>remote connections</li>
	<li>cloud platforms</li>
	<li>flight telemetry sensors</li>
	<li>cloud infrastructure</li>
</ul><p>These platforms and software can present further threat surfaces to your drones and data. If compromised, your drones and data are at risk of having their images and coordinates stolen, losing control and losing sensitive information. Some of these platforms may use sensitive authentication credentials used to access higher security levels, which can be a greater risk to your data if compromised.</p>
</section><section><h2 class="text-info" id="Considerations-vendor">Considerations for vendor selection</h2>

<p>When selecting a drone vendor or manufacturer you should ask cyber security related questions, such as:</p>

<ul><li>Does the drone manufacturer engage in secure-by-design and secure-by-default practices?
	<ul><li>Products that incorporate secure-by-design and secure-by-default prioritize the security of customers as the core business requirement</li>
	</ul></li>
	<li>How does the drone minimize the effects of satellite spoofing and jamming attacks?</li>
	<li>Has a vulnerability analysis been performed on the drone, controller and any peripherals and has it been shared by an independent and verified third party?</li>
	<li>Is a list of all components and dependencies used in the software application available from the manufacturer?
	<ul><li>This is required to reflect the scope of vulnerabilities or mitigations in the software used for the drone and related systems</li>
	</ul></li>
	<li>Is supply chain information available for the drone and peripherals?
	<ul><li>Knowledge of the supply chains used in manufacturing the drone and related system offers information on potential vulnerabilities</li>
	</ul></li>
	<li>What documentation exists to ensure that proper cryptographic methods have been validated, applied and subjected to thorough testing?
	<ul><li>For more details on appropriate cryptographic methods, consult our <a href="https://www.cyber.gc.ca/en/guidance/guidance-becoming-cryptographically-agile-itsap40018">guidance on becoming cryptographically agile (ITSAP.40.018)</a></li>
	</ul></li>
</ul><p>Regarding user functionality and what security measures you might have to keep up with, consider the following questions:</p>

<ul><li>Do the drone, controller and peripherals require frequent updates?
	<ul><li>You should only update the firmware and software if necessary (for example, for security patches)</li>
		<li>Perform updates on separate, isolated systems to protect sensitive information and operations</li>
	</ul></li>
	<li>Can the drone, controller or peripheral firmware updates be reversed or returned to the previous version?
	<ul><li>Before installing patches, review the related details for necessary security features, as updates can include undesirable features or introduce other vulnerabilities</li>
	</ul></li>
	<li>Are proprietary software and drivers required to be installed on the systems to handle data with the drone?
	<ul><li>A device with access to your systems could expose those systems to threat actors</li>
	</ul></li>
	<li>Can a static code analysis (for example, examining the source code to identify vulnerabilities) be performed on the firmware or other software used to control or interact with the drone?
	<ul><li>This offers stronger cyber security and can be easily scanned and analyzed for vulnerabilities by a variety of third parties</li>
	</ul></li>
	<li>Is strong encryption used to store and communicate drone images?
	<ul><li>Encryption secures the data being stored on and transferred to and from the drone</li>
	</ul></li>
	<li>Can the drone store images and data by using on-board memory (for example, an SD card)?
	<ul><li>Using a secure peripheral to store and import data to a scanned external device can be more secure than using proprietary software</li>
	</ul></li>
	<li>Does the drone, controlling system and any peripherals connect to a cloud platform?
	<ul><li>Connecting to a cloud platform can introduce cloud-based vulnerabilities and threats</li>
	</ul></li>
</ul></section><section><h2 class="text-info" id="Considerations-own">Considerations with own-made drones</h2>

<p>When choosing to create or use an own-made drone, you should consider the following cyber security measures:</p>

<ul><li>Ensure that the source code is open source and has been audited by a verified organization</li>
	<li>Ensure that strong encryption practices are used to encode images stored and transmitted</li>
	<li>Test the drone thoroughly and make improvements where necessary</li>
	<li>Consider redundant and fail-safe systems (for example, ensure the system will function as needed if one or more parts fail)</li>
	<li>Make sure emergency remote takeover systems for human supervision exist</li>
	<li>Ensure the system architecture is well documented and includes all components</li>
	<li>Monitor and log activities for continuous security enhancements (for example, incident response)</li>
</ul></section><section><h2 class="text-info" id="Securing">Securing your drone</h2>

<p>There are many cyber security considerations when setting up and securing your drone. The following actions can strengthen the security of your drone and your data:</p>

<ul><li>Use a dedicated or stand-alone controller for your drone rather than a mobile device used for other purposes</li>
	<li>Establish an isolated environment or zone for drone use so you can control and monitor network access</li>
	<li>Ensure the networks that the drones and related systems use are separate from networks used by other trusted systems to isolate the threat from other sensitive environments</li>
	<li>Use strong encryption to secure the data transferred to and from the device</li>
	<li>Set up a separate and secure isolated environment to transfer, install and scan recorded data and required applications (for example, updates and patches)</li>
	<li>Use an SD card or external peripheral to transfer sensitive data rather than cloud connections</li>
	<li>Disable default cloud connections
	<ul><li>If you need to use the cloud, use on-premises cloud platforms with strong encryption to protect data in transit and at rest</li>
	</ul></li>
	<li>Mitigate jamming or spoofing attacks by integrating tools (for example, microelectromechanical systems or fibre-optic cables) that recognize other signals and can be used for alternate guidance methods</li>
</ul><p>Consider the following security tools to stay vigilant and monitor your drone data and activity:</p>

<ul><li>Take note of the information that could be accessed by the drone and shared with third parties when configuring your device</li>
	<li>Be suspicious of what data is being shared with remote servers and use a virtual private network to transfer the data</li>
	<li>Request a copy of the source code for the firmware and other drone software so your IT team can run a static code analysis</li>
	<li>Request evidence of a comprehensive third-party vulnerability assessment</li>
	<li>Monitor suspicious activity by implementing an intrusion detection and prevention system on the network used by drones to detect and block the traffic immediately</li>
	<li>Use monitor logs to indicate vulnerabilities, further secure sensitive information and patch areas that need greater security</li>
	<li>Implement a zero trust architecture if handling sensitive data and to mitigate AI related risks</li>
</ul></section><section><h2 class="text-info" id="More">Learn more</h2>

<ul><li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="481aa714-81de-40f1-a235-4b363a33b5ed" href="/en/guidance/virtual-private-networks-itsap80101">Virtual private networks (ITSAP.80.101)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="6f60e716-5938-4916-8d09-0e12f3bcc3eb" href="/en/guidance/network-security-logging-monitoring-itsap80085">Network security logging and monitoring (ITSAP.80.085)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="2a6c1378-35ab-468d-ba5c-83b74485f94f" href="/en/guidance/network-security-auditing-itsap80086">Network security auditing - ITSAP.80.086</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="300c9e0e-f1b5-4344-97b3-e98cc202ca32" href="/en/guidance/using-encryption-keep-your-sensitive-data-secure-itsap40016">Using encryption to keep your sensitive data secure (ITSAP.40.016)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="5dce3d4e-ffe7-4e14-8d66-c726ed824ab2" href="/en/guidance/connected-and-automated-vehicle-cyber-security-your-organization-itsap00142">Connected and automated vehicle cyber security for your organization (ITSAP.00.142)</a></li>
	<li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f54c5a85-6da4-47eb-bf66-a217f423a17d" href="/en/guidance/guidance-becoming-cryptographically-agile-itsap40018">Guidance on becoming cryptographically agile (ITSAP.40.018)</a></li>
	<li><a href="https://www.cisa.gov/news-events/news/us-and-international-partners-publish-secure-design-and-default-principles-and-approaches">U.S. and International Partners Publish Secure-by-Design and -Default Principles and Approaches (Cybersecurity and Infrastructure Security Agency)</a></li>
</ul></section></div>
</div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/what-do-when-your-organization-has-been-compromised-cyber-attack-itsap00009</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/what-do-when-your-organization-has-been-compromised-cyber-attack-itsap00009"/><title><![CDATA[What to do when your organization has been compromised by a cyber attack (ITSAP.00.009)]]></title><updated>2026-01-21T16:49:12Z</updated><summary><![CDATA[This publication provides guidance on the actions you should take in the critical moments after a compromise is detected to lessen the impact on your organization.]]></summary><content><![CDATA[<article data-history-node-id="7173" about="/en/guidance/what-do-when-your-organization-has-been-compromised-cyber-attack-itsap00009" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.009</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Awareness series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg">
<p>Cyber attacks are common and can impact organizations of all sizes, within all sectors. This publication provides guidance on the actions you should take in the critical moments after a compromise is detected to lessen the impact on your organization.</p>

<section><h2 class="text-info h3">On this page</h2>

<ul><li><a href="#compromise-instructions">What to do after discovering a compromise</a></li>
	<li><a href="#compromise-recommendations">Recommended IT response to a compromise</a></li>
	<li><a href="#learn-more">Learn more</a></li>
</ul></section></div>
</div>

<h2 class="text-info" id="compromise-instructions">What to do after discovering a compromise</h2>

<p>The moments immediately after a compromise is detected are crucial to minimizing the impacts. Take the following steps immediately after detection.</p>

<h3>Keep the system powered on</h3>

<p>Your device holds volatile forensic evidence that can be used to help determine the source and scale of the suspected compromise. Although it may seem obvious to restart your device to see if the problem persists, it’s important to keep all potentially compromised devices turned on. You should take note of important information that may otherwise be lost.</p>

<p>To best preserve this evidence:</p>

<ul><li>Lock the system</li>
	<li>Do NOT shut down the system</li>
	<li>Do NOT reboot the system</li>
	<li>Do NOT log the current user out</li>
</ul><p>Do not destroy any forensic evidence during the entirety of the investigation. Logging off, or even temporarily removing the device’s power source, will clear it of all volatile data.</p>

<h3>Verify the incident</h3>

<p>Contact your IT department to perform a thorough sweep on impacted devices. They can confirm if the issue is truly an incident and whether the host device is compromised. To assist IT in verifying the incident, ensure you have the following information:</p>

<ul><li>When you first suspected a compromise</li>
	<li>Which devices you think are compromised</li>
	<li>Who had access to the compromised device(s) and information</li>
	<li>Who currently has access to the device(s) and do they require access</li>
	<li>When did you last perform system and software updates</li>
	<li>What types of information do you suspect were stolen</li>
	<li>How many people do you think were affected and do you have their contact information</li>
	<li>Who is the designated point of contact for your organization</li>
	<li>Does the designated point of contact have the authority to permit and conduct forensic imaging for the sake of investigation</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="compromise-recommendations">Recommended IT response to a compromise</h2>

<p>Once your IT department has verified that an incident has occurred and there is a compromise, they should take the following steps to respond. These steps will help to minimize the impact of the compromise on your organization.</p>

<h3>Contain the incident</h3>

<p>Depending on the device or scale of the compromise, you may need to use a combination of these techniques for complete isolation:</p>

<ul><li>Isolate all compromised devices and systems from the network by using tools that support a quarantine feature</li>
	<li>Place the compromised devices in a separate virtual local area network</li>
	<li>Deactivate the network interface card</li>
	<li>Disallow Wi-Fi connection or remove the network cable</li>
	<li>Review access and control privileges in your organization and limit access where possible</li>
	<li>Revoke access to any third-party apps or services connected to the compromised accounts and review and manage app permissions</li>
</ul><h3>Inform necessary stakeholders</h3>

<p>When an incident occurs, ensure you inform those in your organization that need to know. Consult with legal and financial counsel if necessary. Consider contacting relevant service providers, such as cloud service providers or managed service providers, who may offer additional assistance and security measures during your investigation.</p>

<p>The <em>Privacy Act</em> applies to the Government of Canada and private sector organizations are governed by the <em>Personal Information Protection and Electronic Documents Act (PIPEDA)</em>. Private sector organizations are required to:</p>

<ul><li>report to the Privacy Commissioner of Canada any data breach involving personal information that poses a risk of significant harm to individuals</li>
	<li>notify individuals affected by the breach</li>
	<li>retain records related to the breach</li>
</ul><h3>Collect evidence</h3>

<p>Before starting an investigation, your organization should have a dedicated forensics workstation to minimize contamination with other devices. Also, your organization should ensure that the appropriate authority has approved of these investigative actions. We recommend taking note of all the actions taken, including the purpose of each task. Your IT department can also take the following actions to collect investigative evidence.</p>

<h4>Acquire volatile evidence</h4>

<p>Volatile evidence is data that is only present when the device is powered on and running, such as random access memory (RAM). It is vital that the compromised device stay powered on until all volatile forensic evidence is collected and preserved. The collected evidence should be stored on an external device for safekeeping.</p>

<h4>Acquire non-volatile evidence</h4>

<p>Non-volatile evidence is data that persists even when there is a loss of power, for example, disk images (a bit-by-bit copy of data on disk).</p>

<h4>Check for BitLocker encryption</h4>

<p>BitLocker is a full-volume encryption feature on Microsoft Windows products designed to protect data by providing encryption for entire volumes. If you are collecting BitLocker encrypted data, make sure to have the BitLocker recovery key on hand.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="learn-more">Learn more</h2>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/have-you-been-victim-cybercrime">Have you been a victim of cybercrime? (ITSAP.00.037)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/steps-effectively-deploying-multi-factor-authentication-mfa-itsap00105">Steps for effectively deploying multi-factor authentication (MFA) (ITSAP.00.105)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/foundational-cyber-security-actions-small-organizations-itsap10300">Foundational cyber security actions for small organizations (ITSAP.10.300)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/best-practices-passphrases-and-passwords-itsap30032">Best practices for passphrases and passwords (ITSAP.30.032)</a></li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/developing-your-it-recovery-plan-itsap40004</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/developing-your-it-recovery-plan-itsap40004"/><title><![CDATA[Developing your IT recovery plan (ITSAP.40.004)]]></title><updated>2026-01-16T19:03:08Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="634" about="/en/guidance/developing-your-it-recovery-plan-itsap40004" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row"><!--Info across the top under the image-->
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.40.004</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Awareness series</strong></p>
</div>
<!--ENGLISH Intro paragraph plus pdf download-->

<div class="col-md-12 mrgn-tp-lg">
<p class="mrgn-tp-sm">Unplanned outages, cyber attacks, and natural disasters can happen unexpectedly. Your organization may lose information or experience downtime that disrupts or stops critical business functions. Unplanned downtime is expensive and could have a lasting impact on your business. To ensure continued operations with minimal downtime, your organization should have an <abbr title="information technology">IT</abbr> recovery plan as part of your overall business continuity approach. The <abbr title="information technology">IT</abbr> recovery plan should identify critical data, applications, and processes, and define how your organization will recover <abbr title="information technology">IT</abbr> services that support business operations, products, and services.</p>

<section><h2 class="h3 text-info">On this page</h2>

<ul><li><a href="#1">Know your business disruption tolerance</a></li>
	<li><a href="#2">Identify your critical business functions, applications, and data</a></li>
	<li><a href="#3">Create your <abbr title="information technology">IT</abbr> recovery plan</a></li>
	<li><a href="#4">Choose your recovery strategy </a></li>
	<li><a href="#5">Test your <abbr title="information technology">IT</abbr> recovery plan</a></li>
	<li><a href="#6">Learn more</a></li>
</ul></section></div>
</div>

<div class="clearfix"> </div>

<p>Your <abbr title="information technology">IT</abbr> recovery plan should clearly identify and document what needs to be recovered, when, where, and by whom.</p>

<p>In general, there are 3 types of plans you should consider developing for your business. These plans take into consideration major events that could cause an unplanned outage and require a recovery response.</p>

<ul><li><strong>Incident response plan:</strong> Event-focused plan, specific to a security incident like a cyber attack affecting an organization</li>
	<li><strong>Business continuity plan:</strong> Specific plan to quickly resume only the most critical operations, as defined by a business impact analysis, in the event of a disaster</li>
	<li><strong>Disaster recovery plan:</strong> Holistic plan to return your organization to full operations after a disaster</li>
</ul><h2 class="text-info" id="1">Know your business disruption tolerance</h2>

<p>To develop an effective recovery plan, you should tailor it to address the impact an incident would have on your organization. Your plan should also specify the level of disruption your organization is willing to accept if an incident occurs. There are 3 key measures to consider in your plan:</p>

<ul><li><strong>Maximum tolerable downtime:</strong> The total length of time that a process can be unavailable without causing significant harm to your business</li>
	<li><strong>Recovery point objective:</strong> The measurement of data loss that is tolerable to your organization</li>
	<li><strong>Recovery time objective:</strong> The planned time and level of service needed to meet the system owner’s minimum expectations</li>
</ul><h2 class="text-info" id="2">Identify your critical business functions, applications, and data</h2>

<p>Your plan should identify your organization’s critical data, applications, and functions. Critical data may include financial records, proprietary assets, and personal data.</p>

<p>Critical applications are the systems that run your key business functions and are imperative to your business. These are the systems that must be restored immediately for business continuity in the event of an unplanned outage.</p>

<p>To identify critical business functions, applications, and data, you should conduct a risk assessment to identify threats and vulnerabilities. Run through specific scenarios (such as a cyber attack, significant power outage, or natural disaster) to identify key participants and stakeholders. Reviewing these scenarios will also help you address significant risks, develop mitigation strategies, and identify the recovery time and effort.</p>

<p>Conduct a business impact analysis (BIA) to predict how disruptions or incidents will harm your operations, business processes and systems, and finances. During your <abbr title="business impact analysis">BIA</abbr>, you should also assess the data that you collect and the applications that you use to determine their criticality and choose priorities for immediate recovery.</p>

<h2 class="text-info" id="3">Create your <abbr title="information technology">IT</abbr> recovery plan</h2>

<p>Complete to the following steps when creating your organization’s <abbr title="information technology">IT</abbr> recovery plan.</p>

<ol><li>Identify stakeholders, including clients, vendors, business owners, systems owners, and managers</li>
	<li>Identify your response team members, as well as their roles and responsibilities</li>
	<li>Take inventory of all your hardware and software assets</li>
	<li>Identify and prioritize critical business functions, applications, and data</li>
	<li>Set clear recovery objectives</li>
	<li>Define back-up and recovery strategies</li>
	<li>Test your plan regularly</li>
	<li>Develop a communications plan to inform key stakeholders</li>
	<li>Develop a training program for employees to ensure that everyone is aware of their roles, responsibilities, and the order of operations during an unplanned outage</li>
	<li>Engage with managed service providers if required to identify areas in which they can assist you with your recovery efforts</li>
</ol><h2 class="text-info" id="4">Choose your recovery strategy</h2>

<p>There are several options to consider when implementing your recovery strategy, but you should choose a recovery strategy that meets your business needs and security requirements.</p>

<h3>Hot, warm, or cold site</h3>

<ul><li><strong>Hot site</strong>

	<ul><li>back-up site with the same servers and equipment as your primary site</li>
		<li>functions the same as your primary site and is always kept running in case of downtime</li>
		<li>data synchronization occurs within minutes to hours, reducing the risk of data loss</li>
	</ul></li>
	<li><strong>Warm site</strong>
	<ul><li>back-up site with network connectivity and some equipment installed</li>
		<li>requires setup to function at the full capacity of your primary site</li>
		<li>data synchronization occurs less frequently, which can result in some data loss</li>
	</ul></li>
	<li><strong>Cold site</strong>
	<ul><li>back-up site with little to no equipment</li>
		<li>requires more time and resources to set up and restore business operations</li>
		<li>data synchronization can be a difficult and lengthy process as servers need to be migrated from your primary site, resulting in a higher risk of data loss</li>
	</ul></li>
</ul><h3>Storage replication</h3>

<p>Storage replication copies your data in real time from one location to another over a Storage Area Network, Local Area Network or a Wide Area Network. Since it is done in real time, it is referred to as synchronous replication. You can also use asynchronous replication, which creates copies of data according to a defined schedule.</p>

<h3>Disk mirroring</h3>

<p>Disk mirroring replicates data on 2 or more disk hard drives. Disk mirroring automatically switches your critical data to a standby server or network when your main system experiences unplanned downtime. If you are unable to restore your systems, you can use the mirror copy. It is important that the mirrored copy is backed up to a separate server or location that is unaffected by the outage.</p>

<h3>Cloud vs. on-premises recovery</h3>

<p>With a cloud-based recovery platform, you can connect easily from anywhere with a variety of devices. You can back up your data frequently, and it can be less expensive than purchasing and maintaining an on-premises platform because you pay for the space you need as you need it. Using the cloud can also reduce or eliminate the need for a separate offsite recovery site.</p>

<h2 class="text-info" id="5">Test your <abbr title="information technology">IT</abbr> recovery plan</h2>

<p>Testing is critical. You can identify inconsistencies and address areas that need revision. Be sure to use a test environment to avoid business interruptions. Some example test strategies include:</p>

<ul><li><strong>Checklist:</strong> Read through and explain the steps of the recovery plan</li>
	<li><strong>Walkthrough:</strong> Walk through the steps without enacting them</li>
	<li><strong>Simulation:</strong> Use a simulated incident or disaster to familiarize the recovery team with their roles and responsibilities</li>
	<li><strong>Parallel test:</strong> Set up and test recovery systems to see if they can perform operations to support key processes. You keep your main systems in full production mode</li>
	<li><strong>Cutover test:</strong> Your recovery systems are set up to assume all your business operations, and you disconnect primary systems. This type of test causes business interruptions and requires additional planning</li>
</ul><h2 class="text-info" id="6">Learn more</h2>

<ul><li><a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002)</a></li>
	<li><a href="/en/guidance/have-you-been-hacked-itsap00015">Have you been hacked? (ITSAP.00.015)</a></li>
	<li><a href="/en/guidance/ransomware-how-prevent-and-recover-itsap00099">Ransomware: How to prevent and recover (ITSAP.00.099)</a></li>
	<li><a href="/en/guidance/cyber-security-tips-remote-work-itsap10116">Cyber security tips for remote work (ITSAP.10.116)</a></li>
	<li><a href="/en/guidance/benefits-and-risks-adopting-cloud-based-services-your-organization-itse50060">Benefits and risks of adopting cloud-based services in your organization (ITSE.50.060)</a></li>
	<li><a href="/en/guidance/cyber-security-considerations-consumers-managed-services-itsm50030">Cyber security considerations for consumers of managed services (ITSM.50.030)</a></li>
	<li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan (ITSAP.40.003)</a></li>
	<li><a href="/en/guidance/developing-your-business-continuity-plan-itsap10005">Business continuity plan (ITSAP.10.005)</a></li>
	<li><a href="/en/guidance/improving-cyber-security-resilience-through-emergency-preparedness-planning-itsm10014">Improving cyber security resilience through emergency preparedness (ITSM.10.014)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/improving-cyber-security-resilience-through-emergency-preparedness-planning-itsm10014</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/improving-cyber-security-resilience-through-emergency-preparedness-planning-itsm10014"/><title><![CDATA[Improving cyber security resilience through emergency preparedness planning (ITSM.10.014)]]></title><updated>2026-01-16T19:03:08Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7066" about="/en/guidance/improving-cyber-security-resilience-through-emergency-preparedness-planning-itsm10014" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Management series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSM.10.014</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Management series</strong></p>
</div>

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsm.10.014-improving-cyber security-resilience-emergency-preparedness-e.pdf">Improving cyber security resilience through emergency preparedness planning – ITSM.10.014 (PDF, 695 KB)</a></p>
</div>

<h2 class="text-info mrgn-tp-0">Foreword</h2>

<p>This is an <span class="text-uppercase">unclassfied</span> publication that has been issued under the authority of the Head of the Canadian Centre for Cyber Security (Cyber Centre). For more information, contact the Cyber Centre:</p>

<p><span class="glyphicon glyphicon-envelope"></span><span class="wb-inv">email</span> <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> |<span class="glyphicon glyphicon-phone"></span><span class="wb-inv">Mobile</span> <a href="tel:613-949-7048">613-949-7048</a> or <a href="tel:+1-833-292-3788">1<span>‑</span>833<span>‑</span>CYBER<span>‑</span>88</a></p>

<h2 class="text-info">Effective date</h2>

<p>This publication takes effect on January 2026.</p>

<h2 class="text-info">Revision history</h2>

<ol><li>First release: January 2026</li>
</ol></div>
</div>

<section><h2 class="text-info">Overview</h2>

<p>Cyber emergency preparedness is the practice of ensuring that your organization has a strategy to prevent, respond to, and recover from cyber incidents. Implementing a cyber emergency preparedness strategy requires a collaborative effort from stakeholders across your organization. Your strategy should highlight key aspects of your emergency procedures, such as the steps your organization will take to respond to an incident, who will be contacted in case of an incident, and what resources will be required to carry out your overall plan. A cyber emergency preparedness strategy will help your organization to manage risks and improve resilience in the face of catastrophic events.</p>

<p>This publication describes emergency preparedness, related to cyber security, as a strategy that encompasses an incident response plan (IRP), a business continuity plan (BCP), and a disaster recovery plan (DRP). The difference between these 3 plans is detailed in this publication, along with the justification for why your organization should develop and implement all 3 plans to improve your cyber resilience and ability to maintain business operations amid an incident or a major disruption.</p>

<p>Your emergency preparedness plan should align with a relevant security risk management framework, such as:</p>

<ul><li>the Cyber Centre <a href="/en/guidance/it-security-risk-management-lifecycle-approach-itsg-33"><abbr title="information technology">IT</abbr> Security Risk Management: A Lifecycle Approach (ITSG-33)</a></li>
	<li>the National Institute of Standards and Technology (NIST) <a href="https://www.nist.gov/cyberframework">Cyber Security Framework</a></li>
	<li>the International Organization for Standardization (ISO) <a href="https://www.iso.org/standard/75652.html">ISO/IEC 27002:20122 Information security, cybersecurity and privacy protection — Information security controls</a></li>
</ul><p>Integrating your emergency preparedness plan into your organization's security framework will help improve your cyber security resiliency and provide the security assurances of confidentiality, integrity, and availability for your business assets.</p>

<p>We recommend that you report cyber incidents to the Cyber Centre using our online reporting tool. We can provide your organization with cyber security advice, guidance, and services to help mitigate the impact of cyber incidents and better protect your organization from future incidents. We also encourage you to report cybercrime activities to law enforcement and fraud to the <a href="https://antifraudcentre-centreantifraude.ca/index-eng.htm">Canadian Anti-Fraud Centre</a>.</p>
</section><section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul><li><a href="#emergency-prep">1. Introduction to emergency preparedness</a>

	<ul><li><a href="#benefits-emergency-prep">1.1 Benefits of an emergency preparedness plan</a></li>
		<li><a href="#comparing-recovery">1.2 Comparing incident response, business continuity, and disaster recovery</a></li>
	</ul></li>
	<li><a href="#incident-response">2. Incident response planning</a>
	<ul><li><a href="#incident-response-considerations">2.1 What to consider before creating an incident response plan</a></li>
		<li><a href="#additional-consider-ot">2.2 Additional considerations for operational technology</a></li>
		<li><a href="#creating-incident-response">2.3 Guidance for creating an incident response plan</a></li>
		<li><a href="#steps-incident-response">2.4 Main steps in an incident response plan</a></li>
	</ul></li>
	<li><a href="#buisness-continuity-planning">3. Business continuity planning</a>
	<ul><li><a href="#disruptions-organisation">3.1 Main disruptions that can affect your organization</a></li>
		<li><a href="#buisness-continuity-development">3.2 Steps to developing your business continuity plan</a></li>
	</ul></li>
	<li><a href="#disaster-recovery">4. Disaster recovery plan</a>
	<ul><li><a href="#key-disaster-recovery">4.1 Key elements of a disaster recovery plan</a></li>
		<li><a href="#disaster-recovery-strategies">4.2 Types of disaster recovery strategies</a></li>
	</ul></li>
	<li><a href="#summary">5. Summary</a></li>
</ul></details></section><!-- Figure or header inclusion? --><section><h2 class="text-info" id="emergency-prep">1 Introduction to emergency preparedness</h2>

<p>You should strive to improve your organization's cyber security posture and resilience by proactively preparing for incidents and disruptions to anticipate and minimize operational downtime, financial losses, and reputational damage.</p>

<p>Your cyber emergency preparedness strategy should include 3 comprehensive plans:</p>

<ul><li>incident response plan (IRP)</li>
	<li>business continuity plan (BCP)</li>
	<li>disaster recovery plan (DRP)</li>
</ul><p>This publication focuses on emergency preparedness activities related mainly to the recovery and restoration of tangible and intangible technology assets that are used for business operations and can be adversely affected by a cyber event.</p>

<p>Although this publication focuses on cyber security, the recommendations align with Public Safety Canada's (PSC) <a href="https://www.publicsafety.gc.ca/cnt/mrgnc-mngmnt/index-en.aspx">Emergency Management guidance</a> and <a href="https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2017-mrgnc-mngmnt-frmwrk/index-en.aspx">Emergency Management Framework for Canada</a>. Through national leadership in the development and implementation of policies, plans, and a range of programs, <abbr title="Public Safety Canada">PSC</abbr>'s emergency management guidance helps Canadians protect themselves from various emergencies and disasters. <abbr title="Public Safety Canada">PSC</abbr>'s approach to emergency management is based on work in 4 related areas:</p>

<ul><li>prevention and mitigation</li>
	<li>emergency preparedness</li>
	<li>response to emergency events</li>
	<li>recovery from disasters</li>
</ul><p>The <abbr title="Public Safety Canada">PSC</abbr> framework aims to guide and strengthen the way governments and partners assess risks and work together to prevent, mitigate, prepare for, respond to, and recover from the threats and hazards that pose the greatest risk to Canadians. Building on the framework, <abbr title="Public Safety Canada">PSC</abbr>'s <a href="https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/mrgncy-mngmnt-strtgy/index-en.aspx">Emergency Management Strategy for Canada: Toward a Resilient 2030</a> identifies federal, provincial, and territorial priorities that will strengthen Canada's resilience by 2030. Potential threats include natural disasters, such as forest fires, and human-induced disasters, such as hazardous material spills. We recommend that you develop emergency preparedness strategies for these other types of threats as well.</p>
<!-- Sub section -->

<div>
<h3 id="benefits-emergency-prep">1.1 Benefits of an emergency preparedness plan</h3>

<p>Disruption due to unforeseen events can have devastating impacts on your organization and its cyber security posture. Having a comprehensive cyber security emergency preparedness plan can:</p>

<ul><li>lessen the severity of disruption and damage to business operations and services</li>
	<li>minimize recovery time and allow for rapid restoration of services</li>
	<li>improve security</li>
	<li>minimize the financial impact of the disruption</li>
	<li>prevent reputational damage</li>
	<li>potentially prevent regulatory or legal penalties, when an emergency preparedness plan is mandatory</li>
	<li>offer alternative ways to continue operations</li>
	<li>train and educate employees on emergency procedures</li>
	<li>help identify incidents and deploy rapid restoration of services</li>
</ul></div>
<!-- sub section -->

<div>
<h3 id="comparing-recovery">1.2 Comparing incident response, business continuity, and disaster recovery</h3>

<p>The 3 comprehensive plans involved in your cyber emergency preparedness strategy are your <abbr title="incident response plan">IRP</abbr>, <abbr title="business continuity plan">BCP</abbr>, and <abbr title="disaster recovery plan">DRP</abbr>. This section will compare all 3 plans and highlight the differences between each.</p>

<div><!-- sub sub section -->
<h4>1.2.1 Incident response plan</h4>

<p>An <abbr title="incident response plan">IRP</abbr> includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from a specific incident. The plan will help minimize your organization's downtime and overall business disruptions when faced with an incident. A robust <abbr title="incident response plan">IRP</abbr> covers various types of incidents that could impact your organization and provides step-by-step guidance on how to handle an incident, mitigate the related risks, and recover quickly. Some examples of cyber incidents that can impact your organization's cyber security posture include:</p>

<ul><li><strong>ransomware:</strong> when a type of malware locks you out of your files or systems and a threat actor demands that you pay a ransom to regain access. Payment does not guarantee you will regain access to your information</li>
	<li><strong>data theft:</strong> when threat actors steal information stored on servers and devices</li>
	<li><strong>active exploitation:</strong> when threat actors take advantage of unpatched software, hardware, or other vulnerabilities to gain control of your systems, networks, and devices</li>
</ul></div>

<div>
<h4>1.2.2 Business continuity plan</h4>

<p>A <abbr title="business continuity plan">BCP</abbr> is a specific plan to recover services most critical to an organization's operations as quickly as possible. It is a proactive plan that describes operational procedures to help organizations ensure they can continue business operations despite a disruption. The <abbr title="business continuity plan">BCP</abbr> will identify the main assets, roles, responsibilities, and processes needed to ensure ongoing operations.</p>

<p>Your <abbr title="business continuity plan">BCP</abbr> should be based on your organization's information technology (IT) threat and risk assessment (TRA) and a business impact analysis (BIA). A <abbr title="business impact analysis">BIA</abbr> will identify the potential impact of different scenarios on your business operations. For example, a <abbr title="business impact analysis">BIA</abbr> should address the following questions:</p>

<ul><li>What resources and activities are critical to continuing your business operations?</li>
	<li>How long can you stop operations without causing significant damage to your business?</li>
	<li>What are the financial implications of these interruptions?</li>
</ul><p>A <abbr title="business impact analysis">BIA</abbr> outlines the projected financial costs associated with different disruptions (where applicable) so that you can make informed investments in the prevention and mitigation strategies described in your <abbr title="business continuity plan">BCP</abbr>.</p>
</div>

<div>
<h4>1.2.3 Disaster recovery plan</h4>

<p>A <abbr title="disaster recovery plan">DRP</abbr> is a formal document that defines a set of procedures and processes and the specific roles and responsibilities of key members to return the organization to its normal state after a large event.</p>

<p>Most <abbr title="disaster recovery plans">DRPs</abbr> include a shift in the physical location of either server-side infrastructure (for example, changing data centres) or client-side endpoints (for example, changing offices), depending on which side suffered the disaster (for example, data centre flood or office evacuation). A <abbr title="disaster recovery plan">DRP</abbr> should also specify recovery objectives for all critical assets and steps to reduce the loss or impact to the organization.</p>

<p>A <abbr title="disaster recovery plan">DRP</abbr> encompasses the main principles of an <abbr title="incident response plan">IRP</abbr> and a <abbr title="business continuity plan">BCP</abbr> and can provide guidance on what plan to execute based on the type of disruption or incident.</p>
</div>

<div>
<h4>1.2.4 Main difference between each type of plan</h4>

<p><abbr title="incident response plans">IRPs</abbr>, <abbr title="business continuity plans">BCPs</abbr>, and <abbr title="disaster recovery plans">DRPs</abbr> have much in common since they are all meant to improve your organization's resilience, minimize impact, and keep operations running. However, they do have some key differences.</p>

<p>An <strong><abbr title="incident response plan">IRP</abbr></strong> is event focused and specific to a security incident, such as a cyber attack, affecting an organization. It defines the roles and responsibilities and identifies the scope of action required to mitigate an incident (for example, a data breach, a ransomware attack, or a phishing attack). <abbr title="incident response plans">IRPs</abbr> will assist your incident response team in reducing organizational downtime.</p>

<p>A <strong><abbr title="business continuity plan">BCP</abbr></strong> is a specific plan to quickly resume only the most critical operations, as defined by the <abbr title="business impact analysis">BIA</abbr>, in the event of a disaster. It will typically address which services to prioritize, identify the critical staff required to run those services, and identify an offsite location from which to set up temporary operations.</p>

<p>A <strong><abbr title="disaster recovery plan">DRP</abbr></strong> is a holistic plan to return your organization to full operations after a disaster. It will address various types of disruptions, such as natural hazards, hardware and power outages, and cyber attacks.</p>

<p>Each of these 3 plans share the following elements that are essential to successful identification, management, response, and recovery during an event or incident:</p>

<ul><li>identifying a designated point of contact and designated team members and their alternates (in case of absences), and listing their specific roles and responsibilities</li>
	<li>scheduling periodic reviews to identify potential gaps in the plan and areas that need improvement</li>
	<li>scheduling testing for the plans by performing simulated disruptions to ensure that any gaps are fixed</li>
</ul><p>Implementing these 3 plans will enhance your cyber security posture. Ensuring that you implement additional preventative security measures, such as patching and updating your <abbr title="information technology">IT</abbr> assets, will reduce your organization's vulnerabilities and add to your incident preparedness. These additional security measures can help your organization avoid costly downtime and interruptions to your operations. In addition to developing and updating an <abbr title="incident response plan">IRP</abbr>, <abbr title="business continuity plan">BCP</abbr>, and <abbr title="disaster recovery plan">DRP</abbr>, we encourage you to enhance your cyber security posture in the following ways:</p>

<ul><li>segment your networks to stop traffic from flowing to sensitive or restricted zones</li>
	<li>deploy firewalls to prevent unauthorized outside sources from accessing your system's resources or moving data from one area of your network to another</li>
	<li>install anti-virus and anti-malware software to protect your perimeter</li>
	<li>update and apply patches to operating systems, software, and firmware</li>
</ul></div>
<!-- two divs should close --></div>
</section><!-- top of page --><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>

<p><span class="clearfix"></span></p>

<section><h2 class="text-info" id="incident-response">2 Incident response planning</h2>

<p>Cyber threats can greatly impact your network, systems, and devices. When you have a proper plan, you will be prepared to handle incidents when they happen, mitigate the threats and associated risks, and recover quickly.</p>

<p>This section will describe the preliminary elements that will help you better understand what is required to create an <abbr title="incident response plan">IRP</abbr> that is tailored to your organization. We will identify the main steps that you should consider when developing your cyber security <abbr title="incident response plan">IRP</abbr> and reference reputable guidance documentation that can assist you in developing your plan.</p>
<!-- sub section -->

<div>
<h3 id="incident-response-considerations">2.1 What to consider before creating an incident response plan</h3>

<p>Developing a step-by-step <abbr title="incident response plan">IRP</abbr> can be time consuming and feel overwhelming. Although your plan will be tailored to your organization's size, business operations, and security requirements, here are some preliminary and standard elements that organizations and businesses of all sizes should consider:</p>
<!-- sub sub-section -->

<div>
<h4>2.1.1 Conduct a threat and risk assessment</h4>

<p>A <abbr title="threat and risk assessment">TRA</abbr> is a critical tool for understanding the different threats to your <abbr title="information technology">IT</abbr> systems, determining the level of risk these systems are exposed to, and recommending the appropriate level of protection.</p>

<p>Before you create an <abbr title="incident response plan">IRP</abbr>, your organization should conduct a <abbr title="threat and risk assessment">TRA</abbr>. The first step to a <abbr title="threat and risk assessment">TRA</abbr> is identifying all your critical assets. Once this has been done, rank the assets according to their importance, value, and risk level. This will allow you to create a budget and identify the tools and resources required to protect your valuable assets.</p>

<p>As previously mentioned, there are various types of incidents to consider when developing your <abbr title="incident response plan">IRP</abbr>. Your plan should map out a variety of incident response scenarios to address the different types of threats. Conducting a <abbr title="threat and risk assessment">TRA</abbr> will help you identify the risks and potential threats to your organizational assets, as well as the likelihood and impact of a compromise.</p>
</div>
<!-- closing sub sub-section -->

<div>
<h4>2.1.2 Create a response team</h4>

<p>Identify who has the qualifications to be on your response team and ensure that they understand their roles. Your response team should include employees with various qualifications and have cross-functional support from other business lines. The main goal of the response team is to coordinate resources to minimize the impact of the incident and resume business operations as soon as possible. The response team is responsible for assessing, documenting, and responding to incidents. They are also responsible for restoring your systems, recovering information, and reducing the risk of the incident reoccurring.</p>
</div>
<!-- close sub sub-section -->

<div>
<h4>2.1.3 Develop policies and procedures</h4>

<p>Your incident response activities need to align with your organization's policy and compliance requirements. Your organization should develop an incident response policy that establishes the authorities, roles, and responsibilities for your incident response processes and procedures. This policy should be approved by your organization's senior management and executives. Over time, your policies will need to be reviewed and adjusted based on your organization's business requirements.</p>
</div>
<!-- close sub sub-section -->

<div>
<h4>2.1.4 Create your communications plan</h4>

<p>Your communications plan should detail how, when, and with whom your team communicates. It should also identify who is responsible for these communications. The communications plan should include a central point of contact for employees to report suspected or known incidents, and alternate methods of communication in case the primary method is impacted by the incident. Many organizations prefer to use a designated individual to communicate with the press and public during incident recovery.</p>

<p>Your notification procedures are critical to the success of your incident response. Identify the key internal and external stakeholders who need to be notified during an incident. You may need to alert third parties, such as clients, suppliers, vendors, and managed service providers. Depending on the incident, you may also need to contact law enforcement or your regulating body if applicable, or consult with a lawyer for advice.</p>

<p>You may also be required to report the incident to the Office of the Privacy Commissioner of Canada (OPC) or the appropriate privacy legislation to which your organization is subject. For example, if your organization is subject to the <abbr title="Office of the Privacy Commissioner of Canada">OPC</abbr>'s <em><a href="https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/">Personal Information Protection and Electronic Documents Act (PIPEDA)</a></em>, you are required to:</p>

<ul><li>report to the <abbr title="Office of the Privacy Commissioner of Canada">OPC</abbr> breaches of security safeguards involving personal information that pose a real risk of significant harm to individuals</li>
	<li>notify affected individuals about those breaches</li>
	<li>keep records of all breaches</li>
</ul><p>The <abbr title="Office of the Privacy Commissioner of Canada">OPC</abbr>'s <a href="/en/privacy-topics/business-privacy/breaches-and-safeguards/privacy-breaches-at-your-business/gd_pb_201810/">What you need to know about mandatory reporting of breaches of security safeguards</a> provides an overview of what you need to know about these obligations.</p>
</div>
<!-- sub sub-section -->

<div>
<h4>2.1.5 Educate your employees</h4>

<p>Update your employees on current incident response planning and execution. Tailor your training programs to your organization's business needs and requirements, as well as to your employees' roles and responsibilities. Run a tabletop exercise with the key employees identified in the plan. Your employees' cooperation can reduce the length of response time and facilitate the implementation of your <abbr title="incident response plan">IRP</abbr>. Employees should also be trained on how to identify and report cyber attacks such as phishing emails, spear phishing attacks, and social engineering efforts.</p>
</div>
</div>
<!-- subsection close -->

<div>
<h3 id="additional-consider-ot">2.2 Additional considerations for operational technology</h3>

<p>Organizations that manage operational technology (OT) need to address and mitigate the risks associated with incidents that can lead to unplanned outages and impacts to both their <abbr title="information technology">IT</abbr> systems and their <abbr title="operational technology">OT</abbr> systems.</p>

<p><abbr title="operational technology">OT</abbr> and industrial control systems (ICS) can add complexity to the environment and have unique constraints that need to be addressed. For example, many <abbr title="industrial control systems">ICS</abbr> are deployed without robust security controls and must run continuously, even though they use unsecure protocols and architectures. Maintaining older equipment can be challenging and vendors are often unable to provide replacements for vulnerable hardware or software, which can make it difficult to prevent and respond to <abbr title="industrial control systems">ICS</abbr> incidents.</p>

<p>The following 3 Cyber Centre publications provide security advice to organizations that manage <abbr title="operational technology">OT</abbr> systems, <abbr title="industrial control systems">ICS</abbr>, and critical infrastructure:</p>

<ul><li><a href="/en/guidance/protect-your-operational-technology-itsap00051">Protect your operational technology (ITSAP.00.051)</a></li>
	<li><a href="/en/guidance/security-considerations-industrial-control-systems-itsap00050">Security considerations for industrial control systems (ITSAP.00.050)</a></li>
	<li><a href="/en/guidance/security-considerations-critical-infrastructure-itsap10100">Security considerations for critical infrastructure (ITSAP.10.100)</a></li>
</ul><p>To learn more, read the additional guidance in PSC's <a href="https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/dvlpng-ndnt-rspns-pln/index-en.aspx#a1">Developing an Operational Technology and Information Technology Incident Response Plan</a>. This publication provides organizations that operate a component of <abbr title="operational technology">OT</abbr> in their environment with a framework that can be used to develop a joint <abbr title="information technology">IT</abbr>/<abbr title="operational technology">OT</abbr> cyber incident response plan (CIRP). The <abbr title="cyber incident response plan">CIRP</abbr> is intended to be appropriate for organization-specific business needs. The document provides a baseline approach to developing a <abbr title="cyber incident response plan">CIRP</abbr>, with specific factors to consider based on your organization's size, function, location, and sector.</p>

<p>When conducting a <abbr title="threat and risk assessment">TRA</abbr> on <abbr title="operational technology">OT</abbr> systems, it is important to consider the threats to these systems, the impact of systems vulnerabilities, and the types of risks that can cause disruptions to the operating environment.</p>

<p>Here are some examples of <abbr title="operational technology">OT</abbr> vulnerabilities to consider:</p>

<ul><li><strong>obsolete systems:</strong> systems and components that are no longer supported with updates by the manufacturer</li>
	<li><strong>unpatched software and firmware:</strong> leaves systems and devices vulnerable to known threats</li>
	<li><strong>peripherals:</strong> external connected devices that can be exploited to compromise systems and networks</li>
</ul><p><abbr title="operational technology">OT</abbr> design typically prioritizes availability and process repeatability and reliability over data security. Compromised <abbr title="operational technology">OT</abbr> systems and devices can put critical processes at risk of failure. <abbr title="operational technology">OT</abbr> compromises can lead to the following impacts on your organization:</p>

<ul><li>major accidents and disasters, like injury or loss of life</li>
	<li>malfunctioning equipment and disrupted processes and deliverables</li>
	<li>compromised intellectual property and sensitive information</li>
	<li>lost revenue from disrupted processes, costly repairs, or paid ransom</li>
	<li>damaged organizational credibility</li>
	<li>compromised security measures, such as emergency services</li>
</ul><p>The failure of an <abbr title="operational technology">OT</abbr> device could impact an entire industrial process and the safety of operators and the wider public. Destruction and loss of services could cause serious damage to high-value systems, processes, and infrastructure.</p>

<p>When developing an <abbr title="incident response plan">IRP</abbr>, it is important for organizations that are managing <abbr title="operational technology">OT</abbr> systems to understand the unique implications affecting them. This will allow for better preparation and defence against future <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> incidents and disruptions. Choose a response team that has the capabilities and resources required to address and mitigate the risks associated with <abbr title="operational technology">OT</abbr> incidents.</p>
</div>

<div>
<h3 id="creating-incident-response">2.3 Guidance for creating an incident response plan</h3>

<p>This section references trusted resources to help you develop your <abbr title="incident response plan">IRP</abbr>. For an introduction on incident response planning, preliminary requirements, and to understand why it is important for your organization, read the Cyber Centre's <a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan (ITSAP.40.003)</a>.</p>

<p>The Cybersecurity and Infrastructure Security Agency's <a href="https://www.cisa.gov/sites/default/files/2024-08/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf">Cybersecurity Incident &amp; Vulnerability Response Playbooks (PDF)</a> present one playbook for incident response and one for vulnerability response. The playbooks provide a standard set of operating procedures for responding to and recovering from incidents and vulnerabilities affecting systems, data, and networks.</p>

<p>For additional guidelines on incident management, read <a href="https://www.iso.org/standard/67851.html">ISO 22320:2018 Security and resilience — Emergency management — Guidelines for incident management</a>. This document is applicable to any organization and provides guidance on how to handle incidents of any type and scale.</p>

<p>The 2 most-used incident response frameworks were created by the <abbr title="National Institute of Standards and Technology">NIST</abbr> and SysAdmin, Audit, Network, and Security (SANS) Institute:</p>

<ul><li>The <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf"><abbr title="National Institute of Standards and Technology">NIST</abbr> SP 800-61: Computer Security Incident Handling Guide (PDF)</a> is a 4-step process for incident response and it is defined as a cyclical process where ongoing improvements are made to the plan based on lessons learned throughout the incident lifecycle. The <abbr title="National Institute of Standards and Technology">NIST</abbr> incident response steps are:

	<ul><li>Preparation</li>
		<li>Detection and analysis</li>
		<li>Containment, eradication, and recovery</li>
		<li>Post-incident activity</li>
	</ul></li>
	<li>The <a href="https://www.sans.org/white-papers/33901"><abbr title="SysAdmin, Audit, Network, and Security">SANS</abbr> Institute's Incident Handler's Handbook</a> provides a structured 6-step process for incident response. It outlines the foundation required for organizations to build upon when developing their own incident response policies, standards, and roles and responsibilities for their response team. The 6 steps for incident response planning described in the handbook are:
	<ul><li>Preparation</li>
		<li>Identification</li>
		<li>Containment</li>
		<li>Eradication</li>
		<li>Recovery</li>
		<li>Lessons learned</li>
	</ul></li>
</ul><p>The main difference between these 2 frameworks is that <abbr title="National Institute of Standards and Technology">NIST</abbr> combines containment, eradication, and recovery into one step, whereas the <abbr title="SysAdmin, Audit, Network, and Security">SANS</abbr> Institute framework separates them into individual steps. The reason for this is that <abbr title="National Institute of Standards and Technology">NIST</abbr> believes these 3 components may sometimes overlap and need to be addressed in conjunction with one another.</p>
</div>

<div>
<h3 id="steps-incident-response">2.4 Main steps in an incident response plan</h3>

<p>Having an <abbr title="incident response plan">IRP</abbr> helps your organization handle incidents, mitigate threats and associated risks, and recover quickly. In this section, we will outline the main steps of an <abbr title="incident response plan">IRP</abbr> and specific actions your organization will take to develop your <abbr title="incident response plan">IRP</abbr>.</p>

<div>
<h4>2.4.1 Preparation</h4>

<p>The preparation phase should begin before the incident occurs. This is when you will need to establish the right tools and resources to implement your <abbr title="incident response plan">IRP</abbr>. This phase requires periodic reviewing and updating to address new emerging threats. In this phase, you should:</p>

<ul><li>Perform a <abbr title="threat and risk assessment">TRA</abbr> to identify your most valuable assets that are critical to your business operations, including sensitive or proprietary data

	<ul><li>Define the type of security incidents that your organization is most likely to face and create detailed response steps for these incidents</li>
		<li>Implement an <abbr title="information technology">IT</abbr> asset management plan and associated policies to inventory and track all your organization's <abbr title="information technology">IT</abbr> assets and services</li>
		<li>Include hardware, software, and data, indicating the level of importance, model and serial number, location, cost to replace, manufacturer, and whether it is owned or requires a subscription renewal, such as when using cloud-based software or software as a service</li>
	</ul></li>
	<li>Develop and document your security policies, standards, and procedures supporting incident response</li>
	<li>Develop and implement a backup plan
	<ul><li>Determine where you will do full, differential, or incremental backups</li>
		<li>Ensure your backups are stored offline</li>
	</ul></li>
	<li>Create your response team and assign roles and responsibilities to each member
	<ul><li>Establish a clear chain of command from the start</li>
		<li>Ensure that your employees are properly trained on how to execute their roles and responsibilities</li>
	</ul></li>
	<li>Define your communications plan to ensure that the proper members respond to an incident
	<ul><li>Include criteria for escalation</li>
		<li>Identify how key stakeholders and management will be informed throughout the lifecycle of the incident</li>
	</ul></li>
	<li>Create and run mock incident drills to evaluate your <abbr title="incident response plan">IRP</abbr>
	<ul><li>Refine and update protocols and procedures</li>
		<li>Ensure that the response team understands their roles and responsibilities</li>
	</ul></li>
</ul></div>
<!-- sub subsection close -->

<div>
<h4>2.4.2 Detection and analysis</h4>

<p>This is the phase where you will determine if your organization has been breached or if any of your systems have been compromised. You will need to analyze the incident and identify its type, its origin, and the extent of damaged caused. This is usually the most challenging phase of the incident response process, but it cannot be overlooked. This step is a prerequisite to containing, analyzing, and eradicating the threat.</p>

<p>Incident detection can be done using automated security tools, or by receiving a notification and information from people within your organization or from external sources, such as vendors and service providers. You should create a classification system that will help you triage your response to the threat based on urgency. This will make it easier to isolate your most vulnerable systems and those that are most affected by the threat, ultimately minimizing the damage to your organization. Your organization should also verify the incident to ensure there is a true positive.</p>
</div>

<div>
<h4>2.4.3 Containment</h4>

<p>The containment step is critical. The goal is to minimize the immediate impact of the incident and to prevent it from spreading and causing further damage to other systems. This is done by isolating or removing the threat; for example, shutting down a system or replacing it completely, disconnecting it from the network, or disabling certain functions. Ensure you have a redundant system backup so that your data is safeguarded from permanent deletion. Your backup will also help you restore your business operations in a timely manner.</p>

<p>Containment strategies and procedures will depend on the type of incident, the degree of damage that the incident can cause, and your operational requirements. Incident containment strategies are easier to implement if they are preestablished in the preparation phase, where your acceptable risk level would have already been defined.</p>

<p>If a containment plan is delayed, the threat actor could access and compromise other systems, which could lead to further damage to your organization. The containment step should cover short-term and long-term strategies, and system backups.</p>

<p>Here are some questions that can help you decide which containment strategy to implement:</p>

<ul><li>What damage does this incident pose to your organization?</li>
	<li>How important is it to preserve the evidence?</li>
	<li>How much time and resources are required to implement the strategy?</li>
	<li>How long can you afford to shut down your systems and stop business operations?</li>
	<li>How effective is your strategy? Will it offer full or partial containment?</li>
</ul></div>

<div>
<h4>2.4.4 Eradication</h4>

<p>Once the incident has been contained, you need to conduct a root cause analysis to identify and remove all elements of the incident from the affected systems to prevent future compromises. The eradication phase will improve your defence strategies based on the lessons learned. In this phase, the following activities should be completed:</p>

<ul><li>identify all affected systems, hosts, and services</li>
	<li>remove all malicious content from affected systems</li>
	<li>scan and wipe your systems and infected devices to prevent risk of reinfection</li>
	<li>identify and address all residual attack vectors to ensure other systems are not compromised</li>
	<li>communicate with all stakeholders to ensure they manage the incident appropriately</li>
	<li>harden, patch, and upgrade all affected systems</li>
	<li>upgrade or replace legacy systems</li>
</ul></div>

<div>
<h4>2.4.5 Recovery</h4>

<p>In the recovery phase, you will restore the affected systems and reintegrate them into your operating environment. To avoid reinfection after a cyber incident, take precautionary measures such as ensuring all malware is removed before restoring your backups. You will need to test, verify, monitor, and validate the affected systems to ensure they are running effectively. Your organization should revise and update policies, procedures, and training initiatives based on the lessons learned.</p>

<p>At this phase, you will need to address the following questions:</p>

<ul><li>When can systems be reintegrated into the operating environment?</li>
	<li>How long will the affected systems be monitored for abnormal behaviour?</li>
	<li>How will you test your compromised systems to ensure that they are clean?</li>
	<li>What tools will you use to avoid similar attacks from reoccurring?</li>
</ul></div>

<div>
<h4>2.4.6 Post-incident activities and lessons learned</h4>

<p>The goal of this phase is to analyze and document everything you know about the incident. It is important to create follow-up reports that will provide a review of what happened throughout the entire incident handling process. The report will serve as a tool to strengthen your organization's resilience by identifying ways to improve response efforts, security measures, and components of the incident handling process.</p>

<p>To help collect all pertinent information needed to generate the report, a meeting with all incident response members should be held shortly incident recovery to discuss important points, such as:</p>

<ul><li>When and why did the incident occur? What triggered it?</li>
	<li>How did the response team perform? Did they know their roles and responsibilities?</li>
	<li>Does the incident team need to modify its action plan for future incidents?</li>
	<li>Were the documented procedures followed and were they successful in handling the incident?</li>
	<li>Did anything happen that may have delayed or inhibited the recovery process?</li>
	<li>What information or action plan would have been valuable sooner?</li>
	<li>How can you improve communication and information sharing with third parties?</li>
	<li>Can employee training be improved?</li>
</ul></div>
</div>
</section><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>

<p><span class="clearfix"></span></p>

<section><h2 class="text-info" id="buisness-continuity-planning">3 Business continuity planning</h2>

<p>A <abbr title="business continuity plan">BCP</abbr> is often considered a subset of the larger <abbr title="disaster recovery plan">DRP</abbr>. It is a formal document containing detailed guidelines on what your organization will need to do to quickly resume critical business operations following an unplanned disaster. Only critical services are included in the <abbr title="business continuity plan">BCP</abbr>. Non-critical functions can be addressed once the incident is fully resolved.</p>

<p>The document <a href="https://www.iso.org/standard/75106.html">ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements (ISO 22301)</a> provides a framework to help organizations plan, implement, and maintain a business continuity management plan. ISO 22301 will ensure that organizations of all sizes are able to respond, recover, and continue operations after various disruptions.</p>

<p>The publication <a href="https://csrc.nist.gov/CSRC/media/Events/HIPAA-2010-Safeguarding-Health-Information-Buil/documents/2-2b-contingency-planning-swanson-nist.pdf"><abbr title="National Institute of Standards and Technology">NIST</abbr> SP 800-34 Revision 1 – Contingency Planning Guide for Federal Information Systems (PDF)</a> offers guidance to United States federal agencies to evaluate information systems and operations to determine contingency planning requirements and priorities. The publication covers <abbr title="incident response plans">IRPs</abbr>, <abbr title="business continuity plans">BCPs</abbr>, and <abbr title="disaster recovery plans">DRPs</abbr> and can be used as a reference to help organizations develop their response and recovery strategies and procedures.</p>
<!-- subsection -->

<div>
<h3 id="disruptions-organisation">3.1 Main disruptions that can affect your organization</h3>

<p>Although your <abbr title="business continuity plan">BCP</abbr> should address all types of incidents, the following threats are the most common business disruptors to consider:</p>

<ul><li>natural hazards, such as hurricanes, tornadoes, earthquakes, floods, wildfires, and severe storms</li>
	<li>building fires</li>
	<li>cyber threats, such as ransomware attacks, data thefts, and distributed denial of service (DDoS) attacks</li>
	<li>server or utility outages, such as power outages, communication line outages, or water shutoffs</li>
	<li>equipment failure that can impact operations such as HVAC systems, office equipment, or manufacturing equipment</li>
	<li>acts of terrorism</li>
	<li>global pandemics such as disease outbreaks or public health emergencies such as virus outbreaks</li>
	<li>decreased supply due to manufacturer and vendor shutdowns or disruptions to distribution across the supply chain</li>
</ul></div>

<div>
<h3 id="buisness-continuity-development">3.2 Steps to developing your business continuity plan</h3>

<p>In this section, we will discuss the specific areas your organization will need to address when developing a <abbr title="business continuity plan">BCP</abbr>, as well as how you can ensure your <abbr title="business continuity plan">BCP</abbr> will be effective when enacted. A <abbr title="business continuity plan">BCP</abbr> allows organizations to identify their risk from various threats and the impact they would pose to business operations. A <abbr title="business continuity plan">BCP</abbr> is used to ensure organizational resilience and compliance to regulations, policies, and standards. The goal of a <abbr title="business continuity plan">BCP</abbr> is to identify all the resources and procedures required to help organizations continue critical operations and services in the event of a disaster or other disruption.</p>

<p>Business continuity planning is a lifecycle approach and requires ongoing reviewing, testing, and updating. The image below, Figure 1: Business continuity planning lifecycle, depicts the 5 key steps to developing and maintaining a <abbr title="business continuity plan">BCP</abbr>.</p>
</div>

<div>
<h3>Figure 1: Business continuity planning lifecycle</h3>

<div class="panel-body">
<figure><figcaption class="text-center">Figure 1: Business continuity planning lifecycle</figcaption><img alt="Figure 1 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/itsm.10.014-business-continuity-planning-lifecycle-850x607.jpg" /></figure><details><summary>Long description - Figure 1: Business continuity planning lifecycle</summary><p>Business continuity planning lifecycle describes the 5 steps in the business continuity planning lifecycle</p>

<ul><li>Initiate: Identify your organization’s goals and objectives</li>
	<li>Analyze: Conduct a <abbr title="threat and risk assessment">TRA</abbr> and a <abbr title="business impact analysis">BIA</abbr></li>
	<li>Develop and implement: Define the strategy, develop the plan, and implement it</li>
	<li>Communicate and integrate: Communicate your BCP to employees, stakeholders, and partners and integrate it into your organization’s policies</li>
	<li>Test and validate: Test your plan regularly to ensure that it remains effective and current</li>
</ul></details></div>
<!-- insert image section, will review image as well --><!-- long description write up
<p> Business continuity planning lifecycle describes the 5 steps in the business continuity planning lifecycle </p>
<ul>
<li>Initiate: Identify your organization's goals and objectives</li>
<li>Analyze: Conduct a TRA and a BIA</li>
<li>Develop and implement: Define the strategy, develop the plan, and implement it</li>
<li>Communicate and integrate: Communicate your <abbr title="business continuity plan">BCP</abbr> to employees, stakeholders, and partners and integrate it into your organization's policies</li>
<li>Test and validate: Test your plan regularly to ensure that it remains effective and current</li>
</ul>
-->

<p>The following section describes the 5 stages of the business continuity planning lifecycle.</p>
<!-- sub subsection start -->

<div>
<h4>3.2.1 Initiate: Identify the plan's objectives, goals and response</h4>

<p>The main objective of a <abbr title="business continuity plan">BCP</abbr> is to ensure that there is minimal disruption to critical business functions in the event of a disaster or incident. However, depending on your organization's unique requirements and resources, you may have different objectives and goals. Once you have identified your objectives and goals, make sure that they are clearly communicated and accepted by your organization's leaders. Your goals will influence your <abbr title="threat and risk assessment">TRA</abbr>, <abbr title="business impact analysis">BIA</abbr>, <abbr title="business continuity plan">BCP</abbr>, and recovery strategies.</p>

<p>You will need to identify the key people and processes that will be required to ensure your goals are met. You will also need a communications plan to share these items. Create a management team with members who are knowledgeable about the different operational areas of your organization to evaluate what potential threats can lead to various levels of risks to your organization. The makeup of your team depends on your business continuity objectives and the size of your organization. There should be a designated leader to ensure that all the actions required to develop, implement, modify, and update the plan are being executed.</p>
</div>
<!-- sub subsection close -->

<div>
<h4>3.2.2 Analyze: Perform the required assessments</h4>

<p>After you have identified your goals and objectives, you will need to conduct a detailed <abbr title="threat and risk assessment">TRA</abbr>. It is important that your organization understands where your risks lie and the different threats that could cause interruptions to your business operations. Having this knowledge can help you determine how to reduce, mitigate, and eliminate these risks.</p>

<p>Once your organization has identified possible threats, you should conduct a <abbr title="business impact analysis">BIA</abbr> to identify critical and non-critical business operations and systems and how different threats can impact various business areas. A <abbr title="business impact analysis">BIA</abbr> will identify specific threats that can impact financial and operational performance, employees, supply chains, reputation, and resources. These threats should be analyzed to determine the probability of their occurrence and their level of impact. Mitigation strategies that can reduce the likelihood of occurrence and the severity of impact should also be identified.</p>

<p>Collaboration is key when conducting a <abbr title="business impact analysis">BIA</abbr>. Managers, key stakeholders, partners, and employees should all be involved in the discussions. This will give you a greater understanding of how a disaster may impact other business functions within the organization. Involving stakeholders and partners will also help them understand the risks to their business operations and identify mitigation strategies.</p>

<p>Document all your findings in the <abbr title="threat and risk assessment">TRA</abbr> and <abbr title="business impact analysis">BIA</abbr> so that you can anticipate the cost and resources that will be needed to recover from a disaster or incident.</p>

<p>To help you with your <abbr title="threat and risk assessment">TRA</abbr> and <abbr title="business impact analysis">BIA</abbr>, it is recommended that your organization perform a security categorization of your business activities (for example, business processes and related information assets). This helps establish the relative importance of your business activities. At the information system level, security categories of business activities serve as input for establishing security assurance requirements, selecting and tailoring security controls, and conducting <abbr title="threat and risk assessment">TRA</abbr> activities. Security categorization is a process to determine the expected injuries from threat compromise and the level of these expected injuries with respect to the security objectives of confidentiality, integrity, and availability. The result of this process is a security category for a business activity that expresses the highest levels of expected injury for all 3 <abbr title="information technology">IT</abbr> security objectives. For information and guidance on security categorization, read the Cyber Centre's <a href="/en/guidance/it-security-risk-management-lifecycle-approach-itsg-33"><abbr title="information technology">IT</abbr> security risk management: A lifecycle approach (ITSG-33)</a>.</p>
</div>

<div>
<h4>3.2.3 Develop and implement: Define the strategy and create the plan</h4>

<p>Once you have identified the types of risks, threats, and vulnerabilities applicable to your organization, you can begin to develop an effective <abbr title="business continuity plan">BCP</abbr>. Your plan should focus on mitigation strategies for the identified risks that will allow for the resumption of critical business operations. A comprehensive <abbr title="business continuity plan">BCP</abbr> will take each risk identified in the <abbr title="business impact analysis">BIA</abbr> and develop an appropriate response strategy to either minimize its impact on your organization's stakeholders, operations, and assets or to mitigate it. Here are some key best practices to consider when developing your <abbr title="business continuity plan">BCP</abbr>:</p>

<ul><li>identify the members of the response team and provide detailed description of their roles and responsibilities so that they can react swiftly and efficiently</li>
	<li>develop communication methods and recovery procedures</li>
	<li>identify an alternative work site and an employee relocation plan</li>
	<li>consolidate a list of alternate resources and suppliers</li>
	<li>establish an <abbr title="information technology">IT</abbr> recovery plan with assistance from the Cyber Centre publication <a href="/en/guidance/developing-your-it-recovery-plan-itsap40004">Developing your <abbr title="information technology">IT</abbr> recovery plan (ITSAP.40.004)</a></li>
	<li>establish policies to be implemented during a disaster, emergency, or incident</li>
	<li>determine the budget that will need to be allocated to the various activities in your plan</li>
	<li>identify timeframes in which services and business operations need to be available</li>
	<li>identify the resources that will be required to ensure prioritization and a quick and relevant response</li>
	<li>create reports to share with stakeholders</li>
	<li>provide staff with awareness training and educate them on the various risks and emergency preparedness and response strategies</li>
	<li>document the plan, validate it, share it with management and organization leaders, and gain their approval</li>
	<li>store the documented <abbr title="business continuity plan">BCP</abbr> in a secure location that is accessible if the <abbr title="business continuity plan">BCP</abbr> is enacted</li>
</ul></div>

<div>
<h4>3.2.4 Communicate and integrate: Develop policies and communication protocols</h4>

<p>Once your <abbr title="business continuity plan">BCP</abbr> has been developed, it should be communicated to your employees and stakeholders and integrated into your organization's policies. It should be easily accessible to allow the response team to best coordinate their efforts. You should also develop a detailed communications and external public relations plan to provide guidance on how to communicate with staff, investors, and the media to avoid the spread of misinformation.</p>

<p>Your <abbr title="business continuity plan">BCP</abbr> should include effective communication strategies for both internal members and external stakeholders. Clear communication within your organization during a crisis will reassure your employees that you are taking the required steps to respond and recover. Communication with external stakeholders, suppliers, and customers is also vital to minimize reputational damage and to maintain your organization's integrity.</p>

<p>The communication process should include protocols and procedures to ensure that the appropriate protective actions are taken and the right people are being alerted. Pre-drafted messages can facilitate and speed up communication in the event of a crisis.</p>
</div>

<div>
<h4>3.2.5 Test and validate: Periodic testing to validate your plan</h4>

<p>The risks to your organization are not static and are likely to change over time. Your business operations and priorities may also change. As a result, your <abbr title="business continuity plan">BCP</abbr> must be re-evaluated and tested regularly so that it remains effective and updated. A robust <abbr title="business continuity plan">BCP</abbr> requires continuous improvement with ongoing analysis, testing, validation, and implementation. You should conduct simulations and live exercises to assess your response team's level of preparedness and to identify weak points. You can choose from various types of exercises to test your plan, such as seminars, tabletop exercises, and live exercises. Use the lessons learned from your exercises and tests to update your <abbr title="business continuity plan">BCP</abbr>. A checklist to ensure that each part of your plan is working properly is also beneficial.</p>

<p>Your <abbr title="business continuity plan">BCP</abbr> testing practices should:</p>

<ul><li>evaluate awareness and training information and protocols. Ensure that protocols are current and that regular training sessions are offered to employees and response team members</li>
	<li>test, evaluate, and validate the technical solutions and steps identified in the <abbr title="business continuity plan">BCP</abbr>. Ensure that solutions and steps are still effective and update them if required</li>
	<li>test, evaluate, and validate the recovery procedures established in the <abbr title="business continuity plan">BCP</abbr>. Ensure that the procedures are aligned with your organization's current operational and business requirement and threat landscape</li>
</ul></div>
</div>
</section><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>

<p><span class="clearfix"></span></p>

<section><h2 class="text-info" id="disaster-recovery">4 Disaster recovery plan</h2>

<p>A <abbr title="disaster recovery plan">DRP</abbr> looks at every aspect of your organization that might be affected, such as assets, infrastructure, human resources, and business partners. Your <abbr title="disaster recovery plan">DRP</abbr> should identify your critical and non-critical business operations. It should include recovery requirements, procedures, and detailed instructions for each critical function. This will ensure the protection of assets and business operations to meet regulatory requirements and minimize downtime.</p>

<p>The <abbr title="disaster recovery plan">DRP</abbr> should define strategies to minimize the impact of a disaster and to recover <abbr title="information technology">IT</abbr> assets and services as quickly as possible to ensure continuation of critical operations.</p>

<p>A disaster, regardless of its nature, can have devastating impacts on your organization. The longer the recovery time, the greater the potential damage. Therefore, it is important to have a good <abbr title="disaster recovery plan">DRP</abbr> that will ensure a quick recovery, regardless of the type of disaster.</p>

<p>A <abbr title="disaster recovery plan">DRP</abbr> should be organized by type of disaster and location and should provide step-by-step instructions that can be easily implemented.</p>

<p>The Cyber Centre's publication Developing your <abbr title="information technology">IT</abbr> recovery plan (ITSAP.40.004) identifies important elements and steps that can assist with the development of your <abbr title="disaster recovery plan">DRP</abbr>. It also describes how a recovery plan can improve your organization's overall resilience and cyber security posture. Consulting other resources to develop your <abbr title="disaster recovery plan">DRP</abbr>, such as IBM's <a href="https://www.ibm.com/docs/en/i/7.3.0?topic=system-example-disaster-recovery-plan">Disaster recovery plan template</a> or <a href="https://www.iso.org/standard/27031">SO/IEC 27031:2025 Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity</a> can also be beneficial.</p>

<p>In the next section, we will describe the key elements of a <abbr title="disaster recovery plan">DRP</abbr>. As previously mentioned, there are some similarities between an <abbr title="incident response plan">IRP</abbr> and a <abbr title="disaster recovery plan">DRP</abbr>. Although there will be some repetition in the next section, it is important to reiterate these key elements as they shape the <abbr title="disaster recovery plan">DRP</abbr>.</p>

<div>
<h3 id="key-disaster-recovery">4.1 Key elements of a disaster recovery plan</h3>

<p>In this section, we will discuss specific areas that your organization will need to address when developing a <abbr title="disaster recovery plan">DRP</abbr>. These steps will return your organization to full operations after a disaster.</p>

<div>
<h4>4.1.1 Create a disaster recovery team</h4>

<p>The goal of the disaster recovery team is to assess, document, and respond to incidents; restore systems; recover information; and reduce the risk of the incident reoccurring. The plan should clearly identify the name and contact information of the individuals who are responsible for the different areas of the disaster recovery process. This will help streamline communications once recovery efforts are underway.</p>

<p>The team members should be well trained on disaster recovery and should understand their respective roles and responsibilities. Members should have various qualifications and cross-functional support from other business lines. Since incidents are unpredictable and require immediate response, designate backup responders to act during any absences when an incident occurs. Critical responsibilities include:</p>

<ul><li>identifying a plan owner who will lead the recovery process with the support of organization leaders and managers</li>
	<li>building a communications plan that addresses key considerations for communicating essential information to key stakeholders and the media</li>
	<li>implementing systems backup and maintenance to ensure business continuity</li>
</ul></div>

<div>
<h4>4.1.2 Maintain an inventory of all your <abbr title="information technology">IT</abbr> assets and identify the most critical</h4>

<p>To have an effective <abbr title="disaster recovery plan">DRP</abbr>, you will need to maintain an accurate and up-to-date inventory of your <abbr title="information technology">IT</abbr> assets. Your inventory should include a list of hardware, software, and information assets, as well as their location. Your assets should be categorized based on their criticality to your business operations. Your most critical assets include sensitive and proprietary data, and assets that are mandatory for your business operations. The criticality should be compared to the risk probability and resiliency of the asset when faced with disasters. This will allow you to better anticipate and manage risks.</p>

<p>Your organization should rank assets from most critical to least critical to define the scope of your <abbr title="disaster recovery plan">DRP</abbr>. Ensure that your <abbr title="disaster recovery plan">DRP</abbr> addresses your critical high-risk assets first, including your sensitive data. Sensitive data may be subject to compliance requirements, such as the <a href="https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-privacy-act/"><em>Privacy Act</em></a>, which governs the Government of Canada, or <abbr title="Personal Information Protection and Electronic Documents Act">PIPEDA</abbr>, which covers how private sector organizations handle personal information. Your <abbr title="disaster recovery plan">DRP</abbr> should identify how your sensitive data will be protected and securely backed up.</p>
</div>

<div>
<h4>4.1.3 Understand the risk tolerance of your organization</h4>

<p>To support your disaster management and recovery efforts, you should identify and document the potential risks to your organization and your tolerance to these risks. When you understand your risk tolerance, your organization will be better equipped to develop recovery strategies for various disasters. Your <abbr title="disaster recovery plan">DRP</abbr> should include various events, such as natural hazards, power outages, cyber attacks, ransomware, insider threats, and failure of critical equipment.</p>

<p>Here are a few key actions to help identify your risks tolerance:</p>

<ul><li>list your critical business operations</li>
	<li>understand your business operations that handle sensitive data</li>
	<li>identify the assets, including data, that are valuable to your organization</li>
	<li>know your geographical location and infrastructure; this will help you determine whether you need cloud backup, one or multiple storage sites, and backup servers</li>
</ul></div>

<div>
<h4>4.1.4 Identify critical operations</h4>

<p>Your <abbr title="disaster recovery plan">DRP</abbr> should identify what business operations are considered critical to your organization. To help identify your critical operations, consider the following questions:</p>

<ul><li>What components of your business are so important that your organization will not survive if immediate access is removed?</li>
	<li>What sensitive information or data do you store that, if lost or compromised, you would likely face legal repercussions and reputational damage?</li>
	<li>What patents, intellectual property, or proprietary business information do you need to safeguard to maintain your reputation in the industry and to protect your business?</li>
</ul><p>By understanding what is most valuable to your organization, you will be better equipped to implement strategies in your <abbr title="disaster recovery plan">DRP</abbr> that will ensure your organization remains resilient in the event of a disaster.</p>
</div>

<div>
<h4>4.1.5 Develop disaster recovery procedures</h4>

<p>A major component of a <abbr title="disaster recovery plan">DRP</abbr> is documented in step-by-step recovery procedures. These procedures will describe how your organization will respond to various disasters. When faced with unexpected catastrophic events, your organization will have very little time to react. Having documented disaster recovery procedures will ensure that your response team knows exactly how to respond to minimize the damage and avoid prolonged downtime. These procedures should cover, at a minimum, the following elements:</p>

<ul><li><strong>emergency response procedures</strong> will include the steps required to effectively respond to emergency situations, to help minimize damages to your organization, and to protect your employees</li>
	<li><strong>business operations backup procedures</strong> will ensure minimal disruption to your organization's critical business operations</li>
	<li><strong>procedures identifying disaster recovery actions</strong> will help your organization restore your operating environment, including systems, networks, devices, and important information and data following a disaster</li>
</ul></div>

<div>
<h4>4.1.6 Identifying recovery time objective and recovery point objective</h4>

<p>Recovery time objective (RTO) and recovery point objective (RPO) are the metrics used to determine your downtime and data loss tolerance, respectively.</p>

<p><abbr title="recovery time objective">RTO</abbr> is the pre-established maximum amount of downtime your organization can tolerate without causing damage. This can be measured in minutes, hours, days, or weeks. <abbr title="recovery time objective">RTO</abbr> is the planned time and level of service needed to meet the system owner's minimum expectations.</p>

<p>You will need to create different <abbr title="recovery time objective">RTO</abbr> categories since some business operations will require shorter recovery time and some may be less critical for the survival of your organization. Important factors to consider when establishing <abbr title="recovery time objective">RTO</abbr> include:</p>

<ul><li>cost-benefit analysis related to restoring operations</li>
	<li>cost for mitigation</li>
	<li>level of complexity of the recovery process</li>
	<li>time and resources required to return to normal operations</li>
	<li>critical asset ranking and risk prioritization for strategic recovery</li>
</ul><p><abbr title="recovery point objective">RPO</abbr> is the maximum amount of data your organization can tolerate losing before causing impactful harm. <abbr title="recovery point objective">RPO</abbr> is measured in units of time. It is basically the amount of time from the start of the outage to your last valid data backup.</p>

<p>For some organizations, data turnover may be low and an <abbr title="recovery point objective">RPO</abbr> of days or even weeks may be tolerable. For organizations with a high data transaction volume, hours or even minutes of missing data may be intolerable. The <abbr title="recovery point objective">RPO</abbr> can be used as a metric to understand how frequently and where you should be backing up your important data and information. Some transactional databases may be configured to synchronously copy data to disaster recovery sites. This ensures no data is lost, but results in significantly slower transaction speeds and considerable expense.</p>

<p>When considering the business impact of a disaster, the sum of the time between the <abbr title="recovery point objective">RPO</abbr> (back in time from the disaster) and the <abbr title="recovery time objective">RTO</abbr> (forward in time from the disaster) gives an idea of how much lost business is designed into the <abbr title="disaster recovery plan">DRP</abbr>. <abbr title="recovery time objectives">RTOs</abbr> and <abbr title="recovery point objectives">RPOs</abbr> should be reviewed and updated regularly since they are likely to change depending on the threat landscape and any changes to your business objectives and operations.</p>
</div>

<div>
<h4>4.1.7 Establish a disaster recovery site</h4>

<p>A <abbr title="disaster recovery plan">DRP</abbr> should indicate where your organization's assets will be relocated if a disaster occurs. Recovery sites are usually in remote locations. They are used to help restore <abbr title="information technology">IT</abbr> infrastructure and other business-critical operations during an incident.</p>

<p>It is important that you document the various characteristics of these physical facilities, including location, heating, cooling, power, fire response, and security controls.</p>

<p>Establishing a recovery site can be costly. If your organization lacks the financial resources to have its own recovery site, consider engaging a service provider that can host your remote infrastructure, provide a <abbr title="disaster recovery plan">DRP</abbr> in cloud, or provide Disaster Recovery as a Service (DRaaS). We will expand on these options in the next section.</p>

<p>There are 3 types of disaster recovery sites to choose from, depending on your business priorities.</p>
<!-- oh gosh we are really going to level 5 hhh -->

<div>
<h5>4.1.7.1 Hot sites</h5>

<p>A hot site is a fully functional backup site with the same <abbr title="information technology">IT</abbr> infrastructure as your primary site. It functions the same as your primary site and is always kept running in case of downtime. Data synchronization is ongoing to reduce the risk of data loss. The benefit of a hot site is that it can nearly eliminate downtime.</p>
</div>

<div>
<h5>4.1.7.2 Warm sites</h5>

<p>A warm site is a back-up site with network connectivity and some equipment installed. A warm site requires setup time before it can function at full capacity. Data synchronization occurs less frequently, which can result in some data loss.</p>
</div>

<div>
<h5>4.1.7.3 Cold sites</h5>

<p>A cold site is used to store backups of systems or data, but with little equipment installed. More time and resources will be required to set up and restore business operations. Data synchronization can be a difficult and lengthy process, and there is a higher risk of data loss if servers need to be transferred from your primary site to the cold site.</p>
</div>
</div>
<!-- sub subsection -->

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>

<p><span class="clearfix"></span></p>

<div>
<h4>4.1.8 Test and maintain your disaster recovery plan</h4>

<p>Your organization should test your <abbr title="disaster recovery plan">DRP</abbr> regularly to ensure that your documented procedures are effective and up to date. A <abbr title="disaster recovery plan">DRP</abbr> is an ongoing process that must be reviewed continuously to ensure it aligns with changes to your risk environment, business operations, and technologies.</p>

<p>By testing your <abbr title="disaster recovery plan">DRP</abbr> regularly, you can ensure that you meet your response goals while identifying any areas that may need improvement. By testing your plan, you can:</p>

<ul><li>verify the effectiveness of the recovery documentation and recovery sites</li>
	<li>provide reassurance that your organization will be able to withstand disasters</li>
	<li>ensure that your data is being replicated correctly and can be recovered easily from your backups</li>
	<li>review lessons learned from past incidents and include additional mitigation actions in your <abbr title="disaster recovery plan">DRP</abbr></li>
	<li>flag areas in the <abbr title="disaster recovery plan">DRP</abbr> that need updating</li>
	<li>update training requirements for your response team to ensure they are informed of changes and are well prepared to implement the <abbr title="disaster recovery plan">DRP</abbr></li>
</ul><p>There are several types of <abbr title="disaster recovery plan">DRP</abbr> tests you can use:</p>
<!-- level 5 again -->

<div>
<h5>4.1.8.1 Checklist testing</h5>

<p>Checklist testing will ensure that the recovery procedures are comprehensive and account for all the resources and response members that are required to execute each step of the plan.</p>
</div>

<div>
<h5>4.1.8.2 Tabletop testing</h5>

<p>The main purpose of a tabletop test is to ensure that your response team understands the processes and procedures in your <abbr title="disaster recovery plan">DRP</abbr> and that they are aware of their responsibilities and roles. Tabletop testing will allow all response team members to meet and discuss a simulated disruption. They can discuss the actions required to manage the fine details of the disaster, including the aftermath. This will help ensure that all necessary resources are available as indicated in the <abbr title="disaster recovery plan">DRP</abbr>. A tabletop test will also determine if your <abbr title="disaster recovery plan">DRP</abbr> is efficient and will reveal strengths and flaws, which will allow you to address any issues with the <abbr title="disaster recovery plan">DRP</abbr> before an actual event occurs.</p>
</div>

<div>
<h5>4.1.8.3 Walkthrough testing</h5>

<p>A walkthrough test is a dry run test to help identify any issues. It is a step-by-step review of the <abbr title="disaster recovery plan">DRP</abbr> to ensure that the response team members understand their roles, are aware of all the steps of the plan, and have been updated on any changes to the plan since the last review.</p>
</div>

<div>
<h5>4.1.8.4 Parallel testing</h5>

<p>A parallel test is when a recovery system is used to restore a system without interrupting any business operations. This is a step-by-step review of each plan component and will help identify gaps, weaknesses, or overlooked details that might present roadblocks during real execution.</p>
</div>

<div>
<h5>4.1.8.5 Full interruption testing</h5>

<p>A full interruption test is the most disruptive test. The main system is taken down and the response team attempts to recover it. This is a more thorough and time-consuming test. It is also risky since it can lead to disruptions to business operations and expensive downtime. In some cases, this type of test may not be feasible due to public safety or regulatory concerns.</p>
</div>

<div>
<h5>4.1.8.6 Simulation testing</h5>

<p>A simulation test will help the response team know what to do when a disaster occurs. It involves role-playing the <abbr title="disaster recovery plan">DRP</abbr> based on a specific disaster scenario. It should incorporate all steps in the <abbr title="disaster recovery plan">DRP</abbr> and ensure that the documented procedures are clear with no ambiguity.</p>
</div>
<!-- level 5 end --></div>
<!-- level 4 end --></div>
<!-- level 3 close -->

<div>
<h2 class="text-info" id="disaster-recovery-strategies">4.2 Types of disaster recovery strategies</h2>

<p>In the previous section, we discussed setting up disaster recovery sites to help protect your organization's <abbr title="information technology">IT</abbr> infrastructure and critical operations. We listed the 3 types of disaster recovery sites (hot, warm, and cold) to choose from, based on your business priorities, resources, and risk tolerance. Aside from these options, there are several other disaster recovery strategies to choose from depending on your organization's <abbr title="information technology">IT</abbr> infrastructure, business operations, resources, budget, and critical assets. Here are some examples of backup and recovery methods you can explore.</p>

<div>
<h3>4.2.1 Network disaster recovery</h3>

<p>Network connectivity is critical for your organization's external and internal communication, application access, and data sharing. Network disaster recovery procedures specify how network services will be restored in the event of a network disruption, what resources will be required, and how access to backup data and storage sites will be ensured. Depending on your organization's requirements, your network disaster recovery may include recovery procedures such as:</p>

<ul><li>local area networks (LAN)</li>
	<li>wide area networks (WAN)</li>
	<li>wireless networks</li>
	<li>network-based applications and services</li>
	<li>failed devices that can lead to network interruptions, such as routers, switches, gateways, modems</li>
</ul><p>There are various reasons why network disruptions can occur, including human error, natural or physical disasters, and cyber attacks like DDoS.</p>
</div>

<div>
<h3>4.2.2 Virtualized disaster recovery</h3>

<p>Your organization can use virtual machines in an offsite location or the cloud to back up certain operations or data, or even to replicate your entire <abbr title="information technology">IT</abbr> infrastructure (servers, storage, operating systems, software, applications, and data). Using virtualization for disaster recovery can offer the following benefits:</p>

<ul><li>automate some disaster recovery processes and allow online operations to be restored faster</li>
	<li>reduce your <abbr title="information technology">IT</abbr> footprint</li>
	<li>support frequent replication and enable seamless failover</li>
	<li>allow your infrastructure to operate from any location</li>
</ul></div>

<div>
<h3>4.2.3 Disaster recovery in the cloud</h3>

<p>Disaster recovery in the cloud offers services and strategies to store backup data, applications, and other resources in cloud storage rather than in a physical location. Disaster recovery in the cloud can be more than just a backup solution, it can provide automatic workload failover to the cloud platform so that organizations can restore their backups to either on-premises or cloud environments. This enables business continuity and quick recovery when disruption occurs.</p>

<p>Disaster recovery in the cloud automates many recovery processes and can be scaled to meet business requirements. It is commonly offered as a software as a service solution and can be a more affordable option for organizations with limited financial resources.</p>

<p>Using disaster recovery in the cloud offers the following additional benefits:</p>

<ul><li>flexible pricing models, such as on-demand or pay-as-you-go</li>
	<li>no single point of failure when using the cloud since you can pay to back up data across multiple geographical locations</li>
	<li>lower disaster recovery capital costs since you will not need to purchase duplicate hardware or software or a physical backup site</li>
	<li>enhanced compliance with regulatory requirements</li>
	<li>assurance that your business operations will be restored with minimized data loss, in accordance with your service level agreement (SLA)</li>
</ul></div>

<div>
<h4>4.2.4 Disaster recovery as a service</h4>

<p><abbr title="Disaster Recovery as a Service">DRaaS</abbr> is disaster recovery hosted by a third-party service provider or public cloud infrastructure. It is a solution that enables replication and hosting of physical or virtual servers, allowing failover for on-premises or cloud computing environments.</p>

<p>Depending on the <abbr title="service level agreement">SLA</abbr> between the <abbr title="Disaster Recovery as a Service">DRaaS</abbr> provider and the customer, the following solutions can be acquired:</p>

<ul><li>monitoring, implementing, and managing the entire <abbr title="disaster recovery plan">DRP</abbr> and helping clients recover their <abbr title="information technology">IT</abbr> infrastructure and return to normal business operations</li>
	<li>ensuring guaranteed recovery times for critical <abbr title="information technology">IT</abbr> resources</li>
	<li>offering backup and disaster recovery tools to customers who want to set up and implement disaster recovery solutions on site</li>
	<li>providing an infrastructure as a service solution, which is a type of cloud service that offers essential computing, storage, and networking resources on demand, on a pay-as-you-go basis</li>
</ul></div>

<div>
<h4>4.2.5 Backup as a service</h4>

<p>Backup a service is a service offered by a third-party provider and is also known as online backup or cloud backup. The service provider can store your data remotely in the cloud and manage all the backup and recovery infrastructure.</p>
</div>

<div>
<h4>4.2.6 Storage replication</h4>

<p>Storage replication copies your data in real time from one location to another over a storage area network, <abbr title="local area networks">LAN</abbr> or <abbr title="wide area networks">WAN</abbr>. Storage replication is referred to as synchronous replication since the replication is done in real time. Your organization can also use asynchronous replication, which creates copies of data according to a defined schedule.</p>
</div>
</div>
</section><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>

<p><span class="clearfix"></span></p>

<section><h2 class="text-info" id="summary">5 Summary</h2>

<p>The advice provided in this publication is meant to help strengthen your organization's resilience through emergency preparedness. Your emergency preparedness strategy should encompass an <abbr title="incident response plan">IRP</abbr>, a <abbr title="business continuity plan">BCP</abbr>, and a <abbr title="disaster recovery plan">DRP</abbr>. While the objectives of the 3 plans differ, they all strive to do the following:</p>

<ul><li>protect and safeguard your critical assets and business operations</li>
	<li>respond to incidents</li>
	<li>recover from disasters as quickly as possible</li>
</ul><p>Remember that an <abbr title="incident response plan">IRP</abbr> focuses on a specific incident occurrence and the actions required to respond to the incident, whereas a <abbr title="disaster recovery plan">DRP</abbr> focuses on restoring your organization's <abbr title="information technology">IT</abbr> infrastructure after a disastrous event occurs. The objective of both plans is to help your organization return to normal business operations as quickly as possible.</p>

<p>The main principles of an <abbr title="incident response plan">IRP</abbr> and a <abbr title="disaster recovery plan">DRP</abbr> fall under the umbrella of a <abbr title="business continuity plan">BCP</abbr>. A <abbr title="business continuity plan">BCP</abbr> is a holistic approach to handling disruptions with the objective of maintaining your organization's operations throughout the event lifecycle.</p>

<p>Identifying your organization's critical assets and business operations will help you identify the requirements and guide the plan development process. Through effective planning and practice, your organization will be well prepared, ready to recover, and able to maintain operations efficiently. This will minimize the impacts, interruptions, costs, and damages of any future disruption, incident, or disaster.</p>
</section></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/developing-your-incident-response-plan-itsap40003</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/developing-your-incident-response-plan-itsap40003"/><title><![CDATA[Developing your incident response plan (ITSAP.40.003)]]></title><updated>2026-01-16T19:02:25Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="735" about="/en/guidance/developing-your-incident-response-plan-itsap40003" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row"><!--Info across the top under the image-->
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.40.003</strong></p>
</div>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>January 2026 | Awareness series</strong></p>
</div>

<p>Your incident response plan (IRP) includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from a specific incident. Cyber threats, natural disasters, and unplanned outages are examples of incidents that can impact your network, systems, and devices. With a proper plan, you will be prepared to handle incidents when they happen, mitigate the threats and associated risks, and recover quickly. While this publication is written in the context of cyber incidents, its guidance can assist your organization in developing an incident response plan for various types of incidents.</p>

<h2 class="text-info">On this page</h2>

<ul><li><a href="#before">Before creating an incident response plan</a></li>
	<li><a href="#types">Types of incidents</a></li>
	<li><a href="#steps">Main steps in your incident response plan</a></li>
	<li><a href="#services">In-house or professional services</a></li>
	<li><a href="#learn">Learn more</a></li>
</ul><h2 class="text-info" id="before">Before creating an incident response plan</h2>

<p>Before you create an <abbr title="incident response plan">IRP</abbr>, identify the information and systems of value to your organization. Determine the types of incidents you might face, such as ransomware or distributed denial of service attacks, and the appropriate responses. Consider who is best qualified to be a member of your response team. You should also determine how you will inform your organization of the plan and the associated policies and procedures.</p>

<h3>Conduct a threat and risk assessment</h3>

<p>A threat and risk assessment (TRA) is a process that helps you identify your critical assets and how these assets can be compromised. Your <abbr title="threat and risk assessment">TRA</abbr> will assess the level of risk these threats pose to your assets so that you can develop and prioritize your response efforts. Some questions to answer during the <abbr title="threat and risk assessment">TRA</abbr> include:</p>

<ul><li>what data is valuable to your organization?</li>
	<li>which business areas handle sensitive data?</li>
	<li>what controls do you currently have in place?</li>
	<li>can this lead to a privacy breach for your organization?</li>
</ul><p>For more information on <abbr title="threat and risk assessments">TRAs</abbr>, read <a href="/en/tools-services/harmonized-tra-methodology">Harmonized <abbr title="threat and risk assessment">TRA</abbr> Methodology (TRA-1)</a>.</p>

<h3>Create your response team</h3>

<p>The purpose of your team is to assess, document, and respond quickly to incidents. The goal is to restore your systems, recover information, and reduce the risk of the incident reoccurring.</p>

<p>Your team should include employees with various qualifications and have cross-functional support from other business lines.</p>

<p>Roles to consider for your incident response team include:</p>

<ul><li>critical path personnel</li>
	<li>security practitioners</li>
	<li><abbr title="information technology">IT</abbr> or cyber security specialists</li>
	<li>project engineers for operational technology (OT) environments</li>
	<li>legal</li>
	<li>management</li>
</ul><p>Cyber incidents in particular are unpredictable and require immediate response. Ensure your response team has alternate means of contact, such as mobile phones or out of band email. Each member of your team should also have a backup contact in case they cannot be reached or are unavailable.</p>

<h3>Develop your policies and procedures</h3>

<p>Your incident response activities need to align with your organization's policy and compliance requirements.</p>

<p>Write an incident response policy that establishes the authorities, roles, and responsibilities for your incident response procedures and processes. This policy should be approved by your organization's senior management.</p>

<h3>Educate your employees</h3>

<p>Provide training to employees that explains your incident response plan, policies, and procedures. Tailor your training programs to your organization's business needs and requirements, and to your employees' roles and responsibilities.</p>

<p>Update your employees on current incident response planning and execution. A well-trained and informed workforce can defend against incidents.</p>

<h3>Create your communications plan</h3>

<p>Your communications plan should detail how, when, and with whom your team communicates. This plan should include a central point of contact for employees to report suspected or known incidents.</p>

<p>Your notification procedures are critical to the success of your incident response. Identify the key internal and external stakeholders who will be notified during an incident. You may have to alert third parties, such as clients and managed service providers. Depending on the incident, you may need to contact law enforcement or consider engaging a lawyer for advice. You may also need to contact your media team.</p>

<h2 class="text-info" id="types">Types of incidents</h2>

<p>Your organization can face many different incidents. Some examples include:</p>

<h3>Ransomware</h3>

<p>Ransomware is a type of malware that locks you out of files or systems until you pay a ransom to a threat actor. Payment does not guarantee that you will regain access to your information.</p>

<h3>Data theft</h3>

<p>Data theft occurs when threat actors steal information stored on servers and devices. The data is most commonly accessed using stolen user credentials. Advanced persistent threats (APTs) refer to threat actors that are highly sophisticated and skilled. <abbr title="Advanced persistent threats">APTs</abbr> are able to use advanced techniques to conduct complex and protracted campaigns in pursuit of their goals. The <abbr title="Advanced persistent threat">APT</abbr> designator is usually reserved for nation states or very proficient organized crime groups.</p>

<h3>Active exploitation</h3>

<p>Active exploitation takes advantage of unpatched software, hardware, or other vulnerabilities to gain control of your systems, networks, and devices. These attacks can go unnoticed before you have the opportunity to apply a patch or update. Your plan should provide instructions for mitigating active exploitation, such as temporarily suspending Internet access or ceasing online activity.</p>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h2 class="text-info" id="steps">Main steps in your incident response plan</h2>

<p>Your <abbr title="incident response plan">IRP</abbr> should identify the objectives, stakeholders, responsibilities, communication methods, and escalation processes used throughout the incident response lifecycle. Keep the plan simple and flexible. Test, revisit, and revise your incident response plan annually to keep it effective.</p>

<p>Follow the incident response lifecycle steps below to structure your <abbr title="incident response plan">IRP</abbr>.</p>

<h3>Preparation</h3>

<ol><li>Start with a statement of your management's commitment to the project. Perform a risk assessment to identify your organization's most valuable assets that are critical to your business operations</li>
	<li>Define the security incidents your organization is most likely to face and create detailed response steps for these incidents</li>
	<li>Lay out the objectives of your incident response strategy, as well as your related policies, standards, and procedures. Your policy should include performance measures, the incident data that you collect over time (for example, the number of incidents and time spent per incident)</li>
	<li>Define your goals to improve security, visibility, and recovery</li>
	<li>Develop and implement a reliable backup process to create copies of your data and systems to help you restore them during an outage</li>
	<li>Have a detailed strategy for updating and patching your software and hardware. Use this strategy to track and fix vulnerabilities and mitigate the occurrence and severity of incidents</li>
	<li>Create your response team and assign roles and responsibilities to each member</li>
	<li>Define your communications plan and identify how key stakeholders and management will be informed throughout the incident. You should have multiple communication mechanisms in place, this may be valuable during an incident</li>
	<li>Develop exercises to test your plan and response. You can revise and improve your plan using your test results</li>
</ol><h3>Detection and analysis</h3>

<p>Monitor your networks, systems, and connected devices to identify potential threats. Produce reports regularly and document events and potential incidents. Analyze these occurrences and determine whether you need to activate your <abbr title="incident response plan">IRP</abbr>. Determine the frequency and intensity of your monitoring.</p>

<p>Although it is impossible to have a step-by-step guide for every incident, you should be prepared to handle incidents that use common attack vectors.</p>

<p>In the event of a breach or compromise, analyze the incident, including its type, its origin, and the extent of the damage caused. All facts about the incident should be documented. When an incident is detected, analyzed, and prioritized, your incident response team should notify the appropriate stakeholders so that everyone that needs to be involved is informed.</p>

<h3>Containment</h3>

<p>Containment is crucial for your organization's recovery. The primary goal is to minimize business impact.</p>

<p>Gain an understanding of the issue so you can contain the threat and apply effective mitigation measures.</p>

<p>An effective mitigation measure for an <abbr title="information technology">IT</abbr> environment may include deactivating connectivity to your systems and devices to block the threat actor from causing further damage. It might be necessary to isolate all systems and suspend employee access temporarily to detect and stop further intrusions.</p>

<p>Containment strategies and procedures will depend on the type of incident, the degree of damage the incident can cause, and your operational requirements. Refer to your organization's incident containment strategies, established in the preparation phase.</p>

<p>When dealing with an incident, the risk assessment completed in the preparation phase should help you define your acceptable risk so that you can develop your containment strategies accordingly.</p>

<h3>Eradication</h3>

<p>Conduct a root cause analysis to identify and remove all elements of the incident from the affected systems and complete the following actions:</p>

<ul><li>Identify all affected systems, hosts, and services</li>
	<li>Remove all malicious content from affected systems</li>
	<li>Scan and wipe your systems and devices</li>
	<li>Identify and address all residual attack vectors</li>
	<li>Communicate with stakeholders to ensure appropriate management of the incident</li>
	<li>Harden, patch, and upgrade all affected systems</li>
	<li>Upgrade or replace legacy systems</li>
</ul><h3>Recovery</h3>

<p>Restore and reintegrate the affected systems back into your operating environment.</p>

<ul><li>Ensure any malware is removed before restoring your backups</li>
	<li>Test, verify, monitor, and validate affected systems to ensure they are running effectively</li>
	<li>Revise and update policies, procedures, and training initiatives</li>
</ul><h3>Post-incident activities and lessons learned</h3>

<p>Review the root cause of the incident and collaborate with the response team to determine what can be improved. Evaluate your incident response processes and highlight what went well and what areas require improvement. Create a lessons learned document that details how you will adjust and improve your plan for future incidents. The results of the lessons learned should be used to improve detection methods and prevent repeated incidents.</p>

<h2 class="text-info" id="services">In-house or professional services</h2>

<p>When developing your <abbr title="incident response plan">IRP</abbr>, determine which actions and services you can conduct internally and which actions you will outsource. Professional services can be retained to assist with incident response initiatives, such as developing your plan, determining your backup processes, and monitoring and patching your systems. Outsourcing incident response for <abbr title="operational technology">OT</abbr> incidents or other specialized environments can be costly, and it is important to plan for these scenarios.</p>

<h2 class="text-info" id="learn">Learn more</h2>

<ul><li><a href="/en/guidance/ransomware-how-prevent-and-recover-itsap00099">Ransomware: How to prevent and recover (ITSAP.00.099)</a></li>
	<li><a href="/en/guidance/developing-your-it-recovery-plan-itsap40004">Developing your <abbr title="information technology">IT</abbr> recovery plan (ITSAP.40.004)</a></li>
	<li><a href="/en/guidance/have-you-been-hacked-itsap00015">Have you been hacked? (ITSAP.00.015)</a></li>
	<li><a href="/en/guidance/preventative-security-tools-itsap00058">Preventative security tools (ITSAP.00.058)</a></li>
	<li><a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002)</a></li>
	<li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Offer tailored cyber security training to your employees (ITSAP.10.093)</a></li>
	<li><a href="/en/guidance/cyber-security-considerations-consumers-managed-services-itsm50030">Cyber security considerations for consumers of managed services (ITSM.50.030)</a></li>
	<li><a href="/en/guidance/improving-cyber-security-resilience-through-emergency-preparedness-planning-itsm10014">Improving cyber security resilience through emergency preparedness (ITSM.10.014)</a></li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/developing-your-business-continuity-plan-itsap10005</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/developing-your-business-continuity-plan-itsap10005"/><title><![CDATA[Developing your business continuity plan (ITSAP.10.005)]]></title><updated>2026-01-16T19:02:04Z</updated><summary><![CDATA[In the event of a cyber incident or natural disaster, your organization will need a business continuity plan (BCP) to resume its most critical business operations quickly. Your BCP will identify the risks from various threats and the impact they would have on your organization.]]></summary><content><![CDATA[<article data-history-node-id="7065" about="/en/guidance/developing-your-business-continuity-plan-itsap10005" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>January 2026</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.10.005</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>November 2025 | Awareness series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg"><!--<div class="mrgn-bttm-md well well-sm col-md-4 pull-right mrgn-lft-md col-sm-12 col-xs-12">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/ITSAP00101-e.pdf">Don't take the bait: Recognize and avoid phishing attacks&nbsp;- ITSAP.00.101 (PDF,&nbsp;307&nbsp;KB)</a></p>
</div>-->
<p>In the event of a cyber incident or natural disaster, your organization will need a business continuity plan (BCP) to resume its most critical business operations quickly. Your <abbr title="business continuity plan">BCP</abbr> will identify the risks from various threats and the impact they would have on your organization. <abbr title="business continuity plan">BCP</abbr>s outline the main assets, roles, responsibilities, and processes required to minimize disruptions and keep critical business functions running until your operations can be fully restored. Organizational resilience and compliance with regulations, policies, and standards are some of the reasons you should have a <abbr title="business continuity plan">BCP</abbr>.</p>

<section><h2 class="text-info h3">On this page</h2>

<ul><li><a href="#lifecycle">Business continuity lifecycle</a></li>
	<li><a href="#operations">Common disruptors to business operations</a></li>
	<li><a href="#strategies">Additional emergency preparedness strategies</a></li>
	<li><a href="#learnmore">Learn more</a></li>
</ul></section></div>
</div>

<h2 class="text-info" id="lifecycle">Business continuity lifecycle</h2>

<p>Your <abbr title="business continuity plan">BCP</abbr> needs to be tested, reviewed, and updated regularly. To ensure your <abbr title="business continuity plan">BCP</abbr> is relevant, useful, and reliable, you should follow the 5 steps of the business continuity planning lifecycle.</p>

<h3>Initiate</h3>

<p>Identify your organization’s unique goals and objectives, as well as the key people and processes required to meet these goals. Create a response team and assign a team leader. Be sure to include members from various operational areas of your organization. Each member should know the threats that could affect your organization and the level of impact of the associated risks. Ensure you communicate the intent of your <abbr title="business continuity plan">BCP</abbr> and the expected outcomes to senior management for approval.</p>

<h3>Analyze</h3>

<p>Conduct a threat and risk assessment (TRA) to identify the possible threats and risks that could disrupt your organization’s operations. Once the <abbr title="threat and risk assessment">TRA</abbr> is finalized, complete your business impact analysis (BIA). Your <abbr title="business impact analysis">BIA</abbr> will identify critical and non-critical business operations. Additionally, your <abbr title="business impact analysis">BIA</abbr> will list the consequences of disruption from the risks identified in your <abbr title="threat and risk assessment">TRA</abbr>. Examine critical operations to determine their recovery time objective (RTO) and recovery point objective. Your <abbr title="recovery time objective">RTO</abbr> is the planned time and level of service needed to meet the system owner’s minimum expectations.</p>

<p>For more information on <abbr title="threat and risk assessment">TRA</abbr> and <abbr title="business impact analysis">BIA</abbr>, read:</p>

<ul><li><a href="/en/tools-services/harmonized-tra-methodology">Harmonized <abbr title="threat and risk assessment">TRA</abbr> Methodology (TRA-1)</a></li>
	<li><a href="https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8286D-upd1.pdf">National Institute of Standards and Technology’s Using Business Impact Analysis to Inform Risk Prioritization and Response (PDF)</a></li>
</ul><h3>Develop and implement</h3>

<p>Create strategies that will allow your most critical business operations to resume for each of your identified risks. These strategies should mitigate or minimize the impact on your organization’s stakeholders, operations, and assets. As you develop your <abbr title="business continuity plan">BCP</abbr>, consider the following best practices:</p>

<ul class="lst-spcd"><li>identify the response team, their roles, and their responsibilities</li>
	<li>develop communication methods and recovery procedures</li>
	<li>identify an alternate work site and an employee relocation plan</li>
	<li>consolidate a list of alternate resources and suppliers</li>
	<li>establish an <abbr title="information technology">IT</abbr> recovery plan</li>
	<li>establish policies to be implemented during a disaster, emergency, or incident</li>
	<li>determine the resources required to roll out the activities in your plan</li>
	<li>identify timeframes in which services and business operations need to be available</li>
	<li>identify the resources required to ensure prioritization and a quick, relevant response</li>
	<li>create reports to share with stakeholders</li>
	<li>provide your employees with awareness and training on the identified risks, emergency preparedness, and response strategies</li>
	<li>document your plan, validate it, and share it with your organization’s management teams</li>
	<li>store your <abbr title="business continuity plan">BCP</abbr> in a secure location that is known to your response team and available in a disaster or incident</li>
</ul><h3>Communicate and integrate</h3>

<p>Communicate your <abbr title="business continuity plan">BCP</abbr> to employees and stakeholders. Ensure you integrate your plan into your organization’s policies. To avoid misinformation during an incident, develop a communication and public relations plan. Include guidance on how to communicate to all internal and external parties, including the media.</p>

<h3>Test and validate</h3>

<p>Risks, priorities, and business operations will change over time. Your <abbr title="business continuity plan">BCP</abbr> will require improvement through ongoing analysis, testing, validation, and implementation. Learning opportunities like seminars, tabletop exercises, and live simulations will assess your response team’s preparedness and identify any weak points in your plan. Testing your <abbr title="business continuity plan">BCP</abbr> will evaluate and validate your identified procedures, training initiatives, technical solutions, and recovery procedures. Use test results to update the <abbr title="business continuity plan">BCP</abbr> and ensure it remains aligned to your organization’s operational requirements and threat landscape.</p>

<div> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="operations">Common disruptors to business operations</h2>

<p>Natural disasters, global events, equipment failures, and compromises to your supply chain can all impact your business operations. In addition to these events, your organization needs to be prepared to mitigate the effects of various cyber threats, such as:</p>

<ul class="lst-spcd"><li>malware and ransomware incidents</li>
	<li>data theft</li>
	<li>distributed denial of service attacks</li>
	<li>account compromises</li>
</ul><h2 class="text-info" id="strategies">Additional emergency preparedness strategies</h2>

<p>Your <abbr title="business continuity plan">BCP</abbr> will address how to recover and resume only your most critical business operations during an incident. Your organization needs other plans to ensure it can detect, respond to, and fully recover all operations after any incident.</p>

<p>Your incident response plan (IRP) details the steps your organization will take to handle a specific security incident, mitigate the related risks, and recover quickly. Having an <abbr title="incident response plan">IRP</abbr> will help your response team reduce organizational downtime and business disruption during an incident.</p>

<p>Your disaster recovery plan, which can include your <abbr title="information technology">IT</abbr> recovery plan, will help your organization return to full operations after an incident.</p>

<p>For more information on developing these plans, read the Cyber Centre’s publications:</p>

<ul><li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan (ITSAP.40.033)</a></li>
	<li><a href="/en/guidance/developing-your-it-recovery-plan-itsap40004">Developing your <abbr title="information technology">IT</abbr> recovery plan (ITSAP.40.004)</a></li>
</ul><p>In addition to these plans, your organization can further reduce vulnerabilities and increase incident preparedness by taking the following preventative measures:</p>

<ul class="lst-spcd"><li>back up your systems and data online and leverage mechanisms to verify that these backups are trustworthy</li>
	<li>provide employees with cyber security training tailored to their roles and your organization</li>
	<li>monitor your network and review your audit logs to identify anomalies or potential compromises</li>
	<li>enforce phishing-resistant multi-factor authentication wherever possible</li>
	<li>limit the number of administrator accounts</li>
	<li>ensure administrator tasks are completed on a dedicated administrative workstation</li>
</ul><h2 class="text-info lst-spcd" id="learnmore">Learn more</h2>

<ul><li><a href="/en/guidance/improving-cyber-security-resilience-through-emergency-preparedness-planning-itsm10014">Improving cyber security resilience through emergency preparedness planning (ITSM.10.014)</a></li>
	<li><a href="/en/guidance/foundational-cyber-security-actions-small-organizations-itsap10300">Foundational cyber security actions for small organizations (ITSAP.10.300)</a></li>
	<li><a href="/en/guidance/preventative-security-tools-itsap00058">Preventative security tools (ITSAP.00.058)</a></li>
	<li><a href="/en/guidance/how-updates-secure-your-device-itsap10096">How updates secure your device (ITSAP.10.096)</a></li>
	<li><a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002)</a></li>
	<li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Offer tailored cyber security training to your employees (ITSAP.10.093)</a></li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-secure-connectivity-principles-operational-technology</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-secure-connectivity-principles-operational-technology"/><title><![CDATA[Joint guidance on secure connectivity principles for operational technology]]></title><updated>2026-01-14T18:00:58Z</updated><summary><![CDATA[This joint guidance outlines the desirable end-states that organizations should achieve when designing connectivity into OT environments. The end-states are intended as goals rather than minimum requirements.]]></summary><content><![CDATA[<article data-history-node-id="7152" about="/en/news-events/joint-guidance-secure-connectivity-principles-operational-technology" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the United Kingdom’s National Cyber Security Centre (NCSC-UK) and the following international partners in releasing guidance on secure connectivity principles for operational technology (OT):</p>

<ul><li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li>
	<li>Germany’s Federal Office for Information Security (BSI)</li>
	<li>Netherlands’ National Cyber Security Centre (NCSC-NL)</li>
	<li>New Zealand’s National Cyber Security Centre (NCSC-NZ)</li>
	<li>United States’ Cybersecurity and Infrastructure Security Agency (CISA)</li>
	<li>United States’ Federal Bureau of Investigation (FBI)</li>
</ul><p>Organizations deploying or operating <abbr title="operational technology">OT</abbr> systems often face challenges in prioritizing cyber security due to operational constraints. An example of such a constraint is the dependence on legacy technologies that were never designed for modern connectivity or security requirements. Opportunistic and highly capable threat actors are known to target exposed and insecure <abbr title="operational technology">OT</abbr> connectivity.</p>

<p>This joint guidance outlines the desirable end-states that organizations should achieve when designing connectivity into <abbr title="operational technology">OT</abbr> environments. The end-states are intended as goals rather than minimum requirements.</p>

<p>System owners should use these principles as a framework to design, implement and manage secure <abbr title="operational technology">OT</abbr> connectivity, for both new and existing <abbr title="operational technology">OT</abbr> systems. These principles are particularly critical for operators of essential services.</p>

<p>Read the full joint publication: <a href="https://www.ncsc.gov.uk/collection/operational-technology/secure-connectivity">Secure connectivity principles for operational technology (OT)</a>.</p>

<h2>Related guidance</h2>

<ul><li><a href="/en/guidance/roadmap-migration-post-quantum-cryptography-government-canada-itsm40001">Roadmap for the migration to post-quantum cryptography for the Government of Canada (ITSM.40.001)</a></li>
	<li><a href="/en/guidance/preparing-your-organization-quantum-threat-cryptography-itsap00017">Preparing your organization for the quantum threat to cryptography (ITSAP.00.017)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/generative-artificial-intelligence-ai-itsap00041</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/generative-artificial-intelligence-ai-itsap00041"/><title><![CDATA[Generative artificial intelligence - ITSAP.00.041]]></title><updated>2025-12-10T18:20:09Z</updated><summary><![CDATA[This publication provides some information on the potential risks and mitigation measures associated with generative AI.]]></summary><content><![CDATA[<article data-history-node-id="4234" about="/en/guidance/generative-artificial-intelligence-ai-itsap00041" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>December 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.041</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>December 2025 | Awareness series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg"><!--<div class="mrgn-bttm-md well well-sm col-md-4 pull-right mrgn-lft-md col-sm-12 col-xs-12">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/ITSAP00101-e.pdf">Don't take the bait: Recognize and avoid phishing attacks&nbsp;- ITSAP.00.101 (PDF,&nbsp;307&nbsp;KB)</a></p>
</div>-->
<p>Many organizations use artificial intelligence (AI) for process optimization, data analysis, diagnostics and customization of their user experience. Generative <abbr title="artificial intelligence">AI</abbr> is a type of <abbr title="artificial intelligence">AI</abbr> that generates new content by modelling features from large datasets that were fed into the model. While traditional <abbr title="artificial intelligence">AI</abbr> systems can recognize patterns or classify existing content, generative <abbr title="artificial intelligence">AI</abbr> can create unique content in many forms, including text, image, audio or software code.</p>

<p>A subset of generative <abbr title="artificial intelligence">AI</abbr> that has seen significant improvement in recent years is large language models (LLMs). To create content, <abbr title="large language models">LLMs</abbr> are provided a set of parameters (for example, a query or prompt). Since late 2022, several <abbr title="large language models">LLMs</abbr> (for example, Microsoft’s Copilot, OpenAI’s ChatGPT and Google’s LaMDA) and services using <abbr title="large language models">LLMs</abbr> (for example, Google’s Bard and Microsoft’s Bing) have gained the world’s attention. This publication provides some information on the potential risks and mitigation measures associated with generative <abbr title="artificial intelligence">AI</abbr>.</p>

<section><h2 class="text-info h3">On this page</h2>

<ul><li><a href="#how">How generative <abbr title="artificial intelligence">AI</abbr> is being used</a></li>
	<li><a href="#risks">The risks involved with generative <abbr title="artificial intelligence">AI</abbr></a></li>
	<li><a href="#be-aware">Be aware of information received by <abbr title="artificial intelligence">AI</abbr></a></li>
	<li><a href="#mitigate">How to mitigate the risks</a></li>
	<li><a href="#measures">Security measures to consider using</a></li>
	<li><a href="#learn-more">Learn more</a></li>
</ul></section></div>
</div>

<h2 class="text-info" id="how">How generative is <abbr title="artificial intelligence">AI</abbr> being used</h2>

<p>Generative <abbr title="artificial intelligence">AI</abbr> is both a transformative and disruptive technology that may significantly alter how consumers, industries or businesses operate. It has the potential to enable creativity and innovation that could improve services and business operations. Some common examples of generative <abbr title="artificial intelligence">AI</abbr> being used to enhance products and contextualize content include:</p>

<h3>Image and video</h3>

<p>Generative <abbr title="artificial intelligence">AI</abbr> can be used to analyze, alter and create visual content for personal or business use. <abbr title="artificial intelligence">AI</abbr> can use visual searches and contextualize content to offer alternate descriptions and examples.</p>

<h3>Robotics</h3>

<p><abbr title="artificial intelligence">AI</abbr> technology that uses motion planning and detection to perform different tasks, for example, self-driving vehicles and drones. Generative <abbr title="artificial intelligence">AI</abbr> can be used to automate processes and enhance features.</p>

<h3>Language</h3>

<p><abbr title="artificial intelligence">AI</abbr> can understand voice and text to analyze, respond and carry out tasks. Call centres and website chatbots use generative <abbr title="artificial intelligence">AI</abbr> to analyze initial requests and offer information to try and solve common questions without needing human interaction.</p>

<h3>Entertainment</h3>

<p><abbr title="artificial intelligence">AI</abbr> scans engagement to analyze connections between different software and applications and recommend content to users.</p>

<p>Generative <abbr title="artificial intelligence">AI</abbr> is used in many industries and businesses to help enhance processes. The following sectors have found useful applications for generative <abbr title="artificial intelligence">AI</abbr>:</p>

<h3>Healthcare</h3>

<p>Assists healthcare providers in making faster diagnoses and offers the ability to create personalized treatment plans. It can also be used in medical-assisting robots to help in surgery, diagnostic testing and analysis areas.</p>

<h3>Software development</h3>

<p>Enables software developers to generate code, assists in debugging or offers code snippets. This can help speed up the development and release of software products. Generative <abbr title="artificial intelligence">AI</abbr> is also implemented in software to enhance different features and offer context or analyses for users, for example, in Microsoft Word.</p>

<h3>Online marketplace</h3>

<p>Generates human-like responses with chatbots and conversational agents, which can help organizations improve customer service and reduce support costs.</p>

<h3>Business</h3>

<p>Creates personalized customer communications for existing and prospective clients and generates predictive sales modelling to forecast their behaviour. It can also quickly produce unique and cost-effective outputs to use in marketing campaigns, advertising and video productions.</p>

<h3>Agriculture</h3>

<p>Automates farming tasks like planting, harvesting and monitoring in self-working machinery. It also offers tailored advisories and predictions to enhance sustainability and efficiency in product results and to reduce costs and labour.</p>

<h3>Education</h3>

<p>Allows educators to create personalized learning plans for students tailored to their individual performance, needs, and interests, which could help teachers better support their students.</p>

<h3>Cyber security</h3>

<p><abbr title="artificial intelligence">AI</abbr> facilitates enhancement of cyber defence tools against ransomware and other attacks. It assists cyber security practitioners to more easily scan large datasets to identify potential threats and minimize false positives by filtering out non-malicious activities.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="risks">The risks involved with generative <abbr title="artificial intelligence">AI</abbr></h2>

<p>While the capabilities of generative <abbr title="artificial intelligence">AI</abbr> technology present great opportunities, they also bring many risks. Generative <abbr title="artificial intelligence">AI</abbr> can enable threat actors to develop malicious exploits and potentially conduct more effective cyber attacks, especially as advances in <abbr title="artificial intelligence">AI</abbr> allow for higher quality and quantity of content. A significant concern is that it can provide threat actors with a greater capacity to influence. Here are some of the potential risks to be aware of:</p>

<h3>Misinformation and disinformation</h3>

<p>Content not clearly identified as being <abbr title="artificial intelligence">AI</abbr>-generated can result in the spread of misinformation, disinformation and confusion. Threat actors use <abbr title="artificial intelligence">AI</abbr> in scams and fraudulent campaigns against individuals and organizations.</p>

<h3>Phishing</h3>

<p>Threat actors can craft targeted spear-phishing attacks more frequently, automatically, and with a higher level of sophistication. Highly realistic phishing emails or scam messages could lead to identity theft, financial fraud or other forms of cybercrime.</p>

<h3>Privacy of data</h3>

<p>Users may unknowingly provide sensitive corporate data or personally identifiable information (PII) in their <abbr title="artificial intelligence">AI</abbr> queries and prompts. Threat actors could harvest this sensitive information to impersonate individuals or spread false information.</p>

<h3>Malicious code</h3>

<p>Technically skilled threat actors can overcome restrictions within generative <abbr title="artificial intelligence">AI</abbr> tools to create malware for use in a targeted cyber attack. Those with little or no coding experience can use generative <abbr title="artificial intelligence">AI</abbr> to easily write functional malware that could disrupt a business or organization.</p>

<h3>Buggy code</h3>

<p>Software developers may inadvertently introduce insecure and buggy code into the development pipeline. This could happen if they omit or improperly implement error handling and security checks.</p>

<h3>Poisoned datasets</h3>

<p>Threat actors can inject malicious code into the dataset used to train the generative <abbr title="artificial intelligence">AI</abbr> system. This could undermine the accuracy and quality of the generated data. It could also increase the potential for large-scale supply-chain attacks.</p>

<h3>Biased content</h3>

<p>Most of the training datasets fed into <abbr title="large language models">LLMs</abbr> come from the open Internet. As such, generated content has a fundamental bias in that only limited amounts of the world’s total data are online and available for <abbr title="artificial intelligence">AI</abbr> to use. Also, generated content may be prejudiced if the training dataset lacks balanced representation of data points.</p>

<h3>Loss of intellectual property</h3>

<p>Generative <abbr title="artificial intelligence">AI</abbr> tools may enable sophisticated threat actors to steal corporate data more easily, quickly and in larger quantities. Loss of intellectual property (for example, proprietary business information and copyrighted data) can devastate your organization's reputation, revenue, and future growth.</p>

<h2 class="text-info" id="be-aware">Be aware of information received from <abbr title="artificial intelligence">AI</abbr></h2>

<p>It is important to be cautious when using generative <abbr title="artificial intelligence">AI</abbr> and understand it is a technology that uses machine learning to construct responses based on a prompt or query. Always keep in mind that its outputs:</p>

<ul><li>can be incorrect</li>
	<li>might not make sense</li>
	<li>might not take certain factors into account</li>
	<li>can be biased</li>
</ul><p>It is also important to be careful and analyze <abbr title="artificial intelligence">AI</abbr> content before acting or using it. You should always be aware of and validate your sources to verify whether the content being presented is accurate.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="mitigate">How to mitigate the risks</h2>

<p>Generative <abbr title="artificial intelligence">AI</abbr> is a powerful tool that threat actors can leverage to launch cyber attacks. As this technology becomes more widespread, cyber attacks will likely grow in frequency and sophistication. Although detecting <abbr title="artificial intelligence">AI</abbr>-enabled threats can be challenging, organizations and individuals can prepare for the increased challenges that these attacks may bring.</p>

<p>Organizations and individuals should practice basic cyber security hygiene as a starting point in understanding risks and taking the appropriate measures to mitigate them.</p>

<p>Organizations should consider the following cyber security measures to minimize their risks of being compromised by cyber attacks:</p>

<h3>Enforce strong authentication mechanisms</h3>

<p>Secure accounts and devices on your networks with multi-factor authentication (MFA) to prevent unauthorized access to your high-value resources and sensitive data.</p>

<h3>Apply security patches and updates</h3>

<p>Enable automatic updates of <abbr title="information technology">IT</abbr> equipment and patch known exploited vulnerabilities as soon as possible. This will help to prevent <abbr title="artificial intelligence">AI</abbr>-generated malware from infecting the network.</p>

<h3>Stay informed</h3>

<p>Keep up to date on the latest threats and vulnerabilities associated with generative <abbr title="artificial intelligence">AI</abbr> and take proactive steps to address them.</p>

<h3>Protect your network</h3>

<p>Use network detection tools to monitor and scan the network for abnormal activities. This allows you to quickly identify incidents and threats and deploy appropriate mitigation measures. Additionally, explore how <abbr title="artificial intelligence">AI</abbr> might be deployed defensively in network protection tools and consider any ramifications.</p>

<h3>Train your employees</h3>

<p>Educate all users on how to identify the warning signs of social engineering attacks and who to contact to manage these situations securely. This should include an easy way for users to report phishing attacks or suspicious communications.</p>

<p>Individuals should consider the following measures to protect their personal data from <abbr title="artificial intelligence">AI</abbr>-related cyber attacks:</p>

<h4>Be cautious when sharing data</h4>

<p>Do not share private information with <abbr title="artificial intelligence">AI</abbr> tools unless you understand what they are doing with your data. Sharing data trains <abbr title="artificial intelligence">AI</abbr> models to then be potentially exploited or sold.</p>

<h4>Verify content</h4>

<p>As more data becomes available, it may be difficult to know who is responsible for the content or how much of it is logical or factual. It's important to read and look for signs that the content was produced by a generative <abbr title="artificial intelligence">AI</abbr> tool. Review the generated content and take the time to fact check it against credible sources.</p>

<h4>Practice basic cyber security hygiene</h4>

<p>Stay informed, use strong passwords and enable <abbr title="multi-factor authentication">MFA</abbr> to protect online accounts. Make sure to keep software up to date, use antivirus software and avoid public Wi-Fi networks.</p>

<h4>Limit exposure to social engineering or business email compromise</h4>

<p>Implement basic online safety practices such as:</p>

<ul><li>reducing the amount of personal information you post online</li>
	<li>avoiding opening email attachments and clicking on links from unknown sources</li>
	<li>communicating via an alternate, verified channel</li>
	<li>being suspicious of callers or senders that ask for sensitive information</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="measures">Security measures to consider using</h2>

<p>If you plan to use or are already using generative <abbr title="artificial intelligence">AI</abbr>, the following security measures can help you generate quality and trustworthy content while mitigating privacy concerns:</p>

<h3>Implement a cyber security risk plan</h3>

<p>Your organization should establish a plan that identifies policies on how <abbr title="artificial intelligence">AI</abbr> should be used and the content that is allowed to be generated. Enforce security-by-design throughout the <abbr title="artificial intelligence">AI</abbr> system lifecycle to monitor components and third-party software. Your policies should include the oversight and review processes required to ensure the technology is used appropriately. Consider if <abbr title="artificial intelligence">AI</abbr> is a necessary tool for the task (for example, weigh the risks and costs) and whether developing an in-house <abbr title="artificial intelligence">AI</abbr> tool would be of higher value than using third-party products.</p>

<h3>Select your vendor carefully</h3>

<p>When using pre-trained <abbr title="artificial intelligence">AI</abbr>, ask your provider if the datasets were acquired externally or developed internally and how they were validated. Use diverse and representative data to avoid inaccurate and biased content. Establish a process for outputs to be reviewed by a diverse team from across your organization to look for inherent biases within the system. Ensure your vendor has robust security practices implemented in their data collection, storage and transfer processes. Continuously fine-tune or retrain the <abbr title="artificial intelligence">AI</abbr> system with appropriate external feedback to improve the quality of outputs.</p>

<h3>Be careful what information you provide</h3>

<p>Avoid providing <abbr title="personally identifiable information">PII</abbr> or sensitive corporate data as part of the queries or prompts. Determine whether the tool allows your users to delete their search prompt history.</p>

<h2 class="text-info" id="learn-more">Learn more</h2>

<ul><li><a href="/en/guidance/artificial-intelligence-itsap00040">Artificial intelligence (ITSAP.00.040)</a></li>
	<li><a href="/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)</a></li>
	<li><a href="/en/guidance/network-security-logging-monitoring-itsap80085">Network security logging and monitoring (ITSAP.80.085)</a></li>
	<li><a href="/en/guidance/how-identify-misinformation-disinformation-and-malinformation-itsap00300">How to identify misinformation, disinformation, and malinformation (ITSAP.00.300)</a></li>
	<li><a href="/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks">Don’t take the bait: Recognize and avoid phishing attacks (ITSAP.00.101)</a></li>
	<li><a href="/en/what-voice-phishing-vishing-itsap00102">What is voice phishing (vishing)? (ITSAP.00.102)</a></li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/artificial-intelligence-itsap00040</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/artificial-intelligence-itsap00040"/><title><![CDATA[Artificial Intelligence - ITSAP.00.040]]></title><updated>2025-12-10T18:19:19Z</updated><summary><![CDATA[Artificial intelligence (AI) uses intelligent computer programs to find patterns in data to make predictions or classifications. AI can be used to perform specific tasks by analyzing data online to replicate human thought processes and decision-making abilities.]]></summary><content><![CDATA[<article data-history-node-id="670" about="/en/guidance/artificial-intelligence-itsap00040" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>December 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.040</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>December 2025 | Awareness series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg"><!--<div class="mrgn-bttm-md well well-sm col-md-4 pull-right mrgn-lft-md col-sm-12 col-xs-12">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/ITSAP00101-e.pdf">Don't take the bait: Recognize and avoid phishing attacks&nbsp;- ITSAP.00.101 (PDF,&nbsp;307&nbsp;KB)</a></p>
</div>-->
<p>Artificial intelligence (AI) uses intelligent computer programs to find patterns in data to make predictions or classifications. <abbr title="Artificial intelligence">AI</abbr> can be used to perform specific tasks by analyzing data online to replicate human thought processes and decision-making abilities. Machine learning, a subset of <abbr title="Artificial intelligence">AI</abbr>, uses algorithms and data to understand languages, text and multimedia to help the computer system learn and improve based on its own experience. Deep learning is a subset of machine learning that uses vast volumes of data and a layered structure of algorithms to train a model to make intelligent decisions independently.</p>

<section><h2 class="text-info h3">On this page</h2>

<ul><li><a href="#what-can">What <abbr title="Artificial intelligence">AI</abbr> can do</a></li>
	<li><a href="#what-cant">What <abbr title="Artificial intelligence">AI</abbr> can’t do</a></li>
	<li><a href="#organizations">How organizations use <abbr title="Artificial intelligence">AI</abbr></a></li>
	<li><a href="#threats">The threats involved with <abbr title="Artificial intelligence">AI</abbr> tools</a></li>
	<li><a href="#actors">How threat actors use <abbr title="Artificial intelligence">AI</abbr></a></li>
	<li><a href="#what-else">What else you should know about <abbr title="Artificial intelligence">AI</abbr></a></li>
	<li><a href="#learn-more">Learn more</a></li>
</ul></section></div>
</div>

<h2 class="text-info" id="what-can">What <abbr title="Artificial intelligence">AI</abbr> can do</h2>

<p><abbr title="Artificial intelligence">AI</abbr> already plays a big role in our everyday lives by providing recommendations, information, answers to questions and help with organizing our schedules. Applications like search engines, online shopping and voice assistants on mobile devices or smart speakers create data and feedback for machine learning tools to learn and improve from.</p>

<p>While <abbr title="Artificial intelligence">AI</abbr> is commonly used as a digital assistant, it can also be used to enhance your organization’s operations. <abbr title="Artificial intelligence">AI</abbr> can create code, develop procedural steps, optimize workflows and provide metadata and advanced analysis as a cyber security tool. Its availability and capabilities continue to grow and are becoming an increasingly vital component of cyber security.</p>

<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) have evaluated some security related <abbr title="Artificial intelligence">AI</abbr> use cases and determined they hold no safety-impacting concerns. Some of these use cases include:</p>

<ul><li>automated detection of personally identifiable information in cyber security data</li>
	<li>confidence scoring for cyber security threat indicators</li>
	<li>malware reverse engineering</li>
	<li>detection of anomalies in critical infrastructure networks</li>
	<li>detection of anomalies in security operations centre networks</li>
	<li>drafting tailored summaries of medical documents for different publication channels</li>
	<li>chat tools for interacting with, summarizing and searching agency materials and internal content</li>
</ul><p><abbr title="Cybersecurity and Infrastructure Security Agency">CISA</abbr> is continuing to explore new ways to integrate <abbr title="Artificial intelligence">AI</abbr> tools to improve efficiency and strengthen cyber security. For more details, read <a href="https://www.cisa.gov/ai/cisa-use-cases"><abbr title="Cybersecurity and Infrastructure Security Agency">CISA</abbr> Artificial Intelligence Use Cases</a>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="what-cant">What <abbr title="Artificial intelligence">AI</abbr> can’t do</h2>

<p><abbr title="Artificial intelligence">AI</abbr> still faces certain fundamental limitations. For example, it can be quite difficult for <abbr title="Artificial intelligence">AI</abbr> to use intuition or common sense, adapt to different situations and understand cause and effect. Humans, with their judgement and insight, can handle situations that require more intuitive problem-solving and decision-making skills.</p>

<h2 class="text-info" id="organizations">How organizations use <abbr title="Artificial intelligence">AI</abbr></h2>

<p>Organizations use <abbr title="Artificial intelligence">AI</abbr> in a variety of ways to enhance their processes and reduce costs. Some common ways <abbr title="Artificial intelligence">AI</abbr> is used include:</p>

<h3>Facial recognition</h3>

<p>A leading application of <abbr title="Artificial intelligence">AI</abbr> that looks at facial features in an image or video to identify or verify the individual.</p>

<h3>Process optimization</h3>

<p>A properly trained machine learning tool, for example, learning from accurate data, can use the data to give more accurate solutions and perform mundane tasks faster than a human can.</p>

<h3>Digital assistants</h3>

<p>Chat or voice bots can improve customer service and reduce support costs. Customers can receive help within seconds at any time. These services are often highly personalized and can be based on a user’s preferences and history with the organization.</p>

<h3>Fraud detection</h3>

<p>Sophisticated machine learning tools can detect fraudulent emails faster than a human can. These tools sort through your inbox and move spam and phishing emails to your junk folder.</p>

<h3>Document generation</h3>

<p>Software applications use <abbr title="Artificial intelligence">AI</abbr>-powered tools to create well-structured documents. The application uses user prompts to generate formatted documentation.</p>

<h3>Coding</h3>

<p><abbr title="Artificial intelligence">AI</abbr> uses natural language prompts to automatically generate code, functions and development tasks to increase productivity and streamline data. <abbr title="Artificial intelligence">AI</abbr> can analyze and offer improvements on existing code to debug and enhance performance.</p>

<h3>Data analysis</h3>

<p>Using machine learning algorithms, <abbr title="Artificial intelligence">AI</abbr> can analyze large amounts of data and discover new patterns. This is known as automation and greatly reduces the processing time spent by a data analyst and improves business performance.</p>

<p>Several industries use <abbr title="Artificial intelligence">AI</abbr>-powered tools to enhance their processes and offer further insight with continuously advancing areas of technology. Some of these industries include:</p>

<h4>Healthcare</h4>

<p>In the medical industry, <abbr title="Artificial intelligence">AI</abbr> can help in patient diagnosis and treatment in many ways, for example, through computer-aided diagnostic systems. Machine learning in precision medicine is another highly useful tool and can help predict which treatments are most likely to be successful.</p>

<h4>Advertising</h4>

<p><abbr title="Artificial intelligence">AI</abbr> helps advertising agencies create, optimize and personalize ad campaigns by analyzing user data and delivering content that would appeal to specific audiences. <abbr title="Artificial intelligence">AI</abbr> reduces the time and cost associated with production through its ability to generate text, images and video content.</p>

<h4>Cyber security</h4>

<p><abbr title="Artificial intelligence">AI</abbr> is useful in detecting new threats to organizations through automation. By using sophisticated algorithms, <abbr title="Artificial intelligence">AI</abbr> can:</p>

<ul><li>automate detection of threats such as malware</li>
	<li>run pattern recognition to find relationships between different attack vectors</li>
	<li>provide superior predictive intelligence</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div> </div>

<h2 class="text-info" id="threats">The threats involved with <abbr title="Artificial intelligence">AI</abbr> tools</h2>

<p><abbr title="Artificial intelligence">AI</abbr> tools are often only as good as the data model they rely upon. The main threats to <abbr title="Artificial intelligence">AI</abbr> come from compromises to its data. Common methods of compromise include:</p>

<h3>Data poisoning attack</h3>

<p>This type of attack occurs during a machine learning tool’s training phase. <abbr title="Artificial intelligence">AI</abbr> tools rely heavily on accurate data for training. When poisoned (inaccurate) data is injected into the training dataset, the learning system may be taught to make mistakes.</p>

<h3>Adversarial example</h3>

<p>This type of attack occurs after the machine learning tool is trained. The tool is fooled into classifying inputs incorrectly. For example, in the case of autonomous vehicles, an adversarial example could be a slight modification of traffic signs in the physical world (like subtle fading or stickers applied to a stop sign). The modification causes the vehicle’s <abbr title="Artificial intelligence">AI</abbr> system to misclassify a stop sign as a speed-limit sign. This could seriously impact the safe operation of self-driving vehicles.</p>

<h3>Model inversion and membership inference attacks</h3>

<p>These scenarios occur when a threat actor queries your organization’s data model. A model inversion attack will reveal the underlying dataset, allowing the threat actor to reproduce the training data. A membership inference attack confirms if a specific data file is part of the training data. Both model inversion and membership inference attacks could compromise the confidentiality and privacy of your training data and expose sensitive information.</p>

<h2 class="text-info" id="actors">How threat actors use <abbr title="Artificial intelligence">AI</abbr></h2>

<p>Alongside organizations using <abbr title="Artificial intelligence">AI</abbr>-powered technologies to enhance their business processes, threat actors also use <abbr title="Artificial intelligence">AI</abbr> to enhance their cyber attack methods. Some <abbr title="Artificial intelligence">AI</abbr>-related attacks can include:</p>

<ul><li>using deepfakes to impersonate authority figures</li>
	<li>impersonating legitimate websites</li>
	<li>altering source code for malware to lower detection rates</li>
	<li>processing public imagery and videos to geolocate facilities and identify industrial control systems to analyze and target equipment and connected systems</li>
</ul><h2 class="text-info" id="what-else">What else you should know about <abbr title="Artificial intelligence">AI</abbr></h2>

<p><abbr title="Artificial intelligence">AI</abbr> is continuously evolving with new tools and enhanced features. Some other information you should know about <abbr title="Artificial intelligence">AI</abbr> include:</p>

<ul><li><abbr title="Artificial intelligence">AI</abbr> can detect patterns in data</li>
	<li><abbr title="Artificial intelligence">AI</abbr> needs enough data to see the patterns at a high enough frequency or resolution</li>
	<li><abbr title="Artificial intelligence">AI</abbr> will have a narrow scope if the data is not diverse</li>
	<li><abbr title="Artificial intelligence">AI</abbr> will provide unreliable results if the training data used is not accurate</li>
	<li>data used for training should be complete, diverse and accurate</li>
	<li>missing data may result in some patterns not being discovered, and the patterns that are found might not be accurate</li>
	<li>data that is recorded and collected for quality-control purposes can contain both sensitive and personal information</li>
</ul><p>Many organizations are now using trustworthy <abbr title="Artificial intelligence">AI</abbr> policies to ensure that their use of <abbr title="Artificial intelligence">AI</abbr> tools minimize potential biases and unintended consequences, especially regarding the treatment of individuals. Policies may also assist in the development of appropriate protocols for the handling of sensitive and personal information. An example of an <abbr title="Artificial intelligence">AI</abbr> policy is the Government of Canada’s recently adopted <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32592">Directive on Automated Decision-Making</a>. If your organization intends to deploy <abbr title="Artificial intelligence">AI</abbr>, it should consider seeking legal advice to manage the many ethical, privacy, policy, and legal considerations that come from using <abbr title="Artificial intelligence">AI</abbr>.</p>

<h2 class="text-info" id="learn-more">Learn more</h2>

<ul><li><a href="/en/guidance/generative-artificial-intelligence-ai-itsap00041">Generative artificial intelligence (ITSAP.00.041)</a></li>
	<li><a href="/en/guidance/security-considerations-voice-activated-digital-assistants-itsap70013">Security considerations for voice-activated digital assistants (ITSAP.70.013)</a></li>
	<li><a href="/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware (ITSAP.00.057)</a></li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-cyber-security-advisory-pro-russia-hacktivists-conducting-opportunistic-attacks-global-critical-infrastructure</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-cyber-security-advisory-pro-russia-hacktivists-conducting-opportunistic-attacks-global-critical-infrastructure"/><title><![CDATA[Joint cyber security advisory on pro-Russia hacktivists conducting opportunistic attacks on global critical infrastructure]]></title><updated>2025-12-09T21:23:40Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6536" about="/en/news-events/joint-cyber-security-advisory-pro-russia-hacktivists-conducting-opportunistic-attacks-global-critical-infrastructure" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States' Federal Bureau of Investigation (FBI) and other domestic and international partners in issuing a joint advisory on pro-Russia hacktivist attacks.</p>

<p>This joint advisory highlights the unsophisticated and opportunistic tactics, techniques and procedures (TTPs) used by pro-Russia hacktivist groups to target critical infrastructure (CI) globally. These attacks target minimally secured, Internet-facing virtual network computing (VNC) connections to infiltrate (or gain access to) operational technology (OT) control devices within <abbr title="critical infrastructure">CI</abbr> systems.</p>

<p><abbr title="operational technology">OT</abbr> owners and operators and <abbr title="critical infrastructure">CI</abbr> entities should implement the following recommendations to reduce the risk of pro-Russia hacktivists targeting control networks through <abbr title="virtual network computing">VNC</abbr> connections:</p>

<ul><li>Reduce exposure of <abbr title="operational technology">OT</abbr> assets to the public-facing Internet</li>
	<li>Implement network segmentation between <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> networks</li>
	<li>Adopt mature asset management processes, including mapping data flows and access points</li>
	<li>Ensure that <abbr title="operational technology">OT</abbr> assets are using robust authentication procedures  </li>
	<li>Enable control system security features that can separate and audit view and control functions</li>
	<li>Collect and monitor <abbr title="operational technology">OT</abbr> asset and networking device traffic</li>
	<li>Review configurations for setpoint ranges or tag values to stay within safe ranges and set up alerts for deviations</li>
	<li>Implement and practice business recovery and disaster recovery plans</li>
</ul><p>This joint advisory updates <abbr title="Cybersecurity and Infrastructure Security Agency">CISA</abbr>'s joint fact sheet <a href="https://www.cisa.gov/resources-tools/resources/primary-mitigations-reduce-cyber-threats-operational-technology">Primary mitigations to reduce cyber threats to operational technology</a>.</p>

<p>Read the full joint advisory: <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a">Pro-Russia hacktivists conduct opportunistic attacks against US and global critical infrastructure</a>.</p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/ransomware</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/ransomware"/><title><![CDATA[Ransomware]]></title><updated>2025-12-09T15:47:29Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="557" about="/en/guidance/ransomware" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="col-md-12 row">
<p class="mrgn-tp-lg">Ransomware is the most common cyber threat Canadians face and it is on the rise.</p>

<p>During a ransomware attack, cybercriminals use malicious software to encrypt, steal, or delete data, then demand a ransom payment to restore it.</p>

<p>Ransomware can have severe impacts including core business downtime, permanent data loss, intellectual property theft, privacy breaches, reputational damage and expensive recovery costs.</p>

<p>Basic cyber security practices would prevent the vast majority of ransomware incidents in Canada.</p>

<p>This page offers resources from the Cyber Centre to help Canadians and Canadian organizations understand the ransomware threat and take action to protect themselves.</p>
</div>
<!-- TOGGLE Expand | collapse EN-->

<div class="btn-group mrgn-tp-sm mrgn-bttm-md"><button class="btn btn-primary wb-toggle" data-toggle="{&quot;selector&quot;: &quot;details&quot;, &quot;print&quot;: &quot;on&quot;, &quot;stateOn&quot;: &quot;on&quot;, &quot;stateOff&quot;: &quot;off&quot;, &quot;parent&quot;: &quot;#expands-collapse&quot;}" type="button">Expand | collapse all</button></div>
<!-- END TOGGLE Expand | collapse-->

<div class="mrgn-tp-md" id="expands-collapse"><!--<div class="col-md-12 mrgn-tp-md">-->
<details><summary><h2 class="h3">Reports</h2>
</summary><ul><li><a href="/en/guidance/cyber-threat-bulletin-ransomware-threat-2021">The Ransomware threat in 2021 </a></li>
	<li><a href="/en/guidance/cyber-threat-bulletin-modern-ransomware-and-its-evolution">Modern ransomware and its evolution 2020</a></li>
	<li><a href="/en/guidance/national-cyber-threat-assessment-2020">National Cyber Threat Assessment 2020</a></li>
</ul></details><details><summary><h2 class="h3" id="contigroup">Ransomware case study: the Conti group</h2>
</summary><div class="row">
<div class="col-md-12">
<p>This case study describes the typical methods of the Conti ransomware group, one the most prolific cybercriminal groups in operation.</p>

<p>Even by ransomware standards, Conti is regarded as one of the most ruthless and damaging gangs, frequently targeting hospitals, medical networks and other critical services.</p>

<p>In a typical attack Conti actors steal, encrypt and/or delete files. They also threaten to leak sensitive data if the ransom is not paid, a tactic known as “double extortion.”</p>

<p>A typical Conti ransomware attack takes place in four stages: reconnaissance, intrusion, infection and impact.</p>
</div>
</div>

<div class="row">
<div class="panel panel-default col-md-offset-2 col-md-8 mrgn-tp-md  ">
<div class="panel-body">
<figure class="img-responsive mrgn-bttm-md"><img alt="Long description follows" class="img-responsive " src="/sites/default/files/cyber/conti-stage1-reconnaissance-e.jpg" /></figure><details><summary>Long description - Stage 1: Reconnaissance </summary><p>Conti actors <strong>gather information</strong> to identify high-value targets such as hospitals and other organizations that provide essential services or hold sensitive data. They use Internet searches, system scans and information shared on the Dark Web, such as stolen passwords or login credentials. Conti actors continue to gather information throughout the attack cycle to leverage greater ransoms and to ensure payment is not withheld. <sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup></p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="panel panel-default col-md-offset-2 col-md-8 ">
<div class="panel-body">
<figure class="img-responsive center-block mrgn-bttm-md"><img alt="Long description follows" class="img-responsive" src="/sites/default/files/cyber/conti-stage2-intrusion-e.jpg" /></figure><details><summary>Long description - Stage 2: Intrusion </summary><p>Conti actors typically <strong>gain illicit access</strong> to the victim’s system either through stolen credentials or through spear phishing emails containing malicious attachments or links. Unlike generic phishing attempts, spear phishing emails are personalized to the recipient, making them more convincing.</p>

<p>Often the malicious attachment appears to be a regular file type, such as Word, Excel or PDF, but when the victim opens it, malware, such as TrickBot, IcedID, or BazarLoader, downloads and executes on their device.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="panel panel-default col-md-offset-2 col-md-8 ">
<div class="panel-body">
<figure class="img-responsive center-block mrgn-bttm-md"><img alt="Long description follows" class="img-responsive" src="/sites/default/files/cyber/conti-stage3-infection-e.jpg" /></figure><details><summary>Long description - Stage 3: Infection </summary><p>Once the first device is infected with malware, Conti actors will often install Cobalt Strike software as a command and control (C2) mechanism to coordinate the next phase of the attack.</p>

<p>They exploit unpatched vulnerabilities and often use tools already available on the victim network to gain persistent access.</p>

<p>They use remote execution software (such as PSExec and Remote Desktop Protocol) to move laterally across the victim network, obtaining credentials and escalating privileges without triggering anti-virus software.</p>

<p>This process allows them to <strong>spread the infection</strong> to all connected devices on the network.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="panel panel-default  col-md-offset-2 col-md-8 ">
<div class="panel-body">
<figure class="img-responsive mrgn-bttm-md"><img alt="Long description follows" class="img-responsive" src="/sites/default/files/cyber/conti-stage4-impact-e.jpg" /></figure><details><summary>Long description - Stage 4: Impact </summary><p>At this point, the Conti actors deploy the ransomware, exfiltrating (stealing), deleting or encrypting the victim's sensitive data.</p>

<p>They employ a double extortion technique in which they <strong>demand a ransom</strong> to restore the encrypted data, while threatening to leak it publicly if the ransom is not paid. They may in fact have already deleted the data, but the victim does not know that.</p>
</details></div>
</div>
</div>

<div class="clearfix"> </div>

<div class="row">
<div class="col-md-12">
<h2 class="h3">Facts and figures</h2>

<p>Since January 2020 Conti has leaked several hundred gigabytes of data stolen in over 450 cyber attacks against Canadian and international organisations.<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup> This is based on information from Conti’s own “Ransomware Leak Site”. We assume that many more victims have paid ransom without having their data published online.</p>

<p>Conti has publicly claimed to have compromised and stolen data from at least 24 Canadian victims so far in 2021. More than half of those belonged to the machinery, professional services, real estate, and specialty retail sectors.</p>

<p>As of September 2021, the Conti group’s average ransom payment is $373,902 USD. <sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup></p>

<h2>Conclusion</h2>

<p>The Conti group is one of the most sophisticated ransomware groups in operation. However, at every step of this process, there are cyber security tools and practices that can prevent or mitigate the impact of ransomware attacks.</p>

<p>You can find further resources on ransomware, including how to defend against it, on the Cyber Centre’s dedicated <a href="/en/ransomware">ransomware</a> page.</p>
</div>
</div>

<aside class="wb-fnote" role="note"><h2 id="fn">Footnotes</h2>

<dl><dt>1</dt>
	<dd id="fn1">
	<p>“<a href="https://www.bleepingcomputer.com/news/security/translated-conti-ransomware-playbook-gives-insight-into-attacks" rel="external">Translated Conti ransomware playbook gives insight into attacks</a>,” Bleeping Computer, 2 September 2021.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote </span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>2</dt>
	<dd id="fn2">
	<p><a href="https://news.sophos.com/en-us/2021/02/16/what-to-expect-when-youve-been-hit-with-conti-ransomware" rel="external">For the amount of data typically stolen</a></p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote </span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>3</dt>
	<dd id="fn3">
	<p>“<a href="https://www.coveware.com/conti-ransomware" rel="external">Conti Ransomware Recovery, Payment &amp; Decryption Statistics,</a>” Coveware, September 2021</p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote </span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></details><details><summary><h2 class="h3">Guidance for organizations</h2>
</summary><ul><li><a href="/en/guidance/ransomware-playbook-itsm00099">Ransomware Playbook</a></li>
	<li><a href="/en/guidance/ransomware-how-prevent-and-recover-itsap00099">Ransomware: How to prevent and recover</a></li>
	<li><a href="/en/guidance/have-you-been-victim-cybercrime">Have you been a victim of cybercrime?</a></li>
	<li><a href="/en/guidance/spotting-malicious-email-messages-itsap00100">Spotting malicious email messages</a></li>
	<li><a href="/en/guidance/top-measures-enhance-cyber-security-small-and-medium-organizations-itsap10035">Top measures to enhance cyber security for small and medium organizations</a></li>
</ul></details><details><summary><h2 class="h3">Guidance for all Canadians</h2>
</summary><ul><li><a href="/en/ransomware-dont-get-locked-out">Ransomware: Don’t get locked out</a></li>
	<li><a href="/en/ransomware-how-recover-and-get-back-track">Ransomware: How to recover and get back on track</a></li>
	<li><a href="/en/guidance/best-practices-passphrases-and-passwords-itsap30032">Best practices for passphrases and passwords</a></li>
	<li><a href="/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks">Don’t take the bait: recognize and avoid phishing attacks</a></li>
	<li><a href="/en/guidance/five-practical-ways-make-yourself-cybersafe">Five practical ways to make yourself cybersafe</a></li>
</ul></details><details><summary><h2 class="h3">Additional resources</h2>
</summary><ul><li><a href="/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations">Baseline cyber security controls for small and medium organizations</a></li>
	<li><a href="/en/guidance/cyber-security-home-and-office-secure-your-devices-computers-and-networks-itsap00007">Cyber security at home and in the office - secure your devices, computers, and networks (ITSAP.10.00.007)</a></li>
	<li><a href="/en/guidance/cyber-security-considerations-consumers-managed-services-itsm50030">Cyber security considerations for consumers of managed services (ITSM.50.030)</a></li>
	<li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan (ITSAP.40.003)</a></li>
	<li><a href="/en/guidance/developing-your-it-recovery-plan-itsap40004">Developing your IT recovery plan (ITSAP.40.004)</a></li>
	<li><a href="/en/guidance/itsp50104-guidance-defence-depth-cloud-based-services">Guidance on Defence in Depth for Cloud-Based Services (ITSP.50.104)</a></li>
	<li><a href="/en/guidance/have-you-been-hacked-itsap00015">Have you been hacked? (ITSAP.00.015)</a></li>
	<li><a href="/en/guidance/how-updates-secure-your-device-itsap10096">How updates secure your device (ITSAP.10.096)</a></li>
	<li><a href="/en/guidance/internet-things-security-small-and-medium-organizations-itsap00012">Internet of Things Security for Small and Medium Organizations (ITSAP.00.012)</a></li>
	<li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Offer tailored cyber security training to your employees (ITSAP.10.093)</a></li>
	<li><a href="/en/guidance/preventative-security-tools-itsap00058">Preventative security tools (ITSAP.00.058)</a></li>
	<li><a href="/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware (ITSAP.00.057)</a></li>
	<li><a href="/en/guidance/protecting-your-organization-while-using-wi-fi-itsap80009">Protecting your organization when using Wi-Fi (ITSAP.80.009)</a></li>
	<li><a href="/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)</a></li>
	<li><a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002)</a></li>
	<li><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 IT security actions to protect Internet connected networks and information (ITSM.10.089)</a></li>
</ul></details><div class="well mrgn-tp-md row">
<div class="col-md-6 col-xs-12">
<h2 class="mrgn-tp-sm">Report a cyber incident</h2>

<div class="col-md-2 pull-left mrgn-lft-0 hidden-sm hidden-xs "><img alt="" class="img-responsive pull-left mrgn-lft-0" src="/sites/default/files/cyber/icons/cccs-icon-colour-0285.png" /></div>

<div class="col-md-10 col-sm-12 col-xs-12 row">
<p><a href="/en/incident-management">Reporting a cyber incident</a> helps the Cyber Centre keep Canada and Canadians safe online. Your information will enable us to provide cyber security advice, guidance and services.</p>
</div>
</div>

<div class="col-md-6 col-xs-12">
<h2 class="mrgn-tp-sm">Get Cyber Safe</h2>

<p class="mrgn-tp-md"><a href="https://www.getcybersafe.gc.ca/en">Get Cyber Safe</a> is a national public awareness campaign created to inform Canadians about cyber security and the simple steps they can take to protect themselves online.</p>

<div class="col-md-7"><img alt="" class="img-responsive" src="/sites/default/files/cyber/gcs-logo_color_en.png" /></div>
</div>

<div class="clearfix"> </div>
</div>
</div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-malware-analysis-report-brickstorm-backdoor</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-malware-analysis-report-brickstorm-backdoor"/><title><![CDATA[Joint malware analysis report on Brickstorm backdoor]]></title><updated>2025-12-04T20:19:45Z</updated><summary><![CDATA[This joint report warns that People’s Republic of China (PRC) state-sponsored threat actors are using Brickstorm malware for long-term persistence on victims’ systems.]]></summary><content><![CDATA[<article data-history-node-id="7058" about="/en/news-events/joint-malware-analysis-report-brickstorm-backdoor" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States’ Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) in releasing a Brickstorm malware analysis report.</p>

<p>This joint report warns that People’s Republic of China (PRC) state-sponsored threat actors are using Brickstorm malware for long-term persistence on victims’ systems. This activity has been primarily observed on government services and facilities and information technology sector organizations. The report also provides indicators of compromise (IoCs) and detection signatures based off analysis of Brickstorm samples.</p>

<p>Brickstorm malware is a sophisticated backdoor for Linux, specifically VMware vCenter servers, VMKernel (VMware ESXI), and Windows environments. <abbr title="People’s Republic of China">PRC</abbr> state-sponsored threat actors have been observed targeting VMware vSphere platforms. Once compromised, the actors can use their access to vCenter to steal cloned virtual machine (VM) snapshots for credential extraction and create rogue <abbr title="virtual machine">VM</abbr>s hidden from the vCenter management console.</p>

<p>We urge organizations to use the <abbr title="indicators of compromise">IoC</abbr>s and detection signatures in this malware analysis report to identify Brickstorm malware samples.</p>

<p>Read the full joint publication: <a href="https://www.cisa.gov/news-events/analysis-reports/ar25-338a">Malware analysis report – Brickstorm Backdoor</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/public-content-provenance-organizations-using-content-provenance-improve-audience-trust-organizations-information-online-itsp10005</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/public-content-provenance-organizations-using-content-provenance-improve-audience-trust-organizations-information-online-itsp10005"/><title><![CDATA[Public content provenance for organizations (ITSP.10.005)]]></title><updated>2025-12-04T15:09:56Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6947" about="/en/guidance/public-content-provenance-organizations-using-content-provenance-improve-audience-trust-organizations-information-online-itsp10005" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row"><!--Info across the top under the image-->
<div class="col-md-4 col-sm-12 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>December 2025</strong></p>
</div>

<div class="col-md-4 col-sm-12 hidden-xs hidden-sm">
<p class="text-center"><strong>Practitioner series</strong></p>
</div>

<div class="col-md-4 col-sm-12 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSP.10.005</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>December 2025 | Practitioner series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsp10005-public-content-provenance-organizations-e.pdf">Public content provenance for organizations - ITSP.10.005 (PDF, 1.0 Mb)</a></p>
</div>

<section><h2 class="mrgn-tp-xl text-info">Overview</h2>

<p>This publication is intended for security and public communications practitioners. It lays the foundation in explaining what public content provenance is and why it's an important tool for organizations to establish a verifiable historical record of the content they make available online. It provides information about the range of technologies which help to establish trust in digital records along with examples of how they might be used to meet different requirements.</p>

<p>This publication has been jointly researched and co-authored by the Canadian Centre for Cyber Security (Cyber Centre) and the United Kingdom’s National Cyber Security Centre (NCSC). The Cyber Centre and the <abbr title="United Kingdom’s National Cyber Security Centre">NCSC</abbr> do not directly endorse the products, services or methodologies in this publication. The tools and standards described are a means to demonstrate how to improve cyber resilience in different contexts using combinations of technologies.</p>
</section></div>
</div>

<section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled mrgn-tp-lg"><li><a href="#public-content-provenance">1. Securing trust in digital content: Why public content provenance matters</a></li>
	<li><a href="#securing-digital-trust">2. The challenge of securing digital trust in today’s complex information environment</a>
	<ul><li><a href="#provenance-explained">2.1 Digital content provenance explained</a></li>
		<li><a href="#provenance-analogy">2.2 Digital content provenance analogy</a></li>
		<li><a href="#digital-content-trust">2.3 How to earn trust in digital content</a></li>
		<li><a href="#public-trust-organisation">2.4 How digital content provenance helps enhance public trust in an organization</a></li>
	</ul></li>
	<li><a href="#suitable-systems-technologies">3. Provenance: Selecting suitable systems and technologies</a>
	<ul><li><a href="#consider-provenance-systems">3.1 What to consider when selecting provenance systems</a></li>
		<li><a href="#consider-provenance-technologies">3.2 What to consider when selecting content provenance technologies</a></li>
		<li><a href="#not-sutible-public">3.3 Why private provenance systems aren’t suitable for public content</a></li>
	</ul></li>
	<li><a href="#depolying-considerations-usecase">4. Deploying public content provenance systems: Considerations and example use cases</a>
	<ul><li><a href="#points-orgs-consider">4.1 Points for organizations to consider</a></li>
		<li><a href="#usecase">4.2 Example use cases</a></li>
	</ul></li>
	<li><a href="#next-steps">5. Next steps</a></li>
</ul></details></section><section><h2 id="public-content-provenance text-info">1. Securing trust in digital content: Why public content provenance matters</h2>

<p>In today's digital age, information on the Internet cannot be relied on consistently as a source of truth. The rapid rise in the volume of available information and the accelerated pace of content generation, particularly through Artificial Intelligence (AI), mean the Internet has become a battleground for interference and malicious cyber activities.</p>

<p>In this environment, organizations are finding it increasingly challenging to ensure the authenticity and integrity of their information. As such, they must rethink how they establish and maintain trust with their audiences. As highlighted in the <abbr title="United Kingdom’s National Cyber Security Centre">NCSC</abbr>’s <a href="https://www.ncsc.gov.uk/report/impact-ai-cyber-threat-now-2027">Impact of AI on cyber threat from now to 2027</a> and the Cyber Centre’s <a href="/en/guidance/cyber-threats-canadas-democratic-process-2025-update">Cyber threats to Canada’s democratic process: 2025 update</a>, AI-enabled capabilities continue to proliferate to cyber criminals. States are beginning to integrate AI-enabled technologies into their cyber capabilities. Organizations will therefore need tools to improve their resilience and security to protect the integrity of data and information. A cornerstone of these efforts is the establishment of provenance for digital content.</p>

<p>Provenance refers to the place of origin. It is used in the physical world to verify the authenticity of artefacts, but it is also relevant in the online world. Many organizations already employ versioning and logging systems to establish provenance for internal documents. However, these systems are often useful only within the organization. To build stronger trust with external audiences, organizations need to improve how they address the public provenance of their information</p>
</section><section><h2 id="securing-digital-trust text-info">2. The challenge of securing digital trust in today’s complex information environment</h2>

<p>Today’s information environment comprises a wide variety of forms of communication, ranging from traditional media and social media to telephone conversations and even signs on lampposts. This makes it easy to access large amounts of information quickly. Different processes within this environment collect and reorganize data and metadata to meet the needs of various groups such as information seekers, publishers and advertisers. Additionally, social media platforms enable widespread republishing and the option to add commentary.</p>

<p>Although the information environment benefits both content creators and consumers, it also presents challenges. An original piece of content may be collected, reorganized, summarized, aggregated, reformatted, republished and modified throughout its lifecycle. Modifications may be made deliberately or otherwise, and with or without intent to deceive. These modifications can be difficult to detect as the information rarely persists in its original form. This means we cannot be certain that the intended meaning of the content is retained. Or worse, that it has been distorted.</p>

<p>For security practitioners, protecting information in this environment poses significant challenges. They have traditionally focused on protecting the confidentiality, integrity and availability of digital data directly controlled by the organization but now must also focus on protecting publicly available information about their content, which is outside of their control. To address this, organizations can use public trust mechanisms to verify the source and history of content.</p>

<div class="col-md-8 col-sm-offset-2">
<div class="panel panel-default">
<h3 class="mrgn-lft-md text-center">Figure 1: Communicating an organization’s information in the information environment</h3>

<div class="panel-body">
<figure><img alt="Figure 1 - Long description immediately follows" class="img-responsive mrgn-bttm-md" src="/sites/default/files/images/communicating-organisations-information-infoenvironment-e-745x500.jpg" /></figure><details><summary>Long description - Figure 1: Communicating an organization’s information in the information environment</summary><p>To communicate with the public, organizations share their information in the information environment. This environment comprises all forms of communication between the organization and the public audience and can include social media, content aggregation sites, web search services, traditional media such as radio and television, as well as others. Other parties can add to the communications with their own content in the form of comments, selective filtering and so on. The overall message that a member of the public audience receives or accesses may not be what is intended by the originating party. It may not even be accurate.</p>
</details></div>
</div>
</div>
<span class="clearfix"></span>

<div><!-- 2.1 -->
<h3 id="provenance-explained text-info">2.1 Digital content provenance explained</h3>

<p>The term provenance is defined as the “place of origin” and is used as a guide to the authenticity and quality of a given artefact. It is traditionally used in the context of art and history. In digital environments the concept can be applied in many ways to deal with specific challenges in domains such as Internet content history, supply chain integrity, data management, software certification, scientific process management, financial transactions tracking as well as legal chain of custody management. Each has its own unique requirements.</p>

<p>The focus of this publication is public content provenance. Content provenance provides factual information about the history of digital content without making assertions about the value or truth of the content itself. Decisions on the veracity of the content are left to the consumer, but additional verifiable information is provided to aid them in making a final determination. Content provenance can provide different types of verifiable information including, but not limited to the following:</p>

<ul><li>individual or entity making a claim about the content</li>
	<li>date and time of a claim</li>
	<li>image against its verified thumbnail</li>
	<li>claims such as location, device or edits made with software</li>
	<li>statements about whether the work is creative or AI-generated</li>
	<li>assignment of rights to others (for example, via Creative Commons or other public copyright licenses)</li>
</ul><p>By clearly establishing the facts about the history of its public digital content, such as its origin, authenticity and quality, organizations can build better trust with their audiences, customers and stakeholders.</p>
</div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div>
<h3 id="provenance-analogy">2.2 Digital content provenance analogy</h3>

<p>A good analogy for provenance is that of a <strong>notary</strong>. Many legal systems employ the concept of a notary to witness signatures as part of legal proceedings. The notary is a trusted third-party who performs the witness activity in a way that is acceptable for legal requirements.</p>

<p>Members of the public who need documentation for legal requirements visit the notary, who confirms their identity and ensures they are signing willingly. The notary then attests to the content of their documentation, as well as the date and time the attestation was done. This attestation involves a formal declaration that the document is genuine and the signatures are valid. Notarized documents are legally recognized and can be used as evidence in court.</p>

<p>In a similar way, digital content owners use an attestation service to verify the details of the content, such as hash or thumbnail image, and establish verifiable evidence such as the location, time, and the notary details. This is done using cryptographic methods rather than paper documents.</p>

<p>Additionally, just as notaries maintain a ledger of all notarised documents, attestation services can record their attestation transactions as part of their service. The basic public notary function is illustrated in figure 2 below.</p>

<div class="col-md-8 col-sm-offset-2">
<div class="panel panel-default">
<h3 class="mrgn-lft-md text-center">Figure 2: Notary function as analogy for public provenance</h3>

<div class="panel-body">
<figure><img alt="Figure 2 - Long description immediately follows" class="img-responsive mrgn-bttm-md" src="/sites/default/files/images/notary-function-analogy-public-provenance-e-500x700.jpg" /></figure><details><summary>Long description -Figure 2: Notary function as analogy for public provenance</summary><p>The notary function serves as an analogy for public provenance. Many jurisdictions employ notaries to act as third-party validators of documents to be used for legal purposes. The requester submits their documents to the notary and indicates their claims. The notary validates the documents as well as the claims and provides a formal record of attestation such as a stamp or document to the requester. The notary records their actions with the requester in a record register. The requester can provide the notary’s record of attestation to any verifier. The verifier, commonly the court, can also check with the notary to validate that the attestation was done. They can also check with the legal professional association as to whether the notary is licenced to perform the notary function.</p>
</details></div>
</div>
</div>
<span class="clearfix"></span></div>

<div><!-- 2.3 -->
<h3 id="digital-content-trust">2.3 How to earn trust in digital content</h3>

<p>To establish why organizations need to consider public provenance, it is useful to understand the broader digital trust context. The issue of trust on the Internet is not new, and it was an integral part of the development of e-commerce.</p>

<p>A major objective for organizations is to establish trust with their audience, customers or stakeholders.</p>

<p>The World Economic Forum’s 2022 report describes the following 8 dimensions of trust for digital technology. These factors are important for information assurance more broadly.</p>

<ul><li><strong>Cyber security:</strong> mitigating the risks of both malicious and accidental uses of technology</li>
	<li><strong>Safety:</strong> preventing harm (for example, emotional, physical or psychological) to people or society from technology uses and data processing</li>
	<li><strong>Transparency:</strong> establishing visibility and clarity around digital operations and uses</li>
	<li><strong>Interoperability:</strong> ensuring information systems can connect and exchange information for mutual use without undue burden or restriction</li>
	<li><strong>Auditability:</strong> ensuring that organizations and third parties are able to review and confirm the activities and results of technology, data processing and governance processes</li>
	<li><strong>Redressability:</strong> providing the possibility of obtaining recourse where individuals, groups or entities have been negatively affected by technological processes, systems or data uses</li>
	<li><strong>Fairness:</strong> ensuring that an organization’s technology and data processing considers the potential for disparate impact and aims to achieve just and equitable outcomes for all stakeholders, given the relevant circumstances and expectations</li>
	<li><strong>Privacy:</strong> ensuring that individuals have control over the confidentiality of their personal or personally identifiable information</li>
</ul><p>Most organizations today address these 8 dimensions to some degree, but digital trust requirements are evolving as the Internet matures. These requirements are also driven by changes in how people behave on the Internet and advances in AI.</p>
</div>

<div><!-- 2.4 -->
<h3 id="public-trust-organisation">2.4 How digital content provenance helps enhance public trust in an organization</h3>

<p>Content provenance can help to address and enhance the digital trust in an organization in a number of the above 8 dimensions, including the following:</p>

<ul><li><strong>Cyber security:</strong> It helps verify that content is sourced from legitimate and secure origins, which reduces the risk of malicious content. It also helps with maintaining immutable records of content creation and modification to prevent unauthorized alterations.</li>
	<li><strong>Safety</strong>: It can reduce the impact of inaccurate information about individuals and organizations. The verifiable provenance record can aid in refuting inaccurate online information.</li>
	<li><strong>Transparency</strong>: It establishes verifiable metadata about the content itself. This metadata helps establish a content item's history, including creation and handling. The public availability of this information makes the content and related processes more transparent.</li>
	<li><strong>Auditability</strong>: It establishes a digital content record as well as the means to verify it. This can be used in auditing programs.</li>
	<li><strong>Fairness</strong>: It establishes a formal verifiable record of information about content. This can include information about the creator, ownership, and rights for digital content. This verifiable information can be used to adjudicate any issues around content rights and validity.</li>
</ul><p>Content provenance provides the public with a means of assessing the accuracy of content created by or related to an organization. This can enhance the trust the public has in an organization.</p>
</div>
</section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<section><h2 id="suitable-systems-technologies text-info">3. Provenance: Selecting suitable systems and technologies</h2>

<p>The subject of content provenance isn't entirely new but advances in technologies, such as generative AI, are driving requirements for it to evolve even faster.</p>

<p>Frameworks which offer ways of structuring provenance systems are still being established.</p>

<p>There are multiple facets to the provenance challenge which will require different approaches. One approach may not necessarily solve all of an organization’s content provenance requirements. Some examples of the current provenance challenge include synthetic media labelling, provenance of digital source media, deepfake detection, and provenance of aggregated content.</p>

<p>Organizations will have to identify a framework relevant to their needs. The key aspects to consider when selecting a framework include:</p>

<ul><li>how trust in the provenance record is established – does it use cryptographic methods such as trusted timestamps (see 3.2.1) and cryptographic identities (see 3.2.2) to secure integrity?</li>
	<li>how members of the public can verify provenance – are the mechanisms simple and understandable by the public in general?</li>
</ul><p>Organizations will have their own content provenance requirements but should be mindful of the rapidly evolving requirements and standards in public provenance infrastructure. They should consider standards used in their specific solution to ensure provenance functionality, such as verification work at scale.</p>

<p>In addition to choosing a provenance solution which meets its specific objectives, an organization will need to decide which technologies to use. This decision will be driven by organizational objectives as well as the availability of technology solutions.</p>

<div><!-- 3.1 -->
<h3 id="consider-provenance-systems">3.1 What to consider when selecting provenance systems</h3>

<p>Provenance systems vary in complexity, cost and effectiveness and organizations will choose their solution to meet their specific objectives. It is also important to consider that digital provenance technologies are in their infancy and that organizational requirements will inevitably evolve. For this reason, an organization may choose to implement partial or iterative solutions.</p>

<p>This section provides information on the aspects to consider when choosing provenance methods.</p>

<div><!-- 3.1.1 -->
<h4>3.1.1 Source of trust</h4>

<p>What is the source of trust for the content provenance record? Organizations may use internal services but will need to consider ways to mitigate the perception of "self-signing" the provenance record. This challenge can potentially be addressed by using third-party operators or auditors. Organizations will need to consider the reputation and stability of third-party organizations used for establishing the provenance record.</p>
</div>

<div>
<h4>3.1.2 Extent of provenance record</h4>

<p>How far back does the provenance record go? At a minimum, it should trace the content back to its publication date, and identify whether the information came from a real-world device or was generated by an AI system. Ideally, the provenance should be traceable all the way back to the creation of the original source material and include provenance information about other components it contains, such as images.</p>
</div>

<div><!-- 3.1.4 -->
<h4>3.1.3 Ease of verification</h4>

<p>How simple is it to verify the provenance of a content item? In most cases, the verifier will be a member of the general public. The verification mechanism must be simple to use and yield an easily understandable and accurate provenance record.</p>
</div>

<div>
<h4>3.1.4 Cost of providing provenance</h4>

<p>How much does it cost to provide the provenance record? The organization must be able to sustain the costs.</p>
</div>

<div>
<h4>3.1.5 Strength of provenance claim</h4>

<p>How strong are the provenance claims? Can facts about the identity and time claims stand up to scrutiny? Cryptographic validation by other parties can strengthen the claims and improve public trust in the content’s provenance record.</p>
</div>

<div>
<h4>3.1.6 Duration of the provenance claim</h4>

<p>How long will the provenance record need to exist? If it's in the range of years or decades, then consider the sustainability of both the content store and the verify mechanisms.</p>
</div>

<div>
<h4>3.1.7 Utility of the provenance</h4>

<p>How does the provenance mechanism aid in reducing errors or distortion of an organization's information? Does the mechanism aid the public in making decisions about the organization’s content? Other information correction measures may be more effective for an organization’s specific challenges.</p>
</div>

<div>
<h4>3.1.8 Redress requirements</h4>

<p>How is inaccurate information corrected? All countries have established legal mechanisms for responding to at least some inaccurate information claims against organizations in the form of libel laws. Most countries have laws in place to address copyright and trademark infringement issues. These and other laws can be used by organizations to seek redress for inaccurate information about them.</p>

<p>In some cases, such as copyright, there are very structured requirements for identifying infringing material and notifying hosting services to remove it, such as labelling and deploying automated processes for submission and response. Existing and potential future legal remedies and processes should be considered, as well as the cost and time required to use the redress mechanisms.</p>
</div>

<div>
<h4>3.1.9 Privacy considerations</h4>

<p>Can privacy of individuals be addressed? Identity of actors is an important provenance detail, but it is not always possible to use it such as where there may be risk to life, reputation or other concerns of individuals providing content. In some cases, it may be required by law to shield an individual’s identity.</p>
</div>
</div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div><!-- 3.2 -->
<h3 id="consider-provenance-technologies">3.2 What to consider when selecting content provenance technologies</h3>

<p>In addition to choosing a provenance solution which meets its specific objectives, an organization will need to decide which technologies to use. This decision will be driven by organizational objectives as well as the availability of technology solutions.</p>

<p>Technologies that may be relevant for an organization include:</p>

<ul><li>cryptographic integrity mechanisms, such as public key infrastructure (PKI) identities, hashing and trusted timestamps, which can be used to bind together parts of the provenance solution to ensure the veracity and integrity of provenance records</li>
	<li>authentication for devices and software, individuals and trust anchors, which is an essential part of establishing accountability in the provenance record</li>
	<li>decentralised storage, which can help
	<ul><li>address the continuity challenges with content and records when organizations are eventually disbanded</li>
		<li>ensure that one party does not have full control over the digital content or ledger records</li>
	</ul></li>
	<li>tamper-proof ledgers, which address the challenge of permanence in the provenance record by creating records that are impossible to alter without a record of the alteration and are independent of the content</li>
</ul><p>Consideration should also be given to which parties implement the various technologies, to maximise the trust created. Organizations that create or “self-sign” their own provenance record are unlikely to see improvements in the trust of their content.</p>

<div><!-- 3.2.1 -->
<h4>3.2.1 Trusted timestamps</h4>

<p>Trusted timestamps are a useful provenance mechanism in that they establish a trusted timestamp for content state. When implemented properly, no one should be able to change a timestamp once it has been recorded. This concept is standardised in the <a href="https://www.ietf.org/rfc/rfc3161.txt">RFC 3161: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</a> and <a href="https://blog.ansi.org/ansi/ansi-x9-95-2022-time-stamp-security-management/">American National Standards Institute Accredited Standards Committee X9.95 standard (ANSI ASC X9.95)</a>.</p>

<p>The mechanisms use cryptographic methods to calculate a hash of the document and the timestamp. A third-party organization generally performs the timestamping to improve trust in the mechanism. Commercial services are available to perform this function.</p>
</div>

<div>
<h4>3.2.2 Cryptographic identity</h4>

<p>Cryptographic identities are part of <abbr title="public key infrastructure">PKI</abbr>. They are bound to a private cryptographic key known only to that entity. The identity can be an individual, an organization, a machine entity such as a device or service, or can be anonymous.</p>

<p>Cryptographic identities are commonly anchored in public certificate authorities. They can play an important part in content provenance since they can bind individuals and devices to content and assertions on content. This can strengthen the provenance of the content.</p>
</div>

<div>
<h4>3.2.3 Digital ledgers (Blockchain)</h4>

<p>Blockchain is a decentralised digital ledger technology that records transactions in a secure, tamper-proof manner. Each transaction, or block, is cryptographically linked to the previous one, forming a continuous chain. This chain of blocks provides a complete and transparent history of all transactions, making it virtually impossible to alter or manipulate without detection.</p>

<p>Blockchains are often implemented in a decentralised file system, meaning that they are not owned by any one individual or organization and they have no single point of failure. Organizations can use public blockchains or they may choose to use a more private implementation, depending on specific provenance needs.</p>

<p>The <abbr title="United Kingdom’s National Cyber Security Centre">NCSC</abbr> has published <a href="https://www.ncsc.gov.uk/whitepaper/distributed-ledger-technology">guidance on the use of distributed ledger technology</a> to aid in determining whether distributed ledger is an appropriate technology for a given scenario.</p>
</div>

<div>
<h4>3.2.4 Web archiving</h4>

<p>Web archiving refers to the process of collecting and preserving digital content from the World Wide Web so that it will be accessible in the future, even if the content is removed from a website. The primary goal of web archiving is to create a permanent record of web content, capturing website evolutions and online information changes. This process is invaluable for the preservation of digital media provenance because it captures digital assets' original form, context, and ownership, as well as subsequent versions. The <a href="https://web.archive.org/">Internet Archive Wayback Machine</a> is an example of a general web archiving service.</p>

<p>The web archiving approach can be expanded into a more robust provenance mechanism using cryptographic signatures and timestamps. The archived data can be used to verify the authenticity and integrity of digital content and establish its historical context.</p>
</div>

<div>
<h4>3.2.5 Digital watermarking</h4>

<p>Digital watermarking is not a provenance mechanism but is included here because it is often considered for addressing digital trust challenges. Digital watermarking can be overt or covert.</p>

<p><strong>Overt watermarking</strong> entails adding a visible or easily detectable watermark to content such as images or video. It is often a pattern which the viewer can see. Editing the watermark will result in distortions to the image or video that may be detectable by the end viewer if unsophisticated editing changes are made.</p>

<p><strong>Covert watermarking</strong> entails adding a watermark the viewer cannot detect to the content. It will become distorted if the image or video is edited. Distortions will not be readily detectable by viewers but will be detectable by those implementing the watermarks.</p>

<p>Overt and covert watermarks may provide a means of detecting some attempts at altering digital content. Many forms of overt watermarks can be removed using modern editing software. Covert watermarks are limited in effectiveness by the small number of parties that can detect changes. These considerations may therefore limit the usefulness of watermarks in addressing digital trust requirements. However, watermarking can still add value as part of a layered defence implementation.</p>
</div>

<div>
<h4>3.2.6 The Coalition for Content Provenance and Authenticity</h4>

<p>The <a href="https://c2pa.org/">Coalition for Content Provenance and Authenticity (C2PA)</a> is an industry organization that aims to address the prevalence of misleading online information through technical standards. It has established an open specification for documenting and certifying the source and history of media content.</p>

<p>The <a href="https://contentauthenticity.org/">Content Authenticity Initiative (CAI)</a>, which includes major technology and media companies, is responsible for promoting the C2PA standard. C2PA is a relatively new but major standard in the provenance space, and it is still under development.</p>

<p>C2PA leverages cryptographic methods to establish provenance on media content. This is organized around a manifest that is stored as part of the content. The manifest can capture information about changes to an item, including the author/editor, timestamp and location, and cryptographically bind it to the content. There can be multiple manifests stored in a manifest store reflecting the history of changes to the content. This manifest store is also known as a Content Credential (represented by the “CR” icon). The standard leverages trusted timestamps and watermarking.</p>
</div>
</div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div>
<h3 id="not-sutible-public">3.3 Why private provenance systems aren’t suitable for public content</h3>

<p>Most organizations have some sort of internal versioning and logging systems to track details of changes to content. These systems are private in the sense that the systems and supporting integrity mechanisms such as <abbr title="public key infrastructure">PKI</abbr> certificate authorities are often internal to the organization.</p>

<p>A private provenance infrastructure works well for corporate and some legal requirements but is largely unusable for public provenance requirements. This is mainly because the mechanism is wholly managed by the organization and designed for restricted internal use only. Additionally, private provenance systems rely heavily on separation of duties as the main mechanism for integrity of records.</p>

<p>Private provenance systems lack the visibility, transparency and accountability features necessary to make their provenance capability useful for establishing public trust in an organization’s information. To address public requirements, organizations need to reconsider provenance mechanisms for at least some of their content.</p>
</div>
</section><section><h2 id="depolying-considerations-usecase">4. Deploying public content provenance systems: Considerations and example use cases</h2>

<p>Not all organizations will have the same requirements for public provenance of their content. Requirements depend on factors such as the organization’s:</p>

<ul><li>particular public information trust challenges</li>
	<li>overall strategy for addressing public information trust</li>
	<li>audience</li>
	<li>volume of content</li>
	<li>financial resources</li>
</ul><p>Specific requirements may evolve quickly given the rapid changes in the information environment driven by cyber criminal and state use of AI.</p>

<div><!-- 4.1 -->
<h3 id="points-orgs-consider">4.1 Points for organizations to consider</h3>

<p>When considering deployment of a public content provenance system, there are a number of questions organizations should ask themselves.</p>

<div><!-- 4.1.1 -->
<h4>4.1.1 Strategy to establish public information trust</h4>

<p>Public information trust strategies will vary depending on factors such as the subject domain, the audience, and the objectives of actors seeking to use the organization’s public information against them.</p>

<p>Many organizations already have some capability for establishing trust in their public information and countering claims made against them. Using public provenance will help establish trust for an organization’s content, but it may not be as effective or have the same return on investment as other strategies.</p>

<p>Organizations should decide whether to use provenance as an approach to countering the challenges they face. Those choosing to use provenance technologies will also have to consider how to implement them.</p>
</div>

<div>
<h4>4.1.2 Introduction of provenance in content lifecycle</h4>

<p>Organizations can have a lot of content. Some of this content is publicly available. Other content, such as drafts, may not be publicly available now but will become public in the future.</p>

<p>The content may be at various stages of update and editing in preparation for publication. It may be distributed across a variety of systems and may be subject to changes by many individuals.</p>

<p>Organizations may also have some content that they never intend to make public. Some content may pose challenges or risks to the organization itself. As a result, organizations may choose strong provenance measures only for some types of content. They may also choose to protect content at the point of publication rather than at point of creation.</p>
</div>

<div>
<h4>4.1.3 Timeframe for content verification</h4>

<p>The public’s requirements for information verification can vary in timeframe depending on the information context. Some information verification requirements will be aimed at short-term concerns such as elections, while others will be aimed at generational issues such as evidence concerning distant historical events.</p>

<p>For short-term events, the organizational risk is that it will take longer to verify the provenance information than the event timeframe requires. Timeframe issues can impact how long provenance records must be maintained, as well as how readily-accessible the records need to be.</p>

<h4>4.1.4 Cost</h4>

<p>Digital provenance mechanisms are relatively new and have associated implementation, operation and maintenance costs. In most cases, organizations will have to change business processes to make effective use of provenance mechanisms. In addition, provenance technologies are evolving rapidly, and near-term implementations may quickly become obsolete.</p>

<p>Organizations may choose to prioritise non-provenance public information trust responses or they may choose to implement interim or partial solutions, for example using public provenance measures only for critical content.</p>
</div>

<div>
<h4>4.1.5 Audience and format</h4>

<p>The audience for provenance information may not necessarily be the same as an organization's core audience. This will depend on an organization's strategic and tactical response to the use of their information.</p>

<p>Formats for provenance information will be different depending on the system used by the specific audience.</p>

<p>Media companies have copyright on their information and may be able to use copyright tools to remove infringing material from the Internet. In this case, the audience for provenance evidence are legal professionals, Internet service providers and social media companies. Provenance information would need to be formatted to meet their different evidence requirements. A media company's implementation of provenance mechanisms will likely differ from that used by organizations whose provenance information audience is the general public.</p>
</div>

<div>
<h4>4.1.6 Maturity of public provenance technologies</h4>

<p>Organizations should also consider the maturity of public provenance technologies. Technologies for versioning and logging to meet an organization’s internal provenance requirements are mature. Public provenance technologies are less developed, although some of the related technologies used in private provenance, such as cryptographic hashing, can be used in public systems.</p>

<p>Publicly accessible provenance systems have additional requirements, for example, end-point devices such as cameras that can cryptographically sign content, and tamper-proof ledgers. These technologies are developing, but immature.</p>

<p>Organizations may choose to do partial and trial implementations. They may also choose to establish architectures that allow newer technologies to be integrated as they become available.</p>
</div>
</div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div>
<h3 id="usecase">4.2 Example use cases</h3>

<p>As we have seen, requirements for public provenance will vary between organizations depending on the challenges they face in communicating facts to their audiences and their public information trust strategy and tactics. These different requirements will shape the provenance infrastructure.</p>

<p>Here we provide analysis of 5 different use cases, using the provenance characteristics identified in <a href="#consider-provenance-systems">Section 3.1 What to consider when selecting provenance systems</a>.</p>

<div><!-- 4.2.1 -->
<h4>4.2.1 Use case 1: Organization wants provenance of all its public content</h4>

<p>An organization that wishes to establish provenance of its own public content can either:</p>

<ul><li>establish an irrefutable provenance record, including date and time at time of publishing</li>
	<li>create content provenance records for all the intermediate steps of creating the content</li>
</ul><p>The provenance record then becomes a tool for the organization’s communications staff, as well as for others who review and provide fact-checking on the content, to validate or refute content veracity claims.</p>

<p>The public needs to be able to find and verify content easily. To be useful, the verification mechanisms must be simple, intuitive and reliable.</p>
</div>

<div>
<h4>4.2.2 Use case 2: Organization’s content provenance is only needed for a short time</h4>

<p>The required duration of a provenance record can vary depending on its expected use. Like many forms of digital record, some provenance records may only be required for a relatively short period, for example content that is transitory and only has short-term significance, such as event announcements. Provenance on the announcement may have value prior to the event, but the value of any provenance record will rapidly diminish afterwards.</p>

<p>Provenance infrastructure that supports short-duration requirements would not need to factor in long-duration requirements, which simplifies implementation and lifecycle considerations.</p>
</div>

<div>
<h4>4.2.3 Use case 3: Organization’s content provenance is needed for a long time</h4>

<p>Some organizations will need their provenance records to endure well into the future. First-hand accounts of noteworthy events are one example. Future generations may need to verify the authenticity of today’s digital content. This is especially true in a world where generative AI is increasingly capable.</p>

<p>Proving the veracity of recorded testimony in timeframes of over 25 years could be challenging as certification components for identities and timestamps may not endure. The provenance mechanism must therefore address changes in technology, as well as turnover of business entities such as certificate providers and hosting services. The verification mechanism itself must also endure.</p>

<p>Maintaining the provenance and verification mechanisms over the long term will likely rely on distributed content stores and ledgers given that, in time, most organizations shut down, as part of normal organizational lifecycle. Such mechanisms are still in the early stages of development and can be expensive to implement and use.</p>
</div>

<div>
<h4>4.2.4 Use case 4: Organization needs content to retain its anonymity and privacy</h4>

<p>Some provenance requirements have privacy and anonymity considerations, for example in the field of journalism, where sources working in dangerous environments may need to remain anonymous for their protection. This can be done using trusted anonymous identities for individuals, or trusted capture devices that preserve user anonymity. Although this diminishes the strength of the provenance claim, it can still add value.</p>

<p>Other provenance methods such as trusted timestamps and provenance certification by higher level entities (in this case, the journalist organization) can strengthen the provenance record, helping to retain its usefulness.</p>
</div>

<div>
<h4>4.2.5 Use case 5: Copyright and other legal redress</h4>

<p>Public content provenance records can potentially be used by organizations in their efforts to redress copyright infringement of their content.</p>

<p>The provenance mechanism can be used to identify copyright permissions available to others using the content (for example, Creative Commons licence) in a way which the public can verify.</p>

<p>Many jurisdictions are currently developing mechanisms to address other forms of information misuse.</p>

<p>Organizations implementing provenance mechanisms for this purpose may need to consider both specialised audiences and legal redress requirements in their systems design.</p>
</div>
</div>
</section><section><h2 id="next-steps text-info">5. Next steps</h2>

<p>The content provenance space is rapidly evolving to meet emerging challenges but is still mainly in the development stage. If you are considering content provenance as part of your organization's trust strategy you should:</p>

<ul><li>understand how your information and information about your organization is received by your audience and other parties, and how this impacts your audience's trust in your organization</li>
	<li>consider how content provenance technologies might address your organization's public trust challenges</li>
	<li>stay abreast of changes in technology and emerging trust threats in the information environment</li>
</ul></section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-principles-secure-integration-artificial-intelligence-operational-technology</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-principles-secure-integration-artificial-intelligence-operational-technology"/><title><![CDATA[Joint guidance on principles for the secure integration of artificial intelligence in operational technology]]></title><updated>2025-12-03T19:28:10Z</updated><summary><![CDATA[This joint guidance outlines 4 key principles CI owners and operators can follow to leverage the benefits of AI in OT systems while minimizing risk.]]></summary><content><![CDATA[<article data-history-node-id="6868" about="/en/news-events/joint-guidance-principles-secure-integration-artificial-intelligence-operational-technology" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States’ Cybersecurity and Infrastructure Security Agency (CISA) and the following international partners in releasing guidance on principles for the secure integration of artificial intelligence (AI) in operational technology (OT):</p>

<ul><li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li>
	<li>Germany’s Federal Office for Information Security (BSI)</li>
	<li>Netherlands’ National Cyber Security Centre (NCSC-NL)</li>
	<li>New Zealand’s National Cyber Security Centre (NCSC-NZ)</li>
	<li>United Kingdom’s National Cyber Security Centre (NCSC-UK)</li>
	<li>United States’ Federal Bureau of Investigation (FBI)</li>
	<li>United States’ National Security Agency’s Artificial Intelligence Security Center (NSA AISC)</li>
</ul><p>For critical infrastructure (CI) owners and operators, <abbr title="artificial intelligence">AI</abbr> offers the potential to:</p>

<ul><li>increase efficiency and productivity</li>
	<li>enhance decision-making</li>
	<li>save costs</li>
	<li>improve customer experience</li>
</ul><p>Despite the many benefits, integrating <abbr title="artificial intelligence">AI</abbr> into <abbr title="operational technology">OT</abbr> environments that manage essential public services also introduces significant risks. These risks must be carefully managed to ensure the availability and reliability of <abbr title="critical infrastructure">CI</abbr>.</p>

<p>This joint guidance outlines 4 key principles <abbr title="critical infrastructure">CI</abbr> owners and operators can follow to leverage the benefits of <abbr title="artificial intelligence">AI</abbr> in <abbr title="operational technology">OT</abbr> systems while minimizing risk:</p>

<ul><li>Understand <abbr title="artificial intelligence">AI</abbr></li>
	<li>Consider <abbr title="artificial intelligence">AI</abbr> use in the <abbr title="operational technology">OT</abbr> domain</li>
	<li>Establish <abbr title="artificial intelligence">AI</abbr> governance and assurance frameworks</li>
	<li>Embed safety and security practices into <abbr title="artificial intelligence">AI</abbr>-enabled <abbr title="operational technology">OT</abbr> systems</li>
</ul><p>We urge <abbr title="critical infrastructure">CI</abbr> owners and operators to review this joint guidance and implement the principles to more securely integrate <abbr title="artificial intelligence">AI</abbr> into <abbr title="operational technology">OT</abbr> systems.</p>

<p>Read the full joint publication: <a href="https://www.cisa.gov/resources-tools/resources/principles-secure-integration-artificial-intelligence-operational-technology">Principles for the secure integration of artificial intelligence in operational technology</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://www.canada.ca/en/communications-security/news/2025/11/joint-statement-on-malicious-cyber-activity-targeting-canadian-critical-infrastructure.html</id><link rel="alternate" href="https://www.canada.ca/en/communications-security/news/2025/11/joint-statement-on-malicious-cyber-activity-targeting-canadian-critical-infrastructure.html"/><title><![CDATA[Joint statement on malicious cyber activity targeting Canadian critical infrastructure]]></title><updated>2025-11-27T13:23:39Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7041" about="/en/news-events/joint-statement-malicious-cyber-activity-targeting-canadian-critical-infrastructure" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://www.canada.ca/en/communications-security/news/2025/11/backgrounder-malicious-cyber-activity-targeting-canadian-critical-infrastructure.html</id><link rel="alternate" href="https://www.canada.ca/en/communications-security/news/2025/11/backgrounder-malicious-cyber-activity-targeting-canadian-critical-infrastructure.html"/><title><![CDATA[Backgrounder: Malicious cyber activity targeting Canadian critical infrastructure]]></title><updated>2025-11-26T21:11:30Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7040" about="/en/news-events/backgrounder-malicious-cyber-activity-targeting-canadian-critical-infrastructure" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-threat-canadas-water-systems-assessment-mitigation</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-threat-canadas-water-systems-assessment-mitigation"/><title><![CDATA[The cyber threat to Canada’s water systems: Assessment and mitigation]]></title><updated>2025-11-25T15:00:14Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6961" about="/en/guidance/cyber-threat-canadas-water-systems-assessment-mitigation" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><section><details class="mrgn-bttm-lg"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#0">About this document</a></li>
	<li><a href="#1">Message from the Head of the Cyber Centre</a></li>
	<li><a href="#2">Key judgements</a></li>
	<li><a href="#3">Canada’s water sector</a></li>
	<li><a href="4">The threat from cybercriminals</a></li>
	<li><a href="#5">The state-sponsored cyber threat to water systems</a></li>
	<li><a href="#6">Non-state cyber actors: A growing threat</a></li>
	<li><a href="7">Outlook: What this means for the Canadian Water Sector</a></li>
	<li><a href="#8">Mitigation</a></li>
	<li><a href="#9">Additional resources</a></li>
	<li><a href="#10">References</a></li>
</ul></details></section><section><h2 class="text-info page-header mrgn-tp-lg" id="0">About this document</h2>

<h3>Audience</h3>

<p>This report is part of a series of cyber threat assessments focused on Canada’s critical infrastructure. It is intended for leaders of organizations in the water sector, cyber security professionals with a water or wastewater asset to protect, and the general reader with an interest in the cyber security of critical infrastructure. For guidance on technical mitigation of these threats, see the Mitigation section or contact the Canadian Centre for Cyber Security (the Cyber Centre).</p>

<p>This assessment is Unclassified/TLP:CLEAR. TLP:CLEAR is used when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information, see <a href="https://www.first.org/tlp/">Traffic Light Protocol</a>.</p>

<h3>Contact</h3>

<p>For follow-up questions or issues, contact the Cyber Centre at <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>

<h3>Assessment base and methodology</h3>

<p>The key judgements in this assessment rely on reporting from multiple sources, both classified and unclassified. The judgements are based on the knowledge and expertise in cyber security of the Cyber Centre. Defending the Government of Canada’s information systems provides the Cyber Centre with a unique perspective to observe trends in the cyber threat environment, which also informs our assessments. The Communications Security Establishment Canada’s foreign intelligence mandate provides us with valuable insight into adversary behaviour in cyberspace. While we must always protect classified sources and methods, we provide the reader with as much justification as possible for our judgements.</p>

<p>Our judgements are based on an analytical process that includes evaluating the quality of available information, exploring alternative explanations, mitigating biases and using probabilistic language. We use terms such as “we assess” or “we judge” to convey an analytic assessment. We use qualifiers such as “possibly”, “likely” and “very likely” to convey probability.</p>

<p>The assessments and analysis are based on information available as of <strong>May 31, 2025</strong>.</p>

<h3>Estimative language</h3>
<img alt="Estimated language chart long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/tdp4-language-chart-e.jpg" /><details class="mrgn-bttm-lg"><summary>Long description - Estimative language chart </summary><ul class="list-unstyled mrgn-tp-md"><li>1 to 9% Almost no chance</li>
	<li>10 to 24% Very unlikely/Very Improbable</li>
	<li>25 to 39% Unlikely/Improbable</li>
	<li>40 to 59% Roughly even chance</li>
	<li>60 to 74% Likely/probably</li>
	<li>75 to 89% Very likely/very probable</li>
	<li>90 to 100% Almost certainly</li>
</ul></details><div class="clearfix"> </div>
</section><section><h2 class="text-info page-header mrgn-tp-xl" id="1">Message from the Head of the Cyber Centre</h2>

<p>I spend a lot of time looking at threats most people never see. They are quiet, often hidden, yet capable of real-world consequences. Among the most critical are the cyber threats facing Canada’s water and wastewater systems. These systems are the backbone of modern life, yet they’re often out of sight and out of mind. When they function, no one notices. When they fail, everyone does.</p>

<p>This assessment is meant to bring clarity to a topic that can feel abstract or overly technical. Cyber threats to water infrastructure are growing, evolving quickly, and can affect every community in Canada. You don’t need to be an engineer or a cyber security expert to understand why this matters. Clean water is essential, and the systems that deliver it are now largely digital – meaning they are vulnerable to the same kinds of cyber threats that target businesses and governments around the world.</p>

<p>We’ve seen an unmistakable shift in recent years. Cybercriminals are more sophisticated, state-sponsored actors are more willing to target essential services, and disruptive tools are easier to access. Water systems now face a threat landscape they were never designed to withstand.</p>

<p>Whether you’re a critical infrastructure executive, an elected official, or a policymaker, I want to emphasize that cyber security for water systems is not just a technical issue, it is a public safety issue, an economic stability issue, and ultimately a public trust issue. Leadership matters. The choices you make about investment, governance, and preparedness will determine our collective resilience in the years ahead.</p>

<p>But this is not a message of alarm; it is a message of readiness. Across Canada, utilities, municipalities, and provincial and territorial partners have shown a strong commitment to improving their cyber resilience. What’s needed now is a clear-eyed analysis of the cyber threats facing our water systems in Canada. That’s what this assessment provides.</p>

<p>My hope is that it empowers decision-makers to act confidently, ask the right questions, and support the people who keep these systems running. Cyber threats aren’t going away, but with awareness and a steady commitment to resilience, we can stay ahead of them.</p>

<p>Sincerely,<br /><strong>Rajiv Gupta, Head of the Canadian Centre for Cyber Security</strong></p>

<h2 class="text-info page-header mrgn-tp-lg" id="2">Key judgements</h2>

<ul><li>We assess that operational technology (OT) networks that monitor and control physical processes are very likely the primary target for actors seeking to disrupt water systems.</li>
	<li>We assess that financially motivated cybercriminals are the most likely cyber threat to affect water systems. We assess that cybercriminals will almost certainly continue to exploit water sector organizations and systems through extortion tied to ransomware, exploiting stolen information, and business email compromise (BEC). We assess that ransomware is almost certainly the most significant cyber threat to the reliable supply of water in Canada due to the potential impacts against <abbr title="operational technology">OT</abbr> systems.</li>
	<li>We assess that water systems are almost certainly a strategic target for state-sponsored actors to project power through disruptive or destructive cyber threat activity. We assess that state-sponsored actors have almost certainly developed pre-positioned access to Canadian water systems. However, we judge that these actors would likely only disrupt those water systems in times of crisis or conflict between states.</li>
	<li>Non-state cyber actors are a growing threat to Canada’s critical infrastructure (CI). We assess that non-state actors will very likely continue to opportunistically compromise and disrupt Internet-exposed water system <abbr title="operational technology">OT</abbr> within Canada, especially in connection to major geopolitical events.</li>
</ul></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section class="mrgn-tp-lg"><h2 class="text-info page-header mrgn-tp-lg" id="3">Canada’s water sector</h2>

<p>Good public and environmental health depend on access to clean water.<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>  Drinking water, stormwater and wastewater treatment systems (collectively: <strong>water systems</strong>) have many important economic, environmental, and safety uses. A loss of water does not just affect residents but also can have effects on other critical infrastructure. For example, in 2024, water main breaks in Calgary and Montreal resulted in cascading impacts on other systems, including hospitals, fire prevention and universities.<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>  For these reasons and others, our water systems are considered part of Canada’s critical infrastructure (Figure 1).<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>  Any disruption in the water system is not only a threat to public health and safety, but also a threat to public confidence, the environment and the economy.<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup>  As a result, the cyber security of our water systems is vital to Canada’s national security.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center"><strong>Figure 1: Critical infrastructure</strong></figcaption><p>Critical infrastructure refers to the processes, systems, facilities, technologies, networks, assets and services essential to the health, safety, security or economic well-being of Canadians and the effective functioning of government.</p>
<img alt="Figure 1 - Long description immediately follows" class="img-responsive center-block" src="/sites/default/files/images/ncta-2023-fig5.jpg" /></figure><details><summary>Long description - Figure 1: Critical infrastructure</summary> Icons representing the 10 critical infrastructure sectors in Canada

<ul><li>Energy and utilities</li>
	<li>Finance</li>
	<li>Food</li>
	<li>Health</li>
	<li>Government</li>
	<li>Safety</li>
	<li>Water</li>
	<li>Transportation</li>
	<li>Information and communication technology</li>
	<li>Manufacturing</li>
</ul></details></div>
</div>

<h3>The threat surface of Canada’s water systems</h3>

<p>A water system generally includes the services and infrastructure to safely and reliably obtain, store, filter and distribute potable water, divert runoff and floodwater as well as remove, collect and treat wastewater. Canada has thousands of water systems that vary greatly in size. A small number of large water utilities serve major urban areas while international organizations manage shared systems. Meanwhile, many small systems are owned and operated by municipalities, other levels of government, Indigenous communities, private sector companies and individual citizens.<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup></p>

<p>Water systems operate in a variety of ways. Many are completely manual or even passive systems that require little to no active management, including most small water supplies and stormwater systems. Large urban water systems, in contrast, are usually geographically dispersed, industrial systems operated from a digital control environment. These include many remotely managed <abbr title="operational technology">OT</abbr> devices integrated into dams, pumping stations, and treatment facilities. These systems also extend into a web of connected suppliers of digital products and services.</p>

<p>Many of these water systems are managed out of municipal or community offices and are exposed to all the cyber threats encountered by public-facing organizations. The more internet-connected assets an organization has, the larger the threat surface. A larger threat surface implies an increase in the cyber threat the organization faces.<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup>  In addition to increasing internet connectivity, most water systems are operated by small public sector organizations and frequently face challenges that can negatively influence cyber security, including low financial resources, aging physical and digital infrastructure and a shortage of cyber security expertise.<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup></p>

<h4>The role of operational technology in our water systems</h4>

<p>Operators use industrial <abbr title="operational technology">OT</abbr> including supervisory control and data acquisition (SCADA) and industrial Internet of things (IIoT) devices to manage large water systems and address issues like population growth, outdated infrastructure and declining revenue.<sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup>  These systems are used to control water system equipment like dam gates, valves and pumps and to monitor sensors such as chemical detectors and flowrate monitors. The <abbr title="operational technology">OT</abbr> in water systems is continually evolving and is increasingly managed through digital devices with embedded computing and communications abilities.<sup id="fn9-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup>  This process, called digital transformation or digitalization, has allowed <abbr title="operational technology">OT</abbr> asset operators like those in the water sector to connect their <abbr title="operational technology">OT</abbr> devices to operating centres, corporate networks and, increasingly, directly to the internet. A 2021 survey counted over 60,000 <abbr title="operational technology">OT</abbr>-related network interfaces in Canada.<sup id="fn10-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup>  In 2023, a similar survey conducted on internet-connected devices associated mainly with water systems in the U.S. and UK found a relatively low level of basic cyber hygiene. Almost half of the devices could be manipulated without any authentication required.<sup id="fn11-rf"><a class="fn-lnk" href="#fn11"><span class="wb-inv">Footnote </span>11</a></sup></p>

<p>Unfortunately, the management efficiency and savings gained from connecting digitally transformed <abbr title="operational technology">OT</abbr> also exposes the water system to cyber threats.<sup id="fn10a-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup>  For example, in early 2000, an employee was fired from a company providing services to Maroochy Water Services in Queensland, Australia. The individual retained remote access to the network of <abbr title="operational technology">OT</abbr> devices in the pumping stations of the wastewater treatment system.<sup id="fn12-rf"><a class="fn-lnk" href="#fn12"><span class="wb-inv">Footnote </span>12</a></sup>  He used this access to issue malicious commands to the <abbr title="operational technology">OT</abbr> devices that ultimately caused nearly a million litres of raw sewage to be discharged into local parks and rivers, causing severe environmental harm, according to officials.<sup id="fn13-rf"><a class="fn-lnk" href="#fn13"><span class="wb-inv">Footnote </span>13</a></sup>  This was the first example of a remote access in a public water system being used to disrupt or sabotage <abbr title="operational technology">OT</abbr> systems, and illustrates the potential for cyber threats to jeopardize public and environmental safety and the local economy.<sup id="fn10b-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup>  <strong>We assess that operational technology (OT) networks that monitor and control physical processes are very likely the primary target for actors seeking to disrupt water systems</strong>.</p>

<h4>On the rise: Cyber threats to supply chains</h4>

<p>Water system utilities often depend on a diverse supply chain of digital products and services to operate, maintain and modernize their <abbr title="operational technology">OT</abbr> assets. The supply chain for these products and services includes manufacturers, vendors, integrators, contractors and service providers. Water system <abbr title="operational technology">OT</abbr>’s dependency on the supply chain is a critical vulnerability that gives cyber actors inside information on and opportunities for access to otherwise protected <abbr title="operational technology">OT</abbr> systems.</p>

<p>Cyber threat actors target organizations’ digital supply chains to collect business and contextual information for use in social engineering attacks or to collect organizational network and system information to support future cyber attacks. Activity against the digital supply chain can also be an indirect route to gain access to the target organization’s networks in situations where there is continuous information transfer, for example software updates, or remote network access connections between the organization and its suppliers. In late 2019, a sophisticated cyber threat actor compromised the software-as-a-service provider, SolarWinds. The actors, attributed to Russia’s intelligence services, used their access to SolarWinds’ development environment to embed malicious code into a software update. The compromised update provided the actors access to thousands of client networks worldwide, including over 100 in Canada.<sup id="fn14-rf"><a class="fn-lnk" href="#fn14"><span class="wb-inv">Footnote </span>14</a></sup></p>

<h4>Publicly available cyber tools are increasing the volume and effectiveness of cyber threat activity</h4>

<p><strong>We assess it almost certain that cyber threat actors are increasingly using publicly available cyber tools to gain and maintain access to <abbr title="critical infrastructure">CI</abbr> networks, making it easier for threat actors of all levels of sophistication to target water sector <abbr title="operational technology">OT</abbr>.</strong> The wide availability of these tools, including legitimate penetration testing tools like Cobalt Strike, has lowered the barrier to entry to cyber threat activity and increased the capacity for cyber threat actors to gain, maintain, and expand access to target systems.<sup id="fn15-rf"><a class="fn-lnk" href="#fn15"><span class="wb-inv">Footnote </span>15</a></sup></p>

<p>The proliferation of publicly available cyber tools has advantages for sophisticated cyber threat actors as well. Advanced cyber threat actors often use a combination of publicly available tools and living-off-the-land (LOTL) techniques when possible and bespoke malware when necessary. For example, People’s Republic of China (PRC) threat actors Volt Typhoon, Flax Typhoon and APT40 commonly use a mixed toolset and likely maintain an extensive catalog of open source and custom malware.<sup id="fn16-rf"><a class="fn-lnk" href="#fn16"><span class="wb-inv">Footnote </span>16</a></sup>  <abbr title="living-off-the-land">LOTL</abbr> techniques exclusively rely on legitimate tools and processes already present in the victim’s environment, for example Windows PowerShell or Windows Management Instrumentation, to carry out malicious activity.<sup id="fn17-rf"><a class="fn-lnk" href="#fn17"><span class="wb-inv">Footnote </span>17</a></sup>  These techniques allow threat actors to blend their malicious activity in with normal network activity. By using generic publicly available tools and <abbr title="living-off-the-land">LOTL</abbr> techniques, sophisticated actors limit the distinct signature they leave on a target’s network, making detecting cyber threat activity and attributing the source of that activity even more challenging.<sup id="fn18-rf"><a class="fn-lnk" href="#fn18"><span class="wb-inv">Footnote </span>18</a></sup></p>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<h2 class="text-info page-header mrgn-tp-lg" id="4">The threat from cybercriminals</h2>

<p><strong>We assess that financially motivated cybercriminals are the most likely cyber threat to affect water systems. We assess that cybercriminals will almost certainly continue to exploit water sector organizations and systems through extortion tied to ransomware, exploiting stolen information and business email compromise (BEC).</strong> <abbr title="business email compromise">BEC</abbr> is a type of fraud that uses compromised email accounts to trick people into transferring money or sensitive information to attacker-controlled accounts, while ransomware is malware that encrypts data or locks devices to extort a target organization for ransom payment.<sup id="fn19-rf"><a class="fn-lnk" href="#fn19"><span class="wb-inv">Footnote </span>19</a></sup>  Although <abbr title="business email compromise">BEC</abbr> is likely more common and more costly than ransomware to victims, ransomware can disrupt operations such as the delivery of safe drinking water through loss of visibility or control over important industrial processes.<sup id="fn20-rf"><a class="fn-lnk" href="#fn20"><span class="wb-inv">Footnote </span>20</a></sup>  <strong>We assess that ransomware is almost certainly the most significant cyber threat to the reliable supply of water in Canada due to the potential impacts against <abbr title="operational technology">OT</abbr> systems.</strong> Cybercriminals are aware that the disruption of critical products and services increases the pressure on an organization to pay ransom.<sup id="fn21-rf"><a class="fn-lnk" href="#fn21"><span class="wb-inv">Footnote </span>21</a></sup>  For example, ransomware attacks disrupted water treatment systems in California, Maine and Nevada in 2021, and in Kansas in 2024, forcing system operators to manually operate their <abbr title="operational technology">OT</abbr> systems to maintain service.<sup id="fn22-rf"><a class="fn-lnk" href="#fn22"><span class="wb-inv">Footnote </span>22</a></sup></p>

<h3>Ransomware incidents are becoming more complex and costly to remediate</h3>

<p><strong>We assess that ransomware attacks against <abbr title="critical infrastructure">CI</abbr> organizations, including those in the water sector, are almost certainly becoming more frequent as well as more costly and complex to remediate.</strong> The number of observed ransomware incidents has increased across sectors from 2021 to 2024. The size of ransom demands, cost of recovery, and the sophistication and complexity of tactics being used by cybercriminals have also increased.<sup id="fn23-rf"><a class="fn-lnk" href="#fn23"><span class="wb-inv">Footnote </span>23</a></sup>  These trends are driven by the proliferation of ransomware-as-a-service (RaaS) variants, the cybercrime-as-a-service (CaaS) ecosystem, and the increased use of multiple extortion methods.<sup id="fn24-rf"><a class="fn-lnk" href="#fn24"><span class="wb-inv">Footnote </span>24</a></sup></p>

<p>Cybercriminals have widely adopted the practice of stealing and threatening to leak their victims’ sensitive data as either a supplement to traditional encryption-based extortion or as the primary lever for extortion. In early 2023, the cybercriminal group CL0P exploited a vulnerability in MOVEit Transfer, a file transfer tool made by Progress Software. CL0P’s attacks were far-reaching, allowing them to steal information from government, public and business groups all over the world, including the water utility files of Queens Municipality in Nova Scotia.<sup id="fn25-rf"><a class="fn-lnk" href="#fn25"><span class="wb-inv">Footnote </span>25</a></sup>  In early 2024, 2 different cybercriminal groups conducted ransomware attacks against water sector organizations in North America and the United Kingdom. The groups disrupted <abbr title="information technology">IT</abbr> systems and leaked stolen data including business data and personal information.<sup id="fn26-rf"><a class="fn-lnk" href="#fn26"><span class="wb-inv">Footnote </span>26</a></sup></p>

<h3>Cybercrime marketplaces provide specialized services and increase impacts against victims</h3>

<p>Cybercrime is continuously evolving to maximize profits and increase the payouts extracted from targets.<sup id="fn27-rf"><a class="fn-lnk" href="#fn27"><span class="wb-inv">Footnote </span>27</a></sup>  The <abbr title="cybercrime-as-a-service">CaaS</abbr> ecosystem allows for specialization and division of labour among cybercriminal groups. This allows cybercriminals to access a range of services including network access brokering, access to <abbr title="ransomware-as-a-service">RaaS</abbr> variants and money laundering. Access brokers opportunistically collect network accesses into victim organizations and sell them to other cybercriminals. Those cybercriminals then conduct reconnaissance and use social engineering to determine which targets to deploy ransomware against. These decisions are often based on which organizations are most likely and/or able to pay a ransom.<sup id="fn19a-rf"><a class="fn-lnk" href="#fn19"><span class="wb-inv">Footnote </span>19</a></sup><sup id="fn27a-rf"><a class="fn-lnk" href="#fn27"><span class="wb-inv">Footnote </span>27</a></sup>  <strong>We assess that the <abbr title="cybercrime-as-a-service">CaaS</abbr> ecosystem is almost certainly increasing the number of actors participating in cybercrime by enabling less technically sophisticated actors to carry out cyber threat activity.</strong></p>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<h2 class="text-info page-header mrgn-tp-lg" id="5">The state-sponsored cyber threat to water systems</h2>

<p><strong>We assess that water systems are almost certainly a strategic target for state-sponsored actors to project power through disruptive or destructive cyber threat activity.</strong> State-sponsored actors pre-position for this activity by identifying and gaining access to Internet-connected <abbr title="operational technology">OT</abbr> systems or <abbr title="information technology">IT</abbr> networks from which they can laterally move to <abbr title="operational technology">OT</abbr> systems. Once in the target network, they collect information on assets within the network to identify opportunities for disruptive or destructive action. For example, this could mean causing water tanks to overflow or changing the chemical balance of water treatment processes. We assess that state-sponsored cyber threat actors have almost certainly developed pre-positioned access to Canadian water systems. However, we judge that these actors would likely only disrupt those water systems in times of crisis or conflict between states.</p>

<p>State-sponsored cyber threat actors have targeted water sector organizations and systems globally for both espionage and disruption or destruction. In an early example of state-sponsored cyber activity in water system <abbr title="operational technology">OT</abbr>, in 2013, Iranian actors gained access to the <abbr title="supervisory control and data acquisition">SCADA</abbr> system of a small dam in New York State. This access allowed them to obtain information regarding the dam’s status and the ability to operate the sluice gates of the dam, which could affect water levels and flow rates in the watershed. The system was under maintenance at the time of the compromise, so the actors did not obtain actual access to the dam’s physical controls.<sup id="fn28-rf"><a class="fn-lnk" href="#fn28"><span class="wb-inv">Footnote </span>28</a></sup></p>

<p>In 2023, an Iranian Islamic Revolutionary Guard Corps (IRGC) cyber unit acting under the non-state actor persona “CyberAv3ngers” compromised the Municipal Water Authority of Aliquippa, Pennsylvania. The CyberAv3ngers exploited a publicly exposed Unitronics Vision Series <abbr title="operational technology">OT</abbr> device with default passwords and defaced the system’s interface with an anti-Israel message. This activity was part of a broader campaign targeting commonly used Israeli-made <abbr title="operational technology">OT</abbr> devices, likely to undermine Western support for Israel. Tampering with the controller's user interface implies a level of access that would allow full access to the device settings, as well as potential access to other devices on the network. It is not known if cyber activity beyond defacement was planned or carried out.<sup id="fn29-rf"><a class="fn-lnk" href="#fn29"><span class="wb-inv">Footnote </span>29</a></sup></p>

<p>In 2023 and 2024, the Cyber Centre and its partners published the following joint advisories to warn critical infrastructure organizations of a <abbr title="People’s Republic of China">PRC</abbr> state-sponsored cyber group known as Volt Typhoon:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/news-events/joint-guidance-executives-and-leaders-critical-infrastructure-organizations-protecting-infrastructure-and-essential-functions-against-prc-cyber-activity">Joint guidance for executives and leaders of critical infrastructure organizations on protecting infrastructure and essential functions against <abbr title="People’s Republic of China">PRC</abbr> cyber activity</a></li>
	<li><a href="https://www.cyber.gc.ca/en/news-events/advisory-peoples-republic-china-state-sponsored-cyber-threat">CSE and its Canadian Centre for Cyber Security release advisory on People's Republic of China state-sponsored cyber threat</a></li>
	<li><a href="https://www.cyber.gc.ca/en/news-events/joint-advisory-prc-state-sponsored-actors-compromising-and-maintaining-persistent-access-us-critical-infrastructure-and-joint-guidance-identifying-and-mitigating-living-land-0">Joint advisory on <abbr title="People’s Republic of China">PRC</abbr> state-sponsored actors compromising and maintaining persistent access to U.S. critical infrastructure and joint guidance on identifying and mitigating living off the land</a></li>
</ul><p>Volt Typhoon activity has been observed since mid-2021 targeting the water sector and communication, transportation and energy organizations.<sup id="fn30-rf"><a class="fn-lnk" href="#fn30"><span class="wb-inv">Footnote </span>30</a></sup>  Volt Typhoon strategically selects targets, pre-positioning itself in organizations that, if disrupted, would restrict military mobilization efforts and cause societal chaos. While the Cyber Center assesses that the direct threat to Canada’s <abbr title="critical infrastructure">CI</abbr> by Volt Typhoon is less than that to the <abbr title="United States">U.S.</abbr>, it is not insignificant, especially for Canadian organizations that rely on cross-border trade, infrastructure or operations. In addition, the likelihood of a cyber attack impacting Canada’s <abbr title="critical infrastructure">CI</abbr> is higher than it otherwise might be because of the connections between US and Canadian infrastructure.</p>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<h2 class="text-info page-header mrgn-tp-lg" id="6">Non-state cyber actors: A growing threat</h2>

<p>The Cyber Centre warned in our <a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a> that <strong>non-state cyber actors are a growing threat to Canada’s critical infrastructure</strong>. The wide proliferation of easy-to-use disruptive cyber capabilities has contributed to the emergence of a large eco-system of hacktivists and other non-state actors who opportunistically target Canada and its allies for a variety of reasons. Often, this activity is intended to intimidate or coerce its targets or to influence Canadian public opinion or policy decisions related to geopolitical events outside Canada.</p>

<p>Non-state threat activity frequently targets public-facing websites through techniques including distributed denial-of-service (DDoS) and defacement attacks. However, some non-state actors have adopted the practice of targeting and attempting to disrupt vulnerable Internet-connected <abbr title="operational technology">OT</abbr> systems. Although non-state actors have targeted <abbr title="operational technology">OT</abbr> across <abbr title="critical infrastructure">CI</abbr> sectors, a notable proportion of this activity has implicated water system <abbr title="operational technology">OT</abbr>.</p>

<p>In May 2024, the Cyber Centre and partners issued a joint advisory warning of pro-Russia non-state actors targeting Internet-exposed industrial systems. These actors opportunistically identify targets using publicly available scanning tools to search for internet-exposed systems with vulnerable configurations, such as using default or weak passwords or not using multi-factor authentication.<sup id="fn31-rf"><a class="fn-lnk" href="#fn31"><span class="wb-inv">Footnote </span>31</a></sup>  After gaining access to these systems, they attempt to disrupt the system by defacing system interfaces, making configuration changes, and manipulating system controls. This activity can result in <abbr title="operational technology">OT</abbr> systems operating in unintended ways, operational disruptions, and, potentially, physical damage to the systems. For example, in early 2024, a non-state actor compromised the <abbr title="operational technology">OT</abbr> systems controlling water storage tanks in the towns of Abernathy and Muleshoe, Texas and caused a tank overflow resulting in the loss of roughly 100,000 litres of water.<sup id="fn32-rf"><a class="fn-lnk" href="#fn32"><span class="wb-inv">Footnote </span>32</a></sup></p>

<p>The Cyber Centre is aware of several instances of non-state actors similarly attempting to disrupt internet-exposed <abbr title="operational technology">OT</abbr> systems in Canada, including within water systems. <strong>We assess that non-state actors will very likely continue to opportunistically compromise and disrupt internet-exposed water system <abbr title="operational technology">OT</abbr> within Canada, especially in connection to major geopolitical events.</strong></p>

<h2 class="text-info page-header mrgn-tp-lg" id="7">Outlook: What this means for the Canadian water sector</h2>

<p>In the Cyber Centre’s <a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a>, we assess that the cyber threat to Canada’s critical infrastructure is almost certainly increasing. We judge that the primary threats to <abbr title="critical infrastructure">CI</abbr> come from cybercrime, state-sponsored adversaries and, increasingly, from non-state actors. Changes in the geopolitical environment have elevated the profile and importance of critical infrastructure as a target for cyber activity. This has combined with the increasing interconnectivity of <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> in the water sector to increase the cyber threat to the water supply.</p>

<p>If Canada’s water infrastructure was to become a priority for state-sponsored actors, for example in the case of imminent or active armed conflict, we assess that any water system organizations with <abbr title="operational technology">OT</abbr> devices exposed to the Internet are almost certainly a target for disruptive cyber threat activity. Water systems may also be affected by cyber activity against other sectors due to the interconnected nature of infrastructure and supply chain complexity. For example, systems including water treatment plants, pumping stations, and distribution networks without backup power capacity may be vulnerable to disruptions in the energy sector, which may lead to interruptions in the treatment, storage and distribution of safe water to clients.</p>

<p>Defending Canada’s water sector against cyber threats and related influence operations requires addressing both the technical and social elements of cyber threat activity. These include threats that originate in the digital supply chain, and the technology and skills shortage in the sector. There are almost certainly water system operators in Canada with exposed devices. The Cyber Centre encourages all critical infrastructure asset owners, including those in the water sector, to take appropriate mitigation measures to protect their systems against cyber threats.</p>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<h2 class="text-info page-header mrgn-tp-lg" id="8">Mitigation</h2>

<div class="mrgn-tp-md" id="expands-collapse">
<p>The Cyber Centre is dedicated to advancing cyber security and increasing the confidence of Canadians in the systems they rely on daily. This includes offering support to <abbr title="critical infrastructure">CI</abbr> and other systems of importance to Canada. We approach security through collaboration, combining expertise from government, industry and academia. Working together, we can increase Canada’s resilience against cyber threats. Cyber security investments will allow <abbr title="operational technology">OT</abbr> asset operators to benefit from new technologies, while avoiding undue risks to the safe and reliable provision of critical services to Canadians.</p>

<p>The following mitigation measures can help water systems operators prevent cyber threat actors from exploiting vulnerable systems, attacking devices and networks and stealing sensitive data. Each of the mitigations below are linked to the Cyber Centre’s <a href="https://www.cyber.gc.ca/en/cyber-security-readiness">Cyber Security Readiness Goals</a> (CRGs). The <abbr title="Cyber Security Readiness Goals">CRG</abbr>s are a set of baseline cyber security practices an organization can take to bolster their cyber security posture. Further details of each goal can be found in the <a href="https://www.cyber.gc.ca/en/cyber-security-readiness/cross-sector-cyber-security-readiness-goals-toolkit">Cross-Sector Cyber Security Readiness Goals Toolkit</a>. The mitigations below are highlighted to help prevent and reduce cyber attacks against the water sector.</p>

<div class="btn-group mrgn-tp-sm mrgn-bttm-md"><button class="btn btn-primary wb-toggle" data-toggle="{&quot;selector&quot;: &quot;details&quot;, &quot;print&quot;: &quot;on&quot;, &quot;stateOn&quot;: &quot;on&quot;, &quot;stateOff&quot;: &quot;off&quot;, &quot;parent&quot;: &quot;#expands-collapse&quot;}" type="button">Expand | collapse all</button></div>

<h3 class="mrgn-tp-md text-info">Protect all management interfaces</h3>

<details><summary><h4>Phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> (CRG 2.7)</h4>
</summary><p>Implement phishing-resistant multi-factor authentication (MFA) for access to assets, including all remote access to the <abbr title="operational technology">OT</abbr> network.<sup id="fn33-rf"><a class="fn-lnk" href="#fn33"><span class="wb-inv">Footnote </span>33</a></sup></p>

<h5><abbr title="information technology">IT</abbr> accounts:</h5>

<p>All <abbr title="information technology">IT</abbr> accounts should leverage <abbr title="multi-factor authentication">MFA</abbr> to access organizational resources. Prioritize accounts with the highest risk, such as privileged administrative accounts for key <abbr title="information technology">IT</abbr> systems.</p>

<h5><abbr title="operational technology">OT</abbr> environments:</h5>

<p>Enable <abbr title="multi-factor authentication">MFA</abbr> on all accounts and systems that can be accessed remotely, including:</p>

<ul><li>vendor or maintenance accounts</li>
	<li>remotely accessible user and engineering workstations</li>
	<li>remotely accessible human-machine interfaces (HMIs)</li>
</ul></details><details><summary><h4>Secure administrator workstation (CRG 2.21)</h4>
</summary><p>Set up and enforce the use of a secure administrator workstation (SAW) for administrators to perform administrative tasks.</p>

<p>A hardened <abbr title="secure administrator workstation">SAW</abbr>:</p>

<ul><li>is not connected to the corporate <abbr title="information technology">IT</abbr> network</li>
	<li>is unable to install other software</li>
	<li>does not have access to the public Internet or email services</li>
</ul><p>In cases where there is an operational requirement to use a <abbr title="secure administrator workstation">SAW</abbr> remotely, secure the <abbr title="secure administrator workstation">SAW</abbr> network traffic by using a layer 3 virtual private network (VPN). The protocols most widely used for <abbr title="virtual private network">VPN</abbr>s are:</p>

<ul><li>Internet Protocol Security (IPSec)</li>
	<li>Transport Layer Security (TLS)</li>
</ul><p>An <abbr title="Internet Protocol Security">IPSec</abbr> <abbr title="virtual private network">VPN</abbr> is an open standard, meaning that anyone can build a client or server that works with other <abbr title="Internet Protocol Security">IPSec</abbr> implementations. <abbr title="Internet Protocol Security">IPSec</abbr> <abbr title="virtual private network">VPN</abbr> encrypts and authenticates all data in both directions and can enforce no split tunneling from the <abbr title="secure administrator workstation">SAW</abbr>.</p>

<p><abbr title="Transport Layer Security">TLS</abbr> <abbr title="virtual private network">VPN</abbr>s often use custom, non-standard features to tunnel traffic via <abbr title="Transport Layer Security">TLS</abbr>. <strong>Using custom or non-standard features creates additional risk exposure</strong>, even when the <abbr title="Transport Layer Security">TLS</abbr> parameters used by products are secure.</p>

<p>Keep in mind that the public Internet may not be reliable in a global crisis or major disaster. As such, local administration must always be maintained as a capability in <abbr title="critical infrastructure">CI</abbr>.</p>
</details><h3 class="text-info">Secure the supply chain</h3>

<details><summary><h4>Vendor/supplier cyber security requirements (CRG 0.2)</h4>
</summary><p>Include cyber security vendor/supplier requirements and questions in organizations’ procurement documents. Ensure those responses are evaluated such that, given two offerings of roughly similar cost and function, the more secure offering and/or supplier is preferred.</p>
</details><h3 class="text-info">Prevent credential theft</h3>

<details><summary><h4>Changing default passwords (CRG 2.0)</h4>
</summary><p>Change default passwords and ensure your organization enforces a policy and/or process that requires changing default manufacturer passwords for all hardware, software and firmware.</p>

<p>If feasible, change default passwords on Programmable Logic Controllers (PLCs) and Human Machine Interfaces (HMIs). Ensure the Unitronics <abbr title="Programmable Logic Controllers">PLC</abbr> default password “1111” is not in use.<sup id="fn33a-rf"><a class="fn-lnk" href="#fn33"><span class="wb-inv">Footnote </span>33</a></sup></p>
</details><details><summary><h4>Email security (CRG 2.11)</h4>
</summary><p>Secure all corporate email infrastructure to reduce the risk of common email-based threats such as spoofing, phishing and interception. On all corporate email infrastructure:</p>

<ul><li>enable STARTTLS</li>
	<li>enable Sender Policy Framework and DomainKeys Identified Mail</li>
	<li>enable Domain-based Message Authentication, Reporting and Conformance (DMARC) and set to “reject”</li>
	<li>encrypt emails to an appropriate and approved level in accordance with the sensitivity of the email contents</li>
</ul></details><details><summary><h4>Basic and <abbr title="operational technology">OT</abbr> cyber security training (CRG 2.8)</h4>
</summary><p>Provide training that covers basic security and privacy concepts and foster an internal culture of security and cyber awareness. Ensure that personnel who maintain or secure <abbr title="operational technology">OT</abbr> as part of their regular duties receive <abbr title="operational technology">OT</abbr>-specific cyber security training at least annually. Training topics should include, at a minimum:</p>

<ul><li>phishing</li>
	<li>business email compromise</li>
	<li>basic operational security</li>
	<li>password security</li>
	<li>privacy breaches</li>
</ul></details><details><summary><h4>Disable macros by default (CRG 2.12)</h4>
</summary><p>Establish a system-enforced policy that disables Microsoft Office macros or similar embedded code by default on all devices. If macros must be enabled in specific circumstances, set a policy that requires users to obtain authorization before macros are enabled for specific assets.</p>
</details><h3 class="text-info">Protect internet-accessible vulnerable assets and services</h3>

<details><summary><h4>No exploitable services on the internet (CRG 2.20)</h4>
</summary><p>Do not expose exploitable services, like remote desktop protocol, to the Internet. Where services must be exposed, implement appropriate compensating controls to prevent common forms of exploitation.</p>
</details><details><summary><h4>Limit <abbr title="operational technology">OT</abbr> connections to public Internet (CRG 2.18)</h4>
</summary><p>Ensure no <abbr title="operational technology">OT</abbr> assets, including <abbr title="Programmable Logic Controllers">PLC</abbr>s, are connected to the public Internet.</p>

<p>In exceptional operational circumstances where remote access to the <abbr title="Programmable Logic Controllers">PLC</abbr> is required, ensure that:</p>

<ul><li>exceptions are justified and documented; and</li>
	<li>additional protections are in place to prevent and detect exploitation attempts such as:
	<ul><li>logging</li>
		<li><abbr title="multi-factor authentication">MFA</abbr></li>
		<li><abbr title="secure administrator workstation">SAW</abbr></li>
		<li>mandatory access via proxy or another intermediary</li>
	</ul></li>
</ul></details><details><summary><h4>Network segmentation (CRG 2.5)</h4>
</summary><p>Establish segmentation across network architecture to create boundaries and limit communication between <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> networks.</p>

<p>Ensure that all connections to the <abbr title="operational technology">OT</abbr> network are denied by default unless explicitly allowed (for example, by IP address and port) for specific system functionality.</p>

<p>Necessary communications paths between the <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> networks must pass through an intermediary (such as a properly configured firewall, bastion host, jump box or a demilitarized zone) which is closely monitored, captures network logs and only allows connections from approved assets.</p>
</details><details><summary><h4>Mitigating known vulnerabilities (CRG 1.1)</h4>
</summary><p>Apply patches for internet-facing systems within a risk-informed timespan, prioritizing the most critical assets first.</p>

<p>Identify security vulnerabilities in your systems by conducting penetration tests and using automated vulnerability scanning tools, activities which are part of a comprehensive vulnerability management strategy.</p>

<p>For <abbr title="operational technology">OT</abbr> assets where patching is not possible or may substantially compromise availability or safety, apply and record compensating controls (such as segmentation or monitoring). Sufficient controls either make the asset inaccessible from the public Internet or reduce the ability of threat actors to exploit the vulnerabilities in these assets.</p>
</details><h3 class="text-info">Improve cyber security incident response capability</h3>

<details><summary><h4>Incident response plans (CRG 1.3)</h4>
</summary><p>Develop, maintain, update and regularly drill <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> cyber security incident response plans for both common and organization-specific threat scenarios and TTPs. Regularly test manual controls so that critical functions can keep running if <abbr title="operational technology">OT</abbr> networks need to be taken offline.</p>
</details><details><summary><h4>Asset inventory and network topology (CRG 1.0)</h4>
</summary><p>Maintain a regularly updated inventory of all assets within the organization’s <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> networks. Include accurate documentation of network topology and identified data assets. Immediately log any new asset that is integrated into the organization’s infrastructure.</p>
</details><details><summary><h4>System backups and redundancy (CRG 2.14)</h4>
</summary><p>Implement regular system backup procedures on both <abbr title="information technology">IT</abbr> and <abbr title="operational technology">OT</abbr> systems. Ensure backups are stored separately from the source systems and test on a recurring basis.</p>

<p>Ensure stored information for <abbr title="operational technology">OT</abbr> assets includes:</p>

<ul><li>configurations</li>
	<li>roles</li>
	<li><abbr title="Programmable Logic Controllers">PLC</abbr> logic</li>
	<li>engineering drawings</li>
	<li>tools</li>
</ul><p>Implement adequate redundancies such as network components and data storage.</p>

<p>Ensure that the redundant secondary system is not collocated with the primary system and can be activated without loss of information or disruption to operations.</p>
</details></div>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info page-header mrgn-tp-xl" id="9">Additional resources</h2>

<p><strong>Assess:</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessments">National Cyber Threat Assessments</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/baseline-cyber-threat-assessment-cybercrime">Baseline cyber threat assessment: Cybercrime</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-supply-chains">The cyber threat from supply chains</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-cyber-threat-operational-technology">Cyber threat bulletin: Cyber threat to operational technology</a></li>
</ul><p><strong>Prepare:</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/cyber-security-readiness/cyber-security-readiness-goals-securing-our-most-critical-systems">Cyber Security Readiness Goals: Securing Our Most Critical Systems</a></li>
	<li><a href="https://www.cyber.gc.ca/en/cyber-security-readiness/cross-sector-cyber-security-readiness-goals-toolkit">Cross-Sector Cyber Security Readiness Goals Toolkit</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/security-considerations-critical-infrastructure-itsap10100">Security considerations for critical infrastructure (ITSAP.10.100)</a></li>
</ul><p><strong>Protect:</strong></p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-cyber-centre-reminds-canadian-critical-infrastructure-operators">Cyber threat bulletin: Cyber Centre reminds Canadian critical infrastructure operators to raise awareness and take mitigations against known Russian-backed cyber threat activity</a></li>
	<li><a href="https://www.cyber.gc.ca/en/news-events/joint-guidance-executives-and-leaders-critical-infrastructure-organizations-protecting-infrastructure-and-essential-functions-against-prc-cyber-activity">Joint guidance for executives and leaders of critical infrastructure organizations on protecting infrastructure and essential functions against <abbr title="People’s Republic of China">PRC</abbr> cyber activity</a></li>
	<li><a href="https://www.cyber.gc.ca/en/news-events/joint-advisory-prc-state-sponsored-actors-compromising-and-maintaining-persistent-access-us-critical-infrastructure-and-joint-guidance-identifying-and-mitigating-living-land-0">Joint advisory on <abbr title="People’s Republic of China">PRC</abbr> state-sponsored actors compromising and maintaining persistent access to U.S. critical infrastructure and joint guidance on identifying and mitigating living off the land</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protect-your-operational-technology-itsap00051">Protect your operational technology (ITSAP.00.051)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-supply-chain-approach-assessing-risk-itsap10070">Cyber supply chain: An approach to assessing risk (ITSAP.10.070)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protecting-your-organization-software-supply-chain-threats-itsm10071">Protecting your organization from software supply chain threats (ITSM.10.071)</a></li>
</ul></section><!--FOOTNOTE SECTION EN--><aside class="wb-fnote" role="note"><h2 class="text-info" id="10">References</h2>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p>National Research Council (U.S.) Safe Drinking Water Committee. <a href="https://www.ncbi.nlm.nih.gov/books/NBK234165/">Drinking Water and Health: Volume 1. Historical Note</a>. National Academies Press. 1977.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>City of Calgary Newsroom. <a href="https://newsroom.calgary.ca/update-2-critical-water-main-break-affecting-city-wide-water-usage/">Update June 6: Critical water main break affecting City wide water usage</a>. June 6, 2024; Matthew Lapierre. <a href="https://www.cbc.ca/news/canada/montreal/muhc-water-main-break-1.7261560">Services resuming at MUHC Glen site after major water main break</a>. CBC News. July 12, 2024.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p>Public Safety Canada. <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/crtcl-nfrstrctr/cci-iec-en.aspx">Canada’s Critical Infrastructure</a>. May 19, 2020.</p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p>Public Safety Canada. <a href="https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/index-en.aspx">National Strategy for Critical Infrastructure</a>. June 1, 2021.</p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p>Government of Canada. <a href="https://www.canada.ca/en/environment-climate-change/services/water-overview/governance-legislation/shared-responsibility.htm">Water governance and legislation: shared responsibility</a>. Retrieved December 1, 2024.</p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p>Canadian Centre for Cyber Security. <a href="https://cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2020">National Cyber Threat Assessment 2020</a>. November 16, 2020.</p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p>Ariel Stern, Yair Poleg. <a href="https://www.watercanada.net/feature/cyber-security-for-water-utilities/">Cyber security for water utilities</a>. Water Canada. August 9, 2021.</p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 8</dt>
	<dd id="fn8">
	<p>Kevin Johnson, Pete Perciavalle and D. Wilcoxson. <a href="https://www.stantec.com/en/ideas/spotlight/2023/chicago-red-line/time-to-invest-water-automation-how-to-tackle-5-operational-technology-challenges">How to tackle 5 operational technology challenges for water utilities</a>. May 15, 2024.</p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote</span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 9</dt>
	<dd id="fn9">
	<p>Magnus Arnell, Maya Miltell and Gustaf Olsson. <a href="https://www.sciencedirect.com/science/article/pii/S2589914723000063">Making waves: A vision for digital water utilities</a>. Water Research 19:7. May 1, 2023.</p>

	<p class="fn-rtn"><a href="#fn9-rf"><span class="wb-inv">Return to footnote</span>9<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 10</dt>
	<dd id="fn10">
	<p>Canadian Centre for Cyber Security. <a href="https://cyber.gc.ca/en/guidance/cyber-threat-bulletin-cyber-threat-operational-technology">Cyber Threat Bulletin: The Cyber Threat to Operational Technology</a>. December 16, 2021.</p>

	<p class="fn-rtn"><a href="#fn10-rf"><span class="wb-inv">Return to footnote</span>10<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 11</dt>
	<dd id="fn11">
	<p>Censys. <a href="https://censys.com/blog/research-report-internet-connected-industrial-control-systems-part-one">Research Report: Internet-Connected Industrial Control Systems</a>. August 7, 2024.</p>

	<p class="fn-rtn"><a href="#fn11-rf"><span class="wb-inv">Return to footnote</span>11<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 12</dt>
	<dd id="fn12">
	<p>MITRE. <a href="https://www.mitre.org/news-insights/publication/malicious-control-system-cyber-security-attack-case-study-maroochy-0">Malicious Control System Cyber Security Attack Case Study: Maroochy Water Services, Australia</a>. August 1, 2008.</p>

	<p class="fn-rtn"><a href="#fn12-rf"><span class="wb-inv">Return to footnote</span>12<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 13</dt>
	<dd id="fn13">
	<p>Tony Smith. <a href="https://www.theregister.com/2001/10/31/hacker_jailed_for_revenge_sewage/">Hacker jailed for revenge sewage attacks</a>. The Register. October 31, 2001.</p>

	<p class="fn-rtn"><a href="#fn13-rf"><span class="wb-inv">Return to footnote</span>13<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 14</dt>
	<dd id="fn14">
	<p>Global Affairs Canada. <a href="https://www.canada.ca/en/global-affairs/news/2021/04/statement-on-solarwinds-cyber-compromise.html">Statement on SolarWinds Cyber Compromise</a>. April 15, 2021.</p>

	<p class="fn-rtn"><a href="#fn14-rf"><span class="wb-inv">Return to footnote</span>14<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 15</dt>
	<dd id="fn15">
	<p>Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa18-284a">Cybersecurity Advisory AA18-284A - Publicly Available Tools Seen in Cyber Incidents Worldwide</a>. June 30, 2020; Joao Marques, John Fokker and Leandro Velasco. <a href="https://www.trellix.com/blogs/research/disrupting-cobalt-strike-with-threat-intelligence/">Cracking Cobalt Strike</a>. Trellix. July 3, 2024.</p>

	<p class="fn-rtn"><a href="#fn15-rf"><span class="wb-inv">Return to footnote</span>15<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 16</dt>
	<dd id="fn16">
	<p>Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a">Cybersecurity Advisory AA24-038A - <abbr title="People’s Republic of China">PRC</abbr> State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure</a>. February 7, 2024; Jungsoo An, Asheer Malhotra, Brandon White and Vitor Ventura. <a href="https://blog.talosintelligence.com/uat-5918-targets-critical-infra-in-taiwan/">UAT-5918 targets critical infrastructure entities in Taiwan</a>. Talos. March 20, 2025; Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-200a">Cybersecurity Advisory AA21-200A - Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department</a>. July 20, 2021.</p>

	<p class="fn-rtn"><a href="#fn16-rf"><span class="wb-inv">Return to footnote</span>16<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 17</dt>
	<dd id="fn17">
	<p>Bart Lenaerts-Bergmans. <a href="https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/living-off-the-land-attack/">What are living off the Land (LOTL) attacks?</a> CrowdStrike. February 21, 2023.</p>

	<p class="fn-rtn"><a href="#fn17-rf"><span class="wb-inv">Return to footnote</span>17<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 18</dt>
	<dd id="fn18">
	<p>Microsoft Threat Intelligence. <a href="https://www.microsoft.com/en-us/security/blog/2018/09/27/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av/">Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV | Microsoft Security Blog</a>. September 17, 2018.</p>

	<p class="fn-rtn"><a href="#fn18-rf"><span class="wb-inv">Return to footnote</span>18<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 19</dt>
	<dd id="fn19">
	<p>Canadian Centre for Cyber Security. <a href="https://www.cyber.gc.ca/en/guidance/baseline-cyber-threat-assessment-cybercrime">Baseline cyber threat assessment: Cybercrime</a>. August 28, 2023.</p>

	<p class="fn-rtn"><a href="#fn19-rf"><span class="wb-inv">Return to footnote</span>19<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 20</dt>
	<dd id="fn20">
	<p>Federal Bureau of Investigation Internet Crime Complaint Center. <a href="https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf">Internet Crime Report 2023</a>. April 4, 2024; Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/resources-tools/resources/ransomware-threat-ot">Ransomware Threat to <abbr title="operational technology">OT</abbr></a>. June 9, 2021.</p>

	<p class="fn-rtn"><a href="#fn20-rf"><span class="wb-inv">Return to footnote</span>20<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 21</dt>
	<dd id="fn21">
	<p>Trend Micro. <a href="https://newsroom.trendmicro.com/2022-06-02-Cyber-Attacks-on-Industrial-Assets-Cost-Firms-Millions">Cyber-Attacks on Industrial Assets Cost Firms Millions</a>. June 2, 2022.</p>

	<p class="fn-rtn"><a href="#fn21-rf"><span class="wb-inv">Return to footnote</span>21<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 22</dt>
	<dd id="fn22">
	<p>Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-287a">Cybersecurity Advisory AA21-287A - Ongoing Cyber Threats to U.S. Water and Wastewater Systems</a>. October 25, 2021; Sergiu Gatlan. <a href="https://www.bleepingcomputer.com/news/security/kansas-water-plant-cyberattack-forces-switch-to-manual-operations/">Kansas water plant cyberattack forces switch to manual operations</a>. September 24, 2024.</p>

	<p class="fn-rtn"><a href="#fn22-rf"><span class="wb-inv">Return to footnote</span>22<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 23</dt>
	<dd id="fn23">
	<p>SANS Institute. <a href="https://www.sans.org/blog/ransomware-cases-increased-greatly-in-2023/">Ransomware Cases Increased by 73% in 2023 showing our actions have not been enough to thwart the threat</a>. January 15, 2024; Sophos. <a href="https://news.sophos.com/en-us/2024/04/30/the-state-of-ransomware-2024/">The State of Ransomware 2024</a>. April 30, 2024; Verizon. <a href="https://www.verizon.com/about/news/2023-data-breach-investigations-report">2023 Data Breach Investigations Report: frequency and cost of social engineering attacks skyrocket</a>. June 6, 2023; Fortinet. <a href="https://www.fortinet.com/content/dam/fortinet/assets/reports/report-2023-ransomware-global-research.pdf">The 2023 Global Ransomware Report</a>. April 20, 2023.</p>

	<p class="fn-rtn"><a href="#fn23-rf"><span class="wb-inv">Return to footnote</span>23<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 24</dt>
	<dd id="fn24">
	<p>Canadian Centre for Cyber Security. <a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a>. October 30, 2024.</p>

	<p class="fn-rtn"><a href="#fn24-rf"><span class="wb-inv">Return to footnote</span>24<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 25</dt>
	<dd id="fn25">
	<p>Microsoft Threat Intelligence. <a href="https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/">Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself</a>. May 9, 2022.</p>

	<p class="fn-rtn"><a href="#fn25-rf"><span class="wb-inv">Return to footnote</span>25<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 26</dt>
	<dd id="fn26">
	<p>Alicia Hope. <a href="https://www.cpomagazine.com/cyber-security/water-companies-veolia-north-america-and-uks-southern-water-ransomware-attack-and-data-breach-leaked-pii/">Water Companies Veolia North America and UK’s Southern Water Ransomware Attack and Data Breach Leaked PII</a>. CPO Magazine. February 2, 2024.</p>

	<p class="fn-rtn"><a href="#fn26-rf"><span class="wb-inv">Return to footnote</span>26<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 27</dt>
	<dd id="fn27">
	<p>Canadian Centre for Cyber Security. <a href="https://cyber.gc.ca/en/guidance/cyber-threat-bulletin-ransomware-threat-2021">Cyber threat bulletin: The ransomware threat in 2021</a>. December 16, 2021.</p>

	<p class="fn-rtn"><a href="#fn27-rf"><span class="wb-inv">Return to footnote</span>27<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 28</dt>
	<dd id="fn28">
	<p>U.S. Department of Justice. <a href="https://www.justice.gov/archives/ag/page/file/1076696/download">Report of The Attorney General’s Cyber Digital Task Force</a>. July 2, 2018; Joseph Berger. <a href="https://www.nytimes.com/2016/03/26/nyregion/rye-brook-dam-caught-in-computer-hacking-case.html">A Dam, Small and Unsung, Is Caught Up in an Iranian Hacking Case</a>. The New York Times. March 25, 2016.</p>

	<p class="fn-rtn"><a href="#fn28-rf"><span class="wb-inv">Return to footnote</span>28<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 29</dt>
	<dd id="fn29">
	<p>Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a">Cybersecurity Advisory AA23-335A - IRGC-Affiliated Cyber Actors Exploit <abbr title="Programmable Logic Controllers">PLC</abbr>s in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities</a>. December 18, 2024.</p>

	<p class="fn-rtn"><a href="#fn29-rf"><span class="wb-inv">Return to footnote</span>29<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 30</dt>
	<dd id="fn30">
	<p>Microsoft Security Blog. <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Volt Typhoon targets U.S. critical infrastructure with living-off-the-land techniques</a>. May 24, 2023.</p>

	<p class="fn-rtn"><a href="#fn30-rf"><span class="wb-inv">Return to footnote</span>30<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 31</dt>
	<dd id="fn31">
	<p>CISA. <a href="https://www.cisa.gov/sites/default/files/2024-05/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activity-508c.pdf">Defending <abbr title="operational technology">OT</abbr> Operations against Ongoing Pro-Russia Hacktivist Activity</a>. May 1, 2024.</p>

	<p class="fn-rtn"><a href="#fn31-rf"><span class="wb-inv">Return to footnote</span>31<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 32</dt>
	<dd id="fn32">
	<p>U.S. Department of the Treasury. <a href="https://home.treasury.gov/news/press-releases/jy2473">Press Release - Treasury Sanctions Leader and Primary Member of the Cyber Army of Russia Reborn</a>. July 19, 2024.</p>

	<p class="fn-rtn"><a href="#fn32-rf"><span class="wb-inv">Return to footnote</span>32<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 33</dt>
	<dd id="fn33">
	<p>Cybersecurity and Infrastructure Security Agency. <a href="https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems">Alert - Exploitation of Unitronics <abbr title="Programmable Logic Controllers">PLC</abbr>s used in Water and Wastewater Systems</a>. November 28, 2023.</p>

	<p class="fn-rtn"><a href="#fn33-rf"><span class="wb-inv">Return to footnote</span>33<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks"/><title><![CDATA[Don't take the bait: Recognize and avoid phishing attacks - ITSAP.00.101]]></title><updated>2025-11-24T13:08:28Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="734" about="/en/guidance/dont-take-bait-recognize-and-avoid-phishing-attacks" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row"><!--Info across the top under the image-->
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>November 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.101</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>November 2025 | Awareness series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg"><!--<div class="mrgn-bttm-md well well-sm col-md-4 pull-right mrgn-lft-md col-sm-12 col-xs-12">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/ITSAP00101-e.pdf">Don't take the bait: Recognize and avoid phishing attacks&nbsp;- ITSAP.00.101 (PDF,&nbsp;307&nbsp;KB)</a></p>
</div>-->
<p>Phishing is a form of social engineering where threat actors send communications that appear legitimate to trick or motivate individuals into:</p>

<ul><li>revealing sensitive or personal information</li>
	<li>clicking on links that direct them to malicious websites</li>
	<li>downloading malicious attachments</li>
	<li>transferring money</li>
</ul><section><h2 class="text-info h3">On this page</h2>

<ul><li><a href="#1">Types of phishing</a></li>
	<li><a href="#2">Artificial intelligence and phishing</a></li>
	<li><a href="#3">How to identify a phishing attack</a></li>
	<li><a href="#4">How to protect your organization from phishing</a></li>
	<li><a href="#5">Learn more</a></li>
</ul></section></div>
</div>

<h2 class="text-info" id="1">Types of phishing</h2>

<p>Phishing attempts are often generic mass messages that appear to be legitimate messages from a trusted source (for example, a bank, online retailer, courier service, or utility company). Threat actors often take advantage of crises, conflicts or world events to launch phishing attacks against individuals, financial institutions, governments and critical infrastructure sectors.</p>

<p>The are several types of phishing.</p>

<h3>Deceptive phishing</h3>

<p>Deceptive phishing is one of the most common types of attack and occurs when a cybercriminal pretends to be a legitimate company to steal your personal information or login credentials. The threat actor may send you a link to a fraudulent website that closely mimics an official site, using deliberate misspellings that look almost identical to a legitimate URL. Threat actors may also send a quick response (QR) code, which makes it more difficult for potential victims to spot the attack.</p>

<p>Common deceptive phishing techniques include:</p>

<ul><li><strong>homograph exploits:</strong> threat actors use characters from different alphabets (for example, Cyrillic or Greek) that look almost identical to standard Latin letters but are coded differently, for example in “www.<span>аррle</span>.com” the “a” and “p” are from the Cyrillic alphabet, but look like their Latin counterparts</li>
	<li><strong>typo squatting:</strong> threat actors register domain names that are common misspellings of well-known websites, exploiting typing errors so that potential victims are not always aware that they are on the wrong website</li>
	<li><strong>legitimate-looking subdomains:</strong> threat actors take control of a subdomain that is no longer actively used by its legitimate owner or create subdomains that mimic legitimate ones (for example, “login.google.com.example.com” instead of “login.google.com”), often using names, logos or branding elements that are similar to legitimate ones</li>
</ul><h3>Spear phishing</h3>

<p>Spear phishing is a personalized attack that targets a specific individual, company or organization. The message includes personal details about the potential victim, such as interests, recent online activities or purchases.</p>

<h3>Whaling</h3>

<p>Whaling is a personalized attack that targets a big “phish” like a CEO or executive. A threat actor chooses these targets because of their level of authority and possible access to more sensitive information or large amounts of money.</p>

<h3>Quishing</h3>

<p>Quishing is a phishing attack that uses <abbr title="quick response">QR</abbr> codes. The threat actor may send a <abbr title="quick response">QR</abbr> code via email, cover a legitimate <abbr title="quick response">QR</abbr> code with a malicious <abbr title="quick response">QR</abbr> code or place a malicious <abbr title="quick response">QR</abbr> code in a public, high-traffic area. The victim scans the <abbr title="quick response">QR</abbr> code, which redirects them to a malicious website. Quishing can bypass email security protection that scans for malicious links and attachments.</p>

<h3>Smishing</h3>

<p>A smishing attack uses deceptive short message service (SMS), also known as text messages, to manipulate victims into divulging sensitive personal information such as bank account details, credit card numbers or login credentials.</p>

<h3>Vishing</h3>

<p>Vishing is short for “voice phishing” and involves defrauding people over the phone and getting them to divulge sensitive information. A threat actor can fake or spoof their caller ID information or use a voice changer to make victims believe they are legitimate. Voices generated by artificial intelligence (AI) can sound like family members or friends.</p>

<p>A vishing scheme may also target the victim’s voice. In this instance, the threat actor collects a sample of the victim’s voice to conduct fraud (for example, to use the sample for voice authentication to access an account).</p>

<h3>Angler phishing</h3>

<p>Angler phishing is an emerging cyber threat that leverages social media platforms to post attractive but false information to “lure” targets into initiating contact. Threat actors may impersonate legitimate companies or brands through fake accounts, posts, direct messages or ads. They often create fake customer support profiles or use social media interactions (for example, responding to complaints or questions) to convince users to click on malicious links, visit counterfeit websites or share personal details.</p>

<p>This is a powerful attack because the target initiates contact with the threat actor—bypassing trust concerns—and provides an immediate and active interaction, rather than a passive and delayed interaction.</p>

<h3>Catfishing</h3>

<p>Catfishing is typically conducted through online platforms like dating websites. The threat actor fakes an identity or creates a persona to gain the target’s trust and defraud or extort them. The threat actor, or catfish, generally makes excuses to avoid in-person interactions. One of the more common forms of catfishing involves tricking the victim into an online romantic relationship.</p>

<h3>Pharming</h3>

<p>Pharming is a more advanced technique in which cybercriminals try to redirect users to fake websites that look identical to legitimate ones, like online banking sites, e-commerce platforms or social media networks. The goal of these attacks is to trick users into providing sensitive or personal information, such as usernames, passwords or credit card numbers.</p>

<p>While phishing relies on emails or messages to trick users into providing personal information, pharming uses malware or manipulates domain name systems (DNS) to redirect users to fraudulent websites designed to capture their personal information.</p>

<h2 class="text-info" id="2">Artificial intelligence and phishing</h2>

<p><abbr title="artificial intelligence">AI</abbr> is rapidly reshaping the cyber security landscape, introducing enhanced capabilities for defence and new avenues for exploitation. One concerning emerging threat is the use of <abbr title="artificial intelligence">AI</abbr> to automate and refine phishing attacks. <abbr title="artificial intelligence">AI</abbr> enhances the effectiveness of phishing attacks and reduces the time and effort needed for threat actors to conduct these attacks.</p>

<p>Recent advances in generative <abbr title="artificial intelligence">AI</abbr> make it more difficult for users to identify phishing attempts. Generative <abbr title="artificial intelligence">AI</abbr> can be used to produce highly realistic content, including text, images, video and audio. The content is enhanced and is more realistic, making it harder to distinguish between fraudulent and legitimate communications.</p>

<p><abbr title="artificial intelligence">AI</abbr> also enables threat actors to gather and analyze publicly available data on potential targets, allowing them to craft highly personalized spear phishing and whaling messages.</p>

<p>These messages can be tailored to reflect individual interests, online activity, familial connections or professional relationships—substantially increasing the likelihood of victims engaging with the threat actor.</p>

<p><abbr title="artificial intelligence">AI</abbr> is also playing a critical role in strengthening our cyber defences. Sophisticated <abbr title="artificial intelligence">AI</abbr>-based intrusion detection systems can analyze large volumes of data, assess user behaviour, examine metadata and message content, and identify anomalies that may indicate a threat. These systems enable faster, more accurate identification and mitigation of phishing attempts and other cyber risks. As the threat landscape evolves, organizations must continue to invest in both <abbr title="artificial intelligence">AI</abbr> technology and <abbr title="artificial intelligence">AI</abbr> awareness to stay ahead of increasingly sophisticated attacks.</p>

<h2 class="text-info" id="3">How to identify a phishing attack</h2>

<p>Phishing attacks can be delivered in many ways, but they all play on trust, urgency and other aspects of human psychology. Fear, excitement, authority, curiosity and trust could all be reactions to a phishing message. Phishing attacks typically follow a similar sequence. Knowing how to identify these steps can help protect your organization against phishing.</p>

<h3>Step 1: The bait</h3>

<p>As described above, there are many ways that the threat actor can set the bait. They may craft a message that appears to come from a well-known bank or service provider. They use spoofing techniques and send the message to numerous recipients in the hope that some will take the bait.</p>

<p>In spear phishing and whaling attacks, the threat actor first gathers details about the target. For example, they harvest information from social media profiles, company websites and Internet activity to create a customized message.</p>

<p>In vishing attacks, the threat actor might use a computerized auto-dialler (known as a robocall) or an <abbr title="artificial intelligence">AI</abbr>-generated voice of a known person to deliver the fraudulent message to many victims.</p>

<h3>Step 2: The hook</h3>

<p>The hook occurs when the victim believes the message is from a trusted source and the message contains information that entices the victim to take immediate action. For example, the message may ask the user to resolve an urgent issue with their account.</p>

<p>If the victim clicks the link in the message, they will unknowingly be redirected to the threat actor’s fake version of the real website. The victim provides sensitive information, such as login credentials, which is sent to the threat actor. If the victim opens an infected attachment, their device may become infected if the malicious code executes.</p>

<h3>Step 3: The attack</h3>

<p>Threat actors can use stolen user credentials to access the victim’s accounts. They may use an infiltrated email account to send more phishing emails to the victim’s contacts. If the victim has privileged access (for example, to an organization or company account, system or network), the threat actor could gain access to sensitive corporate data and critical systems.</p>

<p>If a threat actor successfully deploys malware to your organization’s network or systems, they can use it to gain control of devices, steal data or deny access to files—for example, by encrypting them—until a ransom is paid.</p>

<h3>Phishing characteristics</h3>

<p>Although <abbr title="artificial intelligence">AI</abbr> is making it hard to detect certain phishing characteristics, such as poor spelling or a robotic tone, there are other signs to be aware of.</p>

<p>Something may be <strong>phishy</strong> if:</p>

<ul><li>the sender makes an urgent request with a deadline</li>
	<li>the sender requests your personal or confidential information</li>
	<li>the sender asks you to log in via a provided link</li>
	<li>the offer sounds too good to be true</li>
	<li>the communication is unsolicited and includes:
	<ul><li>attachments</li>
		<li>links to websites or web forms (these may be spoofed)</li>
		<li><abbr title="quick response">QR</abbr> codes</li>
		<li>login pages</li>
		<li>a claim to be government or bank officials</li>
	</ul></li>
	<li>you don’t recognize the sender
	<ul><li>remember, addresses can be spoofed</li>
		<li>a known sender isn’t necessarily a trusted sender</li>
	</ul></li>
</ul><h2 class="text-info" id="4">How to protect your organization from phishing</h2>

<p>You can protect your organization’s information and infrastructure from phishing attacks by:</p>

<ul><li>using trusted anti-phishing technology, such as the <a href="https://www.cira.ca/en/cybersecurity/">Canadian Internet Registration Authority (CIRA) Canadian Shield</a> <abbr title="domain name systems">DNS</abbr> resolver</li>
	<li>using anti-phishing software that aligns with the <a href="https://dmarc.org/">Domain-based Message Authentication, Reporting, and Conformance (DMARC) policy</a></li>
	<li>backing up information so that you have another copy</li>
	<li>applying software updates and patches</li>
	<li>blocking <abbr title="internet protocol">IP</abbr> addresses, domain names and file types that are known to be malicious</li>
	<li>favouring in-person interactions, using cash and meeting in the office whenever possible; threat actors will try to find ways to avoid in-person interactions</li>
	<li>establishing protocols and procedures for your employees to verify and report suspicious communications internally</li>
	<li>using multi-factor authentication (MFA) on all systems, especially on shared corporate media accounts</li>
	<li>updating your organization’s incident response plan to include steps to take in response to a successful phishing attack</li>
</ul><p>Your employees can reduce their risk of falling victim to a phishing attack by:</p>

<ul><li>remaining calm; phishing depends on creating a sense of urgency</li>
	<li>avoiding sending sensitive information by email or text</li>
	<li>reducing the amount of personal information they post online</li>
	<li>enabling a spam blocker in their mobile device application settings</li>
	<li>avoiding using any form of simplified contact response, such as clicking on hyperlinks, loading <abbr title="quick response">QR</abbr> codes or replying to suspicious texts</li>
	<li>filtering spam emails (unsolicited junk emails sent in bulk)</li>
	<li>verifying the sender’s legitimacy by contacting the sender through a separate channel, for example:
	<ul><li>if they receive a call from their bank, hanging up and visiting or calling their local branch</li>
		<li>if they receive an email from their Internet service provider, contacting the service provider through their web form</li>
		<li>if they receive a text from a company or provider on their phone, responding by email from their computer</li>
	</ul></li>
	<li>avoiding <abbr title="short message service">SMS</abbr> over the air, flash call (a near-instant dropped call that is automatically placed to a mobile number) and <abbr title="short message service">SMS</abbr> as an <abbr title="multi-factor authentication">MFA</abbr> method</li>
</ul><h3>Training and awareness</h3>

<p>Employees should understand the importance of protecting their personal information and the organization’s information. Employees who are unaware of the signs of a social engineering attack might reveal information, whether sensitive or not. They may also unknowingly infect organizational devices, systems and networks.</p>

<p>Phishing attacks are less likely to be successful when your workforce is informed and has received training on how to handle personal information, such as privacy awareness training, and on cyber security best practices. Organizations should also conduct internal phishing simulations to enhance employees’ understanding of the risks. This will help employees detect and avoid phishing attacks in a safe environment.</p>

<p>Organizations can discuss smishing and vishing protection mechanisms with their telecommunications providers. Often, mobile network operators are better positioned to block attempts before these attempts reach users.</p>

<h2 class="text-info" id="5">Learn more</h2>

<ul><li><a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002)</a></li>
	<li><a href="/en/guidance/how-updates-secure-your-device-itsap10096">How updates secure your device (ITSAP.10.096)</a></li>
	<li><a href="/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware (ITSAP.00.057)</a></li>
	<li><a href="/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication (ITSAP 30.030)</a></li>
	<li><a href="/en/guidance/spotting-malicious-email-messages-itsap00100">Spotting malicious email messages (ITSAP.00.100)</a></li>
	<li><a href="/en/guidance/implementation-guidance-email-domain-protection">Implementation guidance: email domain protection (ITSP.40.065 v1.1)</a></li>
	<li><a href="/en/guidance/security-considerations-qr-codes-itsap00141">Security considerations for <abbr title="quick response">QR</abbr> codes (ITSAP.00.141)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-mitigating-risks-bulletproof-hosting-providers</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-mitigating-risks-bulletproof-hosting-providers"/><title><![CDATA[Joint guidance on mitigating risks from bulletproof hosting providers]]></title><updated>2025-11-19T14:05:31Z</updated><summary><![CDATA[This joint guidance provides recommendations to Internet service providers (ISPs) and network defenders to mitigate potential cybercriminal activity enabled by BPH providers.]]></summary><content><![CDATA[<article data-history-node-id="6988" about="/en/news-events/joint-guidance-mitigating-risks-bulletproof-hosting-providers" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States’ Cybersecurity and Infrastructure Security Agency (CISA), and the following international partners in releasing cyber security guidance on mitigating risks from bulletproof hosting (BPH) providers:</p>

<ul><li>Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC)</li>
	<li>Netherlands’ National Cyber Security Centre (NCSC-NL)</li>
	<li>New Zealand’s National Cyber Security Centre (NCSC-NZ)</li>
	<li>United Kingdom’s National Cyber Security Centre (NCSC-UK)</li>
	<li>United States’ Department of Defense Cyber Crime Center (DC3)</li>
	<li>United States’ Federal Bureau of Investigation (FBI)</li>
	<li>United States’ National Security Agency (NSA)</li>
</ul><p>A <abbr title="bulletproof hosting">BPH</abbr> provider is an Internet infrastructure supplier that intentionally markets and leases its infrastructure to threat actors. <abbr title="bulletproof hosting">BPH</abbr> providers pose a significant risk to the resilience and safety of critical systems and services.</p>

<p>This joint guidance provides recommendations to Internet service providers (ISPs) and network defenders to mitigate potential cybercriminal activity enabled by <abbr title="bulletproof hosting">BPH</abbr> providers. By applying these mitigations, <abbr title="Internet service providers">ISPs</abbr> and network defenders can help reduce the effectiveness of <abbr title="bulletproof hosting">BPH</abbr> infrastructures and potentially force threat actors to use legitimate infrastructure providers instead.</p>

<p>Read the full joint publication: <a href="https://www.cisa.gov/resources-tools/resources/bulletproof-defense-mitigating-risks-bulletproof-hosting-providers">Bulletproof defense: Mitigating risks from bulletproof hosting providers</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-microsoft-exchange-server-security-best-practices</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-microsoft-exchange-server-security-best-practices"/><title><![CDATA[Joint guidance on Microsoft Exchange Server security best practices]]></title><updated>2025-10-30T16:14:44Z</updated><summary><![CDATA[This joint guidance provides security best practices to help administrators harden on-premises Exchange servers by enforcing a prevention posture and hardening authentication and encryption.]]></summary><content><![CDATA[<article data-history-node-id="6924" about="/en/news-events/joint-guidance-microsoft-exchange-server-security-best-practices" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States’ National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) as well as the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) in releasing guidance on Microsoft Exchange Server security best practices.</p>

<p>Many organizations rely on Microsoft Exchange for critical communications, which require protection from threat actors. Reported abuse and exploitation of vulnerabilities within Exchange further demonstrates the importance of implementing security best practices.</p>

<p>Prevention and hardening defences are critical for Exchange servers to mitigate various types of compromises and protect the sensitive information and communications they manage.</p>

<p>This joint guidance provides security best practices to help administrators harden on-premises Exchange servers by enforcing a prevention posture and hardening authentication and encryption.</p>

<p>Read the full joint publication: <a href="https://www.nsa.gov/Portals/75/documents/resources/cybersecurity-professionals/CSI_Microsoft_Exchange_Server_Security_Best_Practices.pdf?ver=9mpKKyUrwfpb9b9r4drVMg%3d%3d">Microsoft Exchange Server security best practices (PDF)</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/defending-against-adversary-middle-threats-phishing-resistant-multi-factor-authentication-itsm30031</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/defending-against-adversary-middle-threats-phishing-resistant-multi-factor-authentication-itsm30031"/><title><![CDATA[Defending against adversary-in-the-middle threats with phishing-resistant multi-factor authentication (ITSM.30.031)]]></title><updated>2025-10-30T16:10:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6927" about="/en/guidance/defending-against-adversary-middle-threats-phishing-resistant-multi-factor-authentication-itsm30031" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>October 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Management series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSM.30.031</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>October 2025 | Management series</strong></p>
</div>

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsm.30.031-e.pdf">Defending against adversary-in-the-middle threats with phishing-resistant multi-factor authentication – ITSM.30.031 (PDF, 1.5 MB)</a></p>
</div>

<h2 class="text-info mrgn-tp-0" id="0">Overview</h2>

<p>In the ever-evolving landscape of cyber security, the rise of adversary-in-the-middle (AitM) phishing poses a significant threat to organizations. <abbr title="adversary-in-the-middle">AitM</abbr> phishing has become increasingly popular among threat actors as organizations move to the cloud, shifting the frontline from defending traditional network perimeters to prioritizing identity protection.</p>

<p>Security requirements have grown increasingly complex, particularly in cloud environments, and threat actors have refined their tactics. As a result, implementing phishing-resistant multi-factor authentication (MFA) is critical for organizations to maintain strong cyber security.</p>

<p>This publication provides details on observed <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns to highlight their prevalence and demonstrate the risk of leaving cloud accounts vulnerable. All findings in this publication are based on over 100 campaigns that the Canadian Centre for Cyber Security (Cyber Centre) detected targeting Microsoft Entra ID accounts between 2023 and early 2025. Although this is not a comprehensive overview of all <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns happening globally, it offers a snapshot of how widespread these campaigns have become.</p>

<p>This publication aims to:</p>

<ul><li>provide a comprehensive understanding of where these threats originate</li>
	<li>highlight the need for all organizations to strengthen defences by employing phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> by default</li>
	<li>provide recommendations to enhance organizations’ security postures against these sophisticated campaigns</li>
</ul></div>
</div>

<section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#0">Overview</a></li>
	<li><a href="#1">Understanding adversary-in-the-middle phishing and its impact</a></li>
	<li><a href="#2">Transition to proxy-based adversary-in-the-middle phishing</a></li>
	<li><a href="#3">Adversary-in-the-middle phishing trends and techniques</a>
	<ul><li><a href="#3.1">Business email compromise phishing campaigns</a></li>
		<li><a href="#3.2">Living off trusted sites techniques</a></li>
	</ul></li>
	<li><a href="#4">Targeted sectors</a></li>
	<li><a href="#5">The importance of phishing-resistant multi-factor authentication</a></li>
	<li><a href="#6">Enhancing defences against evolving adversary-in-the-middle threats</a>
	<ul><li><a href="#6.1">Addressing high-risk gaps and vulnerabilities</a></li>
		<li><a href="#6.2">Educating employees</a></li>
	</ul></li>
	<li><a href="#7">Summary</a></li>
</ul></details></section><section><h2 class="text-info" id="1">Understanding adversary-in-the-middle phishing and its impact</h2>

<p><abbr title="adversary-in-the-middle">AitM</abbr> phishing is a technique where a threat actor intercepts the connection between a user and a login server. The threat actor captures all usernames, passwords, <abbr title="multi-factor authentication">MFA</abbr> secrets and tokens transferred over that connection. Users typically receive a phishing email with a link to a malicious phishing site impersonating a legitimate website. The user is then tricked into providing their login details and completing the <abbr title="multi-factor authentication">MFA</abbr> process. The threat actor logs that information to impersonate the user later.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center">Figure 1: Phishing campaign by threat actor</figcaption><img alt="Figure 1 - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/fig1-itsm.30.031-e.png" /></figure><details><summary>Long description - Figure 1: Phishing campaign by threat actor</summary><p>This figure illustrates how a threat actor might route and deliver a phishing email with a link to an <abbr title="adversary-in-the-middle">AitM</abbr> phishing site.</p>

<ol><li>The user receives a phishing email with a link.</li>
	<li>The user goes to the site, where they see what appears to be a legitimate login portal.</li>
	<li>The <abbr title="adversary-in-the-middle">AitM</abbr> site then proxies all connections to the login portal.</li>
	<li>The login portal prompts the user for multi-factor authentication (MFA).</li>
	<li>The user completes non-phishing-resistant <abbr title="multi-factor authentication">MFA</abbr>.</li>
	<li>This action returns a validated token and session cookie to the <abbr title="adversary-in-the-middle">AitM</abbr> site.</li>
	<li>The phishing site redirects the user to a different site that appears to be legitimate.</li>
</ol></details></div>
</div>

<p><abbr title="adversary-in-the-middle">AitM</abbr> phishing is not a new concept. It has become increasingly popular among threat actors since organizations moved to the cloud. Before that, organizations worked hard to defend their frontline—the network perimeter—with firewalls and virtual private networks (VPNs). Now, organizations must strengthen cyber security to defend their new frontline, the cloud. To do this, they must protect cloud identity with a modernized set of tools, such as conditional access policies (CAPs) and <abbr title="multi-factor authentication">MFA</abbr>.</p>

<p>It is difficult to secure a cloud environment against <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns. The cloud comes with complex security requirements that are constantly changing as threat actors increase campaigns against cloud identities. This highlights the importance of the shared responsibility model, where both clients and cloud service providers (CSPs) work together to build a robust security posture. Phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> is the new industry standard. It ensures stronger identity security and is more resilient than relying solely on passwords or traditional <abbr title="multi-factor authentication">MFA</abbr> methods.</p>

<p>Threat actors can execute <abbr title="adversary-in-the-middle">AitM</abbr> phishing easily by leveraging no-code solutions, such as dark web <abbr title="adversary-in-the-middle">AitM</abbr> providers or open-source <abbr title="adversary-in-the-middle">AitM</abbr> toolkits for self-run setups. These campaigns can be thwarted by:</p>

<ul><li>phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> factors</li>
	<li>specific <abbr title="conditional access policies">CAPs</abbr> that require registered device sign-ins</li>
	<li>specific <abbr title="conditional access policies">CAPs</abbr> that only allow sign-ins from specific Internet Protocol (IP) ranges or addresses that an organization owns</li>
</ul><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<h2 class="text-info" id="2">Transition to proxy-based adversary-in-the-middle phishing</h2>

<p>Threat actors conducting <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns evade detection by using relay proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing kits. A phishing kit is a pre-assembled set of digital tools that allows threat actors to easily create fake websites and harvest sensitive user information. These fake websites often mimic trusted brands to deceive users.</p>

<p>Before proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing kits, organizations could detect <abbr title="adversary-in-the-middle">AitM</abbr> phishing by looking for suspicious logins to their cloud environment and comparing those <abbr title="internet protocol">IP</abbr> addresses with network connections from their network. A login from a suspicious <abbr title="internet protocol">IP</abbr> and network connections to a suspicious website hosted on that same <abbr title="internet protocol">IP</abbr> was a good indication of an <abbr title="adversary-in-the-middle">AitM</abbr> campaign.</p>

<p>However, proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing kits work by adding a series of proxies in between the user and the identity provider. This means the <abbr title="internet protocol">IP</abbr> from the user login will not be the same <abbr title="internet protocol">IP</abbr> that appears to be hosting the phishing website. There are many ways that threat actors can achieve this, so organizations can no longer rely on <abbr title="internet protocol">IP</abbr>-based correlation to detect all <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns.</p>

<p>In mid-2024, the Cyber Centre added new internal detection capabilities for proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing and began detecting many more campaigns. This correlated with a decline in detected traditional <abbr title="adversary-in-the-middle">AitM</abbr> phishing. Threat actors have almost entirely shifted from traditional <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns to proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center">Figure 2: Comparison of detected traditional and proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns</figcaption><img alt="Figure 2 - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/fig2-itsm.30.031-e.png" /></figure><details><summary>Long description - Figure 2: Comparison of detected traditional and proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns</summary><p>This bar graph illustrates a comparison of detected traditional and proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns, based on campaigns that the Cyber Centre was able to confidently categorize between 2023 and mid-2025.</p>

<ul class="list-unstyled"><li>January 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>February 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>March 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr> 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> 0%</li>
	<li>April 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>May 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: NIL; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: NIL</li>
	<li>June 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>July 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>August 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: NIL; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: NIL</li>
	<li>September 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>November 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>December 2023: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>January 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>February 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>March 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>April 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>May 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 100%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 0%</li>
	<li>June 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 86%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 14%</li>
	<li>July 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 42%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 58%</li>
	<li>August 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 0%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 100%</li>
	<li>September 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 0%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 100%</li>
	<li>October 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 33%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 67%</li>
	<li>November 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 10%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 90%</li>
	<li>December 2024: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 0%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 100%</li>
	<li>January 2025: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 0%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 100%</li>
	<li>February 2025: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 33%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 67%</li>
	<li>March 2025: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 10%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 90%</li>
	<li>April 2025: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 0%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 100%</li>
	<li>May 2025: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 16%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 84%</li>
	<li>June 2025: Traditional <abbr title="adversary-in-the-middle">AitM</abbr>: 12%; proxy-based <abbr title="adversary-in-the-middle">AitM</abbr>: 88%</li>
</ul></details></div>
</div>

<p>One major contributor to this shift was threat actors’ use of a particular proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing kit. For more information on this kit, refer to the <a href="https://fieldeffect.com/blog/field-effect-discovers-m365-adversary-in-the-middle-campaign">Field Effect article Field Effect discovers M365 adversary-in-the-middle campaign</a>.</p>

<p>Phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> continues to prevent <abbr title="adversary-in-the-middle">AitM</abbr> campaigns, whether from traditional kits or proxy-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing kits. Both phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> and registered device <abbr title="conditional access policies">CAPs</abbr> break the authentication flow when there is an <abbr title="adversary-in-the-middle">AitM</abbr> phishing kit in the middle of the connection.</p>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<h2 class="text-info" id="3">Adversary-in-the-middle phishing trends and techniques</h2>

<p><abbr title="adversary-in-the-middle">AitM</abbr> phishing kits are increasingly sophisticated and challenging to detect. It might seem logical to focus on stopping these campaigns at their source by enhancing phishing email filtering. However, threat actors know that organizations are constantly improving their phishing protection programs and are therefore adjusting their techniques.</p>

<p>The Cyber Centre analyzed over 100 campaigns between 2023 and early 2025 and found that threat actors used a combination of vendor email compromise (VEC), which is a type of business email compromise (BEC), and a phishing technique that uses living off trusted sites (LOTS).</p>

<h3 id="3.1">Business email compromise phishing campaigns</h3>

<p>In <abbr title="business email compromise">BEC</abbr> phishing campaigns, threat actors compromise legitimate organizations, steal their trusted contacts, and send <abbr title="adversary-in-the-middle">AitM</abbr> phishing emails with links to legitimate services like SharePoint, Dropbox, or other trusted hosting providers. The files hosted on these trusted providers contain a link to the <abbr title="adversary-in-the-middle">AitM</abbr> phishing site, but the link is within a file hosted on the trusted provider, not in the phishing email itself. This makes detecting and tracking the source of an <abbr title="adversary-in-the-middle">AitM</abbr> compromise more difficult.</p>

<p>From the user’s perspective, they have received an email from a trusted contact with a shared file, which they may regularly receive from this contact. Threat actors can tailor the file-sharing service based on previous communications between 2 users to make their <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns more difficult to identify.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center">Figure 3: Distribution of <abbr title="business email compromise">BEC</abbr> phishing</figcaption><img alt="Figure 3 - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/fig3-itsm.30.031-e.png" /></figure><details><summary>Long description - Figure 3: Distribution of <abbr title="business email compromise">BEC</abbr> phishing</summary><p>This pie chart shows the distribution of <abbr title="business email compromise">BEC</abbr> phishing campaigns compared to non-<abbr title="business email compromise">BEC</abbr> phishing campaigns that the Cyber Centre analyzed and categorized between 2023 and mid-2025. <abbr title="business email compromise">BEC</abbr> phishing campaigns made up 91% of the analyzed campaigns.</p>
</details></div>
</div>

<h3 id="3.2">Living off trusted sites techniques</h3>

<p><abbr title="living off trusted sites">LOTS</abbr>-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing made up over half of the campaigns that the Cyber Centre was able to categorize, with the remaining campaigns using conventional phishing methods (such as malicious links or attachments directly in an email). Organizations should educate users on the risks of <abbr title="living off trusted sites">LOTS</abbr>-based <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns and provide training on how to identify these campaigns.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center">Figure 4: Distribution of phishing techniques</figcaption><img alt="Figure 4 - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/fig4-itsm.30.031-e.png" /></figure><details><summary>Long description - Figure 4: Distribution of phishing techniques</summary><p>This pie chart shows the distribution of phishing techniques that the Cyber Centre analyzed and categorized between 2023 and mid-2025. <abbr title="living off trusted sites">LOTS</abbr> made up 59% of the analyzed campaigns while conventional phishing (such as embedded links or files) made up 41%.</p>
</details></div>
</div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<h2 class="text-info" id="4">Targeted sectors</h2>

<p>The Cyber Centre examined the sectors and organizations that are being targeted by <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns. In Figure 5 below, the breakdown of <abbr title="business email compromise">BEC</abbr> victims by country shows that most of the organizations that were compromised and that sent <abbr title="adversary-in-the-middle">AitM</abbr> phishing emails to the Government of Canada and to critical infrastructure partners were based in Canada. This finding underscores that threat actors are leveraging <abbr title="vendor email compromise">VEC</abbr> since many Canadian organizations predominantly interact with other Canadian organizations in their daily operations.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center">Figure 5: Breakdown of <abbr title="business email compromise">BEC</abbr> victims by country</figcaption><img alt="Figure 5 - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/fig5-itsm.30.031-e.png" /></figure><details><summary>Long description - Figure 5: Breakdown of <abbr title="business email compromise">BEC</abbr> victims by country</summary><p>This pie chart shows the breakdown of <abbr title="business email compromise">BEC</abbr> victims by country that the Cyber Centre analyzed and categorized between 2023 and mid-2025. Canada represents 77%, the United States represents 18%, and the remaining 5% is divided among other unspecified countries.</p>
</details></div>
</div>

<p>The Cyber Centre found that a third of the <abbr title="business email compromise">BEC</abbr> victims were in the natural resources, energy, and environment sector. This was closely followed by the industry and business development sector and the Indigenous services sector.</p>

<p>When examining the victims who received <abbr title="adversary-in-the-middle">AitM</abbr> phishing emails, the Cyber Centre observed a similar breakdown. A quarter of the victims were in the natural resources, energy, and environment sector, followed by the security, intelligence and defence sector; the health sector; and the government administration sector.</p>

<p>The Cyber Centre can correlate the sectors affected by <abbr title="business email compromise">BEC</abbr> and those impacted by <abbr title="adversary-in-the-middle">AitM</abbr> phishing to spot patterns between the sectors sending and receiving emails. We observed that 41% of sectors impacted by <abbr title="business email compromise">BEC</abbr> also sent phishing emails to organizations within the same sector, consistent with previously cited <abbr title="vendor email compromise">VEC</abbr> findings. The graph below illustrates an example of this. Notable exceptions to this trend were the hospitality and legal sectors, likely because hotels and law firms serve clients across diverse sectors.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center">Figure 6: <abbr title="business email compromise">BEC</abbr> victims in the natural resources, energy and environment sector sending emails to <abbr title="adversary-in-the-middle">AitM</abbr> phishing victims</figcaption><img alt="Figure 6 - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/fig6-itsm.30.031-e_2.png" /></figure><details><summary>Long description - Figure 6: <abbr title="business email compromise">BEC</abbr> victims in the natural resources, energy and environment sector sending emails to <abbr title="adversary-in-the-middle">AitM</abbr> phishing victims</summary><p>The figure depicts <abbr title="business email compromise">BEC</abbr> victims in the natural resources, energy and environment sector sending emails to <abbr title="adversary-in-the-middle">AitM</abbr> phishing victims. This is based on results that the Cyber Centre analyzed and categorized between 2023 and mid-2025. The natural resources, energy and environment sector sent 55% of phishing emails within its sector, 13% to the health sector, 9% to the transportation sector, 5% to the banking and finance sector, 5% to the security, intelligence and defence sector, 5% to the government administration sector, 4% to the border services and immigration sector, and 4% to the international affairs, trade and development sector.</p>
</details></div>
</div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="5">The importance of phishing-resistant multi-factor authentication</h2>

<p>Although <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns are widespread, a solution already exists to mitigate all known campaigns: phishing-resistant <abbr title="multi-factor authentication">MFA</abbr>. This is the only way to completely stop these campaigns before a threat actor can get hold of an <abbr title="multi-factor authentication">MFA</abbr>-verified session.</p>

<p>According to the Cyber Centre’s findings, full-session compromises within the Government of Canada and critical infrastructure partners have decreased over the last few years. This is primarily because these organizations have adopted registered device <abbr title="conditional access policies">CAPs</abbr> and other <abbr title="conditional access policies">CAPs</abbr> requiring phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> and have implemented strictly controlled <abbr title="internet protocol">IP</abbr> restrictions on logins. Full-session compromises decreased from a high of almost 20% at the end of the third quarter of 2023 to less than 10% of all compromises as of early 2025.</p>

<div class="panel panel-default">
<div class="panel-body">
<figure><figcaption class="text-center">Figure 7: Cumulative percentage of <abbr title="adversary-in-the-middle">AitM</abbr> phishing results over time</figcaption><img alt="Figure 7 - Long description immediately follows" class="img-responsive" src="/sites/default/files/images/fig7-itsm.30.031-e.png" /></figure><details><summary>Long description - Figure 7: Cumulative percentage of <abbr title="adversary-in-the-middle">AitM</abbr> phishing results over time</summary><p>This bar graph illustrates the cumulative percentage of <abbr title="adversary-in-the-middle">AitM</abbr> phishing results that the Cyber Centre analyzed and categorized between 2023 and mid-2025.</p>

<ul><li>2023 Q1: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 55.6%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 33.3%; full session compromise: 11.1%</li>
	<li>2023 Q2: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 55%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 35%; full session compromise: 10%</li>
	<li>2023 Q3: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 47.8%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 34.8%; full session compromise: 17.4%</li>
	<li>2023 Q4: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 50%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 33.3%; full session compromise: 16.7%</li>
	<li>2024 Q1: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 50%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 35.3%; full session compromise: 14.7%</li>
	<li>2024 Q2: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 51.2%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 34.9%; full session compromise: 14%</li>
	<li>2024 Q3: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 38.9%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 48.6%; full session compromise: 12.5%</li>
	<li>2024 Q4: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 38.4%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 51.5%; full session compromise: 10.1%</li>
	<li>2025 Q1: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 35.9%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 57%; full session compromise: 7%</li>
	<li>2025 Q2: Blocked: <abbr title="multi-factor authentication">MFA</abbr>/other <abbr title="conditional access policy">CAP</abbr>: 35.9%; blocked: registered device <abbr title="conditional access policy">CAP</abbr>: 58%; full session compromise: 6.1%</li>
</ul></details></div>
</div>

<p>The Cyber Centre continues to observe a steady stream of <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns stemming from <abbr title="business email compromise">BEC</abbr>. This indicates that threat actors remain confident that enough accounts lack phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> protection, making <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns a worthwhile technique for compromising accounts.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h2 class="text-info" id="6">Enhancing defences against evolving adversary-in-the-middle threats</h2>

<p>Phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> can prevent <abbr title="adversary-in-the-middle">AitM</abbr> campaigns, but it can be difficult for organizations to implement. Cloud configuration can also be challenging, and most phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> methods are fee-based.</p>

<p>Organizations should weigh the risk and impact of cyber incidents against the cost of implementing phishing-resistant <abbr title="multi-factor authentication">MFA</abbr>. Organizations that choose to implement phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> should consider the following:</p>

<ul><li>Compared with the cost of remediating and recovering from a data breach, providing phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> methods (FIDO2 security keys, passkeys, Windows Hello for Business) to users is a cost-effective investment</li>
	<li>Data and information may be critical to business operations or contain highly sensitive private information, and any compromise can have a significant impact and cost for the organization</li>
	<li>An identity compromise can have a significant impact on an organization’s reputation</li>
</ul><p>Some organizations are moving to devices that are registered with their <abbr title="information technology">IT</abbr> departments and phishing-resistant <abbr title="multi-factor authentication">MFA</abbr>. However, threat actors are often a step ahead and launch <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns before organizations can move to phishing-resistant options.</p>

<h3 id="6.1">Addressing high-risk gaps and vulnerabilities</h3>

<p>Organizations should deploy phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> to every user, without exception. They should also review their identity protection posture and flag any high-risk gaps or vulnerabilities. The following are examples of high-risk gaps or vulnerabilities that organizations should address immediately to prevent <abbr title="adversary-in-the-middle">AitM</abbr> compromises.</p>

<h4>Administrators using weak <abbr title="multi-factor authentication">MFA</abbr> methods</h4>

<p>Organizations should apply phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> to all administrator accounts, without exception, in any <abbr title="conditional access policy">CAP</abbr>. Additionally, organizations should remove any non-phishing-resistant backup methods on these accounts since these could be bypassed by <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns.</p>

<h4>Bring-your-own-device without phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> or location restrictions</h4>

<p>Threat actors’ primary targets are users who are allowed to sign in from their own devices, outside of an organization’s controlled <abbr title="internet protocol">IP</abbr> space and without phishing-resistant <abbr title="multi-factor authentication">MFA</abbr>. This is a very high-risk gap that organizations should address immediately.</p>

<p>If organizations require users to use personal devices (known as bring your own device [BYOD]), they should deploy phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> and ensure that users cannot use any weak fallback methods. Alternatively, organizations could require all BYOD logins to go through the organization’s corporate VPN, with an accompanying <abbr title="conditional access policy">CAP</abbr> that restricts logins to only that specific <abbr title="internet protocol">IP</abbr> space.</p>

<p>The greatest challenge is avoiding the temptation to make exceptions for specific users, groups or applications. As a baseline, all users should have phishing-resistant <abbr title="multi-factor authentication">MFA</abbr> by default and without exception.</p>

<h3 id="6.2">Educating employees</h3>

<p>Organizations should also train their employees on how to spot and report <abbr title="adversary-in-the-middle">AitM</abbr> campaigns. Many users will open emails and click on the included links if the email is from a trusted source. Organizations should consider including the following topics in their training on phishing campaigns.</p>

<h4><abbr title="business email compromise">BEC</abbr> scenarios</h4>

<p>The more users are aware of how common <abbr title="business email compromise">BEC</abbr> campaigns are, the more they will be on the lookout for them. Before clicking on a link in an email, they should know to ask themselves a couple of questions, such as:</p>

<ul><li>Do I usually receive unsolicited Dropbox files from this contact?</li>
	<li>Does this contact usually send me SharePoint documents?</li>
</ul><p>If a user receives unsolicited files, they should reach out to the sender through another method (for example, a phone call) to confirm that the document was shared intentionally.</p>

<h4>Double-checking the URL when signing into login services</h4>

<p>Verifying the legitimacy of URLs can be difficult since logins to some sites like Microsoft Entra ID contain long URLs, so users might not notice a suspicious domain in the path. Educating users on where to find the top-level domain within a URL and what domains to expect in that location can go a long way in stopping these campaigns.</p>

<h4>Avoiding multiple logins</h4>

<p>Users often sign into their accounts using a cloud-based identity and access management service like Microsoft Entra ID. This allows them to access applications like Microsoft SharePoint or Teams with a single sign-on. If users know that they shouldn’t need to log in again to access applications or a shared file, they will think twice before re-entering their credentials.</p>

<p>Another helpful technique is to teach users to open a new tab and sign into the file-sharing service directly before clicking on a link. After logging into the service directly, users should not be prompted to sign in again when they click the file link in their email. If they do receive a prompt, it could be an <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaign.</p>

<h4>Good password hygiene</h4>

<p>Even if users know how to spot <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns, there will always be some successful campaigns that trick users into supplying their username and password before the campaigns are blocked by <abbr title="conditional access policies">CAPs</abbr>. This means that the threat actor can gain control of the user’s username and password, even if they did not get an <abbr title="multi-factor authentication">MFA</abbr>-verified session. Therefore, organizations must remind users to not reuse passwords. Once a threat actor obtains these credentials, they can use them against other login portals within the organization that might not have <abbr title="multi-factor authentication">MFA</abbr> protections (for example, legacy web portals or less secure VPN appliances).</p>
</section><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h2 class="text-info" id="7">Summary</h2>

<p><abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns are becoming more sophisticated and are occurring across all sectors. As this publication highlights, there are a number of measures organizations can take to mitigate this threat. However, the best defence against <abbr title="adversary-in-the-middle">AitM</abbr> phishing campaigns is to implement phishing-resistant MFA by default and without exception.</p>

<p>For additional cyber security guidance, please refer to the following:</p>

<ul><li><a href="/en/guidance/foundational-cyber-security-actions-small-organizations-itsap10300">Foundational cyber security actions for small organizations (ITSAP.10.300)</a></li>
	<li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Offer tailored cyber security training to your employees (ITSAP.10.093)</a></li>
	<li><a href="/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)</a></li>
</ul></section></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171"/><title><![CDATA[Protecting specified information in non-Government of Canada systems and organizations (ITSP.10.171)]]></title><updated>2025-10-28T18:41:39Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6144" about="/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>October 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Practitioner series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSP.10.171</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>October 2025 | Practitioner series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsp10171-e-v4.pdf">Protecting specified information in non-Government of Canada systems and organizations - ITSP.10.171 (PDF, 1.6 MB)</a></p>
</div>

<h2 class="text-info">Foreword</h2>

<p>This is an unclassified publication issued under the authority of the Head, Canadian Centre for Cyber Security (Cyber Centre). For more information or to suggest amendments, contact the Contact Centre:</p>

<ul><li><a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a></li>
	<li><a href="tel:+16139497048">(613) 949-7048</a> or <span class="nowrap"><a href="tel:+18332923788">1-833-CYBER-88</a></span></li>
</ul><h2 class="text-info">Effective date</h2>

<p>This publication takes effect on April 2, 2025.</p>

<h2 class="text-info">Revision history</h2>

<ol><li><strong>First release:</strong> April 2, 2025</li>
	<li><strong>Second release:</strong> October 28, 2025</li>
</ol><section><h2 class="text-info">Table of contents</h2>

<ul class="list-unstyled lst-spcd"><li><a href="#1">1 Introduction</a>

	<ul class="lst-none"><li><a href="#1-1">1.1 Purpose</a></li>
		<li><a href="#1-2">1.2 Audience</a></li>
		<li><a href="#1-3">1.3 Publication organization</a></li>
	</ul></li>
	<li><a href="#2">2 Fundamentals</a>
	<ul class="lst-none"><li><a href="#2-1">2.1 Security requirements assumptions</a></li>
		<li><a href="#2-2">2.2 Security requirement development methodology</a></li>
	</ul></li>
	<li><a href="#3">3 Requirements</a>
	<ul class="lst-none"><li><a href="#3-1">3.1 Access control</a></li>
		<li><a href="#3-2">3.2 Awareness and training</a></li>
		<li><a href="#3-3">3.3 Audit and accountability</a></li>
		<li><a href="#3-4">3.4 Configuration management</a></li>
		<li><a href="#3-5">3.5 Identification and authentication</a></li>
		<li><a href="#3-6">3.6 Incident response</a></li>
		<li><a href="#3-7">3.7 Maintenance</a></li>
		<li><a href="#3-8">3.8 Media protection</a></li>
		<li><a href="#3-9">3.9 Personnel security</a></li>
		<li><a href="#3-10">3.10 Physical protection</a></li>
		<li><a href="#3-11">3.11 Risk assessment</a></li>
		<li><a href="#3-12">3.12 Security assessment and monitoring</a></li>
		<li><a href="#3-13">3.13 System and communications protection</a></li>
		<li><a href="#3-14">3.14 System and information integrity</a></li>
		<li><a href="#3-15">3.15 Planning</a></li>
		<li><a href="#3-16">3.16 System and services acquisition</a></li>
		<li><a href="#3-17">3.17 Supply chain risk management</a></li>
	</ul></li>
	<li><a href="#AA">Annex A Tailoring criteria</a></li>
	<li><a href="#AB">Annex B Organization-defined parameters</a></li>
</ul></section><section><h2 class="text-info">Overview</h2>

<p>Protecting Specified Information is of paramount importance to Government of Canada (GC) departments and agencies and can directly impact the <abbr title="Government of Canada">GC</abbr>’s ability to successfully conduct its essential missions and functions. This publication provides <abbr title="Government of Canada">GC</abbr> departments and agencies with recommended security requirements for protecting the confidentiality of specified information when it resides in non-<abbr title="Government of Canada">GC</abbr> systems and organizations. These requirements apply to the components of non-<abbr title="Government of Canada">GC</abbr> systems that handle, process, store or transmit <abbr title="controlled information">CI</abbr>, or that provide protection for such components. The security requirements are intended for use by <abbr title="Government of Canada">GC</abbr> departments and agencies in contractual vehicles or other agreements established between those departments and agencies and non-<abbr title="Government of Canada">GC</abbr> organizations.</p>

<p>This publication is a Canadian version of the National Institute of Standards and Technology <a href="https://csrc.nist.gov/pubs/sp/800/171/r3/final">NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations</a>. The Cyber Centre will produce a companion publication to use in conjunction with this publication, based on <a href="https://csrc.nist.gov/pubs/sp/800/171/a/r3/final">NIST SP 800-171A Assessing Security Requirements for Controlled Unclassified Information</a>. That publication will provide a comprehensive set of procedures to assess the security requirements. In the interim, NIST SP 800-171A can be used as a reference.</p>

<h2 class="text-info">Acknowledgments</h2>

<p>The Cyber Centre wishes to acknowledge and thank Dr. Ron Ross and Victoria Pillitteri from the Computer Security Division at <abbr title="National Institute of Standards and Technology">NIST</abbr> for allowing the Cyber Security Guidance (CSG) team to use their guidance and modify it to the Canadian context.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="1">1 Introduction</h2>

<p>This publication is a Canadian version of <a href="https://csrc.nist.gov/pubs/sp/800/171/r3/final">NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations</a>. There are no substantial technical changes between this publication and NIST SP 800-171. The primary modifications arise from differences in laws, policies, directives, standards and guidelines. In other words, the changes reflect the distinct Canadian regulatory and compliance landscape; there are no changes to the underlying technical context.</p>

<p>The controls are aligned with Security and privacy controls and assurance activities catalogue (ITSP.10.033), which is a version of <a href="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final">NIST SP 800-53 Rev. 5 Security and Privacy Controls for Information Systems and Organizations</a> adapted to the Canadian context.</p>

<p><strong>Specified information</strong> includes any information, other than classified, that a GC authority identifies and qualifies in a contract as requiring safeguarding. Protected information, as well as the safeguarding and dissemination requirements for such information, is defined by the Treasury Board of Canada Secretariat <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=32614"><abbr title="Treasury Board Secretariat">TBS</abbr> Directive on Security Management, Appendix J: Standard on Security Categorization</a> and is codified in the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=12510"><abbr title="Treasury Board Secretariat">TBS</abbr> Policy on Privacy Protection</a>. We use the term “specified information” in place of “controlled unclassified information” (CUI) which is used in the US document.</p>

<p>GC departments and agencies are required to follow the policies and directives published by <abbr title="Treasury Board Secretariat">TBS</abbr> when using federal systems to handle, process, store, or transmit information<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>.</p>

<p>The responsibility of <abbr title="Government of Canada">GC</abbr> departments and agencies to protect specified information remains the same when sharing it with non-<abbr title="Government of Canada">GC</abbr> organizations. Therefore, a similar level of protection is needed when non-<abbr title="Government of Canada">GC</abbr> organizations using non-<abbr title="Government of Canada">GC</abbr> systems handle, process, store or transmit specified information. To maintain a consistent level of protection, the security requirements for safeguarding specified information in non-<abbr title="Government of Canada">GC</abbr> systems and organizations must comply with the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=16578"><abbr title="Treasury Board Secretariat">TBS</abbr> Policy on Government Security</a>, <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=32603"><abbr title="Treasury Board Secretariat">TBS</abbr> Policy on Service and Digital</a>, and <abbr title="Treasury Board Secretariat">TBS</abbr> Policy on Privacy Protection.</p>

<p>The security controls and activities presented in this publication outline requirements for federal contracting.</p>

<p>This publication does not contain the complete set of privacy-related controls and activities described in ITSP.10.033. Rather, it contains a subset of privacy-related controls that are shared with confidentiality-related controls.</p>

<h3 class="h2 mrgn-tp-lg" id="1-1">1.1 Purpose</h3>

<p>This publication provides <abbr title="Government of Canada">GC</abbr> departments and agencies with recommended security requirements for protecting the confidentiality of specified information when in resides in non-<abbr title="Government of Canada">GC</abbr> systems and organizations and where there are no specific safeguarding requirements prescribed by the authorizing law, regulation, or government-wide policy for the specified information category.</p>

<p>The security requirements in this publication are only applicable to components<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup> of non-<abbr title="Government of Canada">GC</abbr> systems that handle, process, store, or transmit specified information <strong>or</strong> that provide protection for such components. The requirements are intended to be used by <abbr title="Government of Canada">GC</abbr> departments and agencies in contractual vehicles or other agreements established with non-<abbr title="Government of Canada">GC</abbr> organizations.</p>

<p>It is important that non-<abbr title="Government of Canada">GC</abbr> organizations scope requirements appropriately when making protection-related investment decisions and managing security risks. By designating system components for handling, processing, storing or transmitting specified information, non-<abbr title="Government of Canada">GC</abbr> organizations can limit the scope of the security requirements by isolating the system components in a separate security domain. Isolation can be achieved by applying architectural and design concepts (e.g., implementing subnetworks with firewalls or other boundary protection devices and using information flow control mechanisms). Security domains can use physical separation, logical separation, or a combination of both. This approach can provide adequate security for specified information and avoid increasing the non-<abbr title="Government of Canada">GC</abbr> organization’s security posture beyond what it requires for protecting its missions, operations and assets.</p>

<h3 class="h2 mrgn-tp-lg" id="1-2">1.2 Audience</h3>

<p>This publication is intended for various individuals and organizations in the public and private sectors, including:</p>

<ul><li><abbr title="Government of Canada">GC</abbr> departments and agencies responsible for managing and protecting specified information</li>
	<li>non-<abbr title="Government of Canada">GC</abbr> organizations responsible for protecting specified information</li>
	<li>individuals with system development lifecycle (SDLC) responsibilities</li>
	<li>individuals with acquisition or procurement responsibilities</li>
	<li>individuals with system, security, privacy or risk management and oversight responsibilities</li>
	<li>individuals with security or privacy assessment and monitoring responsibilities</li>
</ul><h3 class="h2 mrgn-tp-lg" id="1-3">1.3 Publication organization</h3>

<p>The remainder of this publication is organized as follows:</p>

<ul><li><a href="#2">Section 2 Fundamentals</a> describes the assumptions and methodology used to develop the security requirements for protecting the confidentiality of specified information, the format of the requirements, and the tailoring criteria applied to the Cyber Centre guidelines to obtain the requirements</li>
	<li><a href="#3">Section 3 Requirements</a> lists the security requirements for protecting the confidentiality of specified information in non-<abbr title="Government of Canada">GC</abbr> systems and organizations</li>
</ul><p>The following sections provide additional information to support the protection of specified information:</p>

<ul><li><a href="#AA">Annex A: Tailoring criteria</a></li>
	<li><a href="#AB">Annex B: Organization-defined parameters</a></li>
</ul></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="2">2 Fundamentals</h2>

<p>This section describes the assumptions and methodology used to develop the requirements to protect the confidentiality of specified information in non-<abbr title="Government of Canada">GC</abbr> systems and organizations. It also includes the tailoring criteria applied to the controls in ITSP.10.033.</p>

<h3 class="h2 mrgn-tp-lg" id="2-1">2.1 Security requirements assumptions</h3>

<p>The security requirements in this publication are based on the following assumptions:</p>

<ul><li><abbr title="Government of Canada">GC</abbr> information designated as specified information has the same value regardless of whether such information resides in a <abbr title="Government of Canada">GC</abbr> or a non-<abbr title="Government of Canada">GC</abbr> system or organization</li>
	<li>statutory and regulatory requirements for the protection of specified information are consistent in <abbr title="Government of Canada">GC</abbr> and non-<abbr title="Government of Canada">GC</abbr> systems and organizations</li>
	<li>safeguards implemented to protect specified information are consistent in <abbr title="Government of Canada">GC</abbr> and non-<abbr title="Government of Canada">GC</abbr> systems and organizations</li>
	<li>the confidentiality impact value for specified information is no less than low (Protected A), but will be medium for most large <abbr title="Government of Canada">GC</abbr> datasets</li>
	<li>non-<abbr title="Government of Canada">GC</abbr> organizations can directly implement a variety of potential security solutions or use external service providers to satisfy security requirements</li>
</ul><h3 class="h2 mrgn-tp-lg" id="2-2">2.2 Security requirement development methodology</h3>

<p>Starting with the ITSP.10.033 controls in the ITSP.10.033-01 Medium impact profile, the controls are tailored to eliminate selected controls or parts of controls that are:</p>

<ul><li>primarily the responsibility of the <abbr title="Government of Canada">GC</abbr></li>
	<li>not directly related to protecting the confidentiality of specified information</li>
	<li>adequately addressed by other related controls</li>
	<li>not applicable</li>
</ul><p>ITSP.10.171 security requirements represent a subset of the controls that are necessary to protect the confidentiality of specified information. The security requirements are organized into 17 families, as illustrated in Table 1. Each family contains the requirements related to its general security topic. Certain families from ITSP.10.033 are not included because they do not directly contribute to confidentiality. For example, the Personal information handling and transparency (PT) family is not included because it is about handling personal information (PI), not about the confidentiality of the <abbr title="personal information">PI</abbr>. The Program management (PM) family is not included because it is not related to confidentiality. Finally, the Contingency planning (CP) family is not included because it addresses availability.</p>

<p>The following are the security requirements families:</p>

<ul><li>Access control</li>
	<li>Awareness and training</li>
	<li>Audit and accountability</li>
	<li>Configuration management</li>
	<li>Identification and authentication</li>
	<li>Incident response</li>
	<li>Maintenance</li>
	<li>Media protection</li>
	<li>Personnel security</li>
	<li>Physical protection</li>
	<li>Risk assessment</li>
	<li>Security assessment and monitoring</li>
	<li>System and communications protection</li>
	<li>System and information integrity</li>
	<li>Planning</li>
	<li>System and services acquisition</li>
	<li>Supply chain risk management</li>
</ul><p>Organization-defined parameters (ODPs) are included in certain security requirements. <abbr title="organization-defined parameter">ODP</abbr>s provide flexibility through the use of assignment and selection operations to allow <abbr title="Government of Canada">GC</abbr> departments and agencies and non-<abbr title="Government of Canada">GC</abbr> organizations to specify values for the designated parameters in the requirements. Assignment and selection operations allow security requirements to be customized based on specific protection needs. The determination of <abbr title="organization-defined parameter">ODP</abbr> values can be guided and informed by laws, Orders in Council, directives, regulations, policies, standards, guidance, or mission and business needs. Once specified, <abbr title="organization-defined parameter">ODP</abbr> values become part of the requirement. When present in a control or activity statement, the square brackets indicate that there is an <abbr title="organization-defined parameter">ODP</abbr> that needs to be inserted by the reader in order for an organization to tailor the control to their context.</p>

<p><abbr title="organization-defined parameter">ODP</abbr>s are an important part of specifying a security requirement. <abbr title="organization-defined parameter">ODP</abbr>s provide both the flexibility and the specificity needed by organizations to clearly define their specified information security requirements according to their particular missions, business functions, operational environments and risk tolerance. In addition, <abbr title="organization-defined parameter">ODP</abbr>s support consistent security assessments to determine if specified security requirements have been satisfied. If a <abbr title="Government of Canada">GC</abbr> department or agency, or a group of departments or agencies, does not specify a particular value or range of values for an <abbr title="organization-defined parameter">ODP</abbr>, non-<abbr title="Government of Canada">GC</abbr> organizations must assign the value or values to complete the security requirement.</p>

<p>Each requirement includes a discussion section, derived from the control discussion sections in NIST SP 800-53. These sections provide additional information to facilitate the implementation and assessment of the requirements. They are informative, not normative. The discussion sections are not intended to extend the scope of a requirement or to influence the solutions that organizations may use to satisfy a requirement. Examples provided are notional, not exhaustive, and do not reflect all the potential options available to organizations. The “References” section provides the source controls or assurance activities from ITSP.10.033, and a list of relevant publications with additional information on the topic described in the requirement.</p>

<p>Because this is the first iteration of the Canadian publication, controls that were withdrawn in NIST SP 800-171 Revision 3 have been labelled as “not allocated” to keep the same numbering for interoperability purposes.</p>

<p>The structure and content of a typical security requirement is provided in the example below.</p>

<p>The term “organization” is used in many security requirements, and its meaning depends on context. For example, in a security requirement with an <abbr title="organization-defined parameter">ODP</abbr>, an organization can refer to either the <abbr title="Government of Canada">GC</abbr> department or agency or to the non-<abbr title="Government of Canada">GC</abbr> organization establishing the parameter values for the requirement.</p>

<p>Annex A describes the security control tailoring criteria used to develop the security requirements and the results of the tailoring process. It provides a list of controls and activities from ITSP.10.033 that support the requirements and the controls and activities that have been eliminated from the Medium impact profile in accordance with the tailoring criteria.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="3">3 Requirements</h2>

<p>This section describes 17 families of security requirements for protecting the confidentiality of specified information in non-<abbr title="Government of Canada">GC</abbr> systems and organizations. In this section, the term “system” refers to non-<abbr title="Government of Canada">GC</abbr> systems or system components that handle, process, store or transmit specified information, or that provide protection for such systems or components. Not all security requirements mention specified information explicitly. Requirements that do not mention specified information explicitly are included because they directly affect the protection of specified information during its processing, storage or transmission.</p>

<p>There may be limitations to how some systems, including specialized systems (e.g., industrial/process control systems, medical devices, or computer numerical control machines) can apply certain security requirements. To accommodate such issues, the system security plan — as reflected in requirement <a href="#03-15-02">System security plan 03.15.02</a> — is used to describe any enduring exceptions to the security requirements. Plans of action and milestones are used to manage individual, isolated or temporary deficiencies, as reflected in requirement <a href="#03-12-02">Plan of action and milestones 03.12.02</a>.</p>

<p>The security requirements in this section are only applicable to components of non-<abbr title="Government of Canada">GC</abbr> systems that process, store or transmit specified information or that provide protection for such components.</p>

<section><h3 class="h2 mrgn-tp-lg" id="3-1">3.1 Access control</h3>

<p>The controls in the Access control family support the ability to permit or deny user access to resources within the system.</p>
<!--<section>
<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-01-01">03.01.01 Account management</a></li>
<li><a href="#03-01-02">03.01.02 Access enforcement</a></li>
<li><a href="#03-01-03">03.01.03 Information flow enforcement</a></li>
<li><a href="#03-01-04">03.01.04 Separation of duties</a></li>
<li><a href="#03-01-05">03.01.05 Least privilege</a></li>
<li><a href="#03-01-06">03.01.06 Least privilege&nbsp;– privileged accounts</a></li>
<li><a href="#03-01-07">03.01.07 Least privilege&nbsp;– privileged functions</a></li>
<li><a href="#03-01-08">03.01.08 Unsuccessful logon attempts</a></li>
<li><a href="#03-01-09">03.01.09 System use notification</a></li>
<li><a href="#03-01-10">03.01.10 Device lock</a></li>
<li><a href="#03-01-11">03.01.11 Session termination</a></li>
<li><a href="#03-01-12">03.01.12 Remote access</a></li>
<li><a href="#03-01-13">03.01.13 Not allocated</a></li>
<li><a href="#03-01-14">03.01.14 Not allocated</a></li>
<li><a href="#03-01-15">03.01.15 Not allocated</a></li>
<li><a href="#03-01-16">03.01.16 Wireless access</a></li>
<li><a href="#03-01-17">03.01.17 Not allocated</a></li>
<li><a href="#03-01-18">03.01.18 Access control for mobile devices</a></li>
<li><a href="#03-01-19">03.01.19 Not allocated</a></li>
<li><a href="#03-01-20">03.01.20 Use of external systems</a></li>
<li><a href="#03-01-21">03.01.21 Not allocated</a></li>
<li><a href="#03-01-22">03.01.22 Publicly accessible content</a></li>
</ul>
</section>-->

<details><summary><h4 id="03-01-01">03.01.01 Account management</h4>
</summary><ol class="lst-upr-alph"><li>Define the types of system accounts allowed and prohibited.</li>
	<li>Create, enable, modify, disable, and remove system accounts in accordance with organizational policy, procedures, prerequisites, and criteria.</li>
	<li>Specify:
	<ol><li>authorized users of the system</li>
		<li>group and role membership</li>
		<li>access authorizations (i.e., privileges) for each account</li>
	</ol></li>
	<li>Authorize access to the system based on:
	<ol><li>a valid access authorization</li>
		<li>intended system usage</li>
	</ol></li>
	<li>Monitor the use of system accounts</li>
	<li>Disable system accounts when:
	<ol><li>the accounts have expired</li>
		<li>the accounts have been inactive for [Assignment: organization-defined time period]</li>
		<li>the accounts are no longer associated with a user or individual</li>
		<li>the accounts are in violation of organizational policy</li>
		<li>significant risks associated with individuals are discovered</li>
	</ol></li>
	<li>Notify account managers and designated personnel or roles within:
	<ol><li>[Assignment: organization-defined time period] when accounts are no longer required</li>
		<li>[Assignment: organization-defined time period] when users are terminated or transferred</li>
		<li>[Assignment: organization-defined time period] when system usage or the need-to-know changes for an individual</li>
	</ol></li>
	<li>Require that users log out of the system after [Assignment: organization-defined time period] of expected inactivity or when [Assignment: organization-defined circumstances].</li>
</ol><h5>Discussion</h5>

<p>This requirement focuses on account management for systems and applications. The definition and enforcement of access authorizations other than those determined by account type (e.g., privileged access or non-privileged access) are addressed in <a href="#03-01-02">Access enforcement 03.01.02</a>. System account types include individual, group, temporary, system, guest, anonymous, emergency, developer, and service accounts. Users who require administrative privileges on system accounts receive additional scrutiny by organizational personnel responsible for approving such accounts and privileged access. Types of accounts that organizations may prohibit due to increased risk include group, emergency, guest, anonymous, and temporary accounts.</p>

<p>Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of both. Other attributes required for authorizing access include restrictions on time-of-day, day-of-week, and point of origin. In defining other account attributes, organizations consider system requirements (e.g., system upgrades, scheduled maintenance) and mission and business requirements (e.g., time zone differences, remote access to facilitate travel requirements).</p>

<p>Users who pose a significant security and/or privacy risk include individuals for whom reliable evidence indicates either the intention to use authorized access to the system to cause harm or that adversaries will cause harm through them. Close coordination among human resource managers, mission/business owners, system administrators, and legal staff is essential when disabling system accounts for high-risk individuals. Time periods for the notification of organizational personnel or roles may vary.</p>

<p>Inactivity logout is behaviour- or policy-based and requires users to take physical action to log out when they are expecting inactivity longer than the defined period. Automatic enforcement of inactivity logout is addressed by <a href="#03-01-10">Device lock 03.01.10</a>.</p>

<h5>References</h5>

<p>Source controls: AC-02, AC-02(03), AC-02(05), AC-02(13)<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/managing-and-controlling-administrative-privileges-itsap10094">Cyber Centre Managing and controlling administrative privileges (ITSAP.10.094) </a></li>
	<li><a href="/en/guidance/how-protect-your-organization-insider-threats-itsap10003-0">Cyber Centre How to protect your organization from insider threats (ITSAP.10.003) </a></li>
</ul></details><details><summary><h4 id="03-01-02">03.01.02 Access enforcement</h4>
</summary><p>Enforce approved authorizations for logical access to specified information and system resources in accordance with applicable access control policies.</p>

<h5>Discussion</h5>

<p>Access control policies control access between active entities or subjects (i.e., users or system processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, and domains) in organizational systems. Types of system access include remote access and access to systems that communicate through external networks, such as the Internet. Access enforcement mechanisms can also be employed at the application and service levels to provide increased protection for specified information. This recognizes that the system can host many applications and services in support of mission and business functions. Access control policies are defined in Policy and procedures 03.15.01.</p>

<h5>References</h5>

<p>Source control: AC-03<br />
Supporting publications: <a href="/en/guidance/managing-and-controlling-administrative-privileges-itsap10094">Cyber Centre Managing and controlling administrative privileges (ITSAP.10.094)</a></p>
</details><details><summary><h4 id="03-01-03">03.01.03 Information flow enforcement</h4>
</summary><p>Enforce approved authorizations for controlling the flow of specified information within the system and between connected systems.</p>

<h5>Discussion</h5>

<p>Information flow control regulates where specified information can transit within a system and between systems (versus who can access the information) and without explicit regard to subsequent accesses to that information. Flow control restrictions include keeping specified information from being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within the organization, restricting requests to the Internet that are not from the internal web proxy server, and limiting specified information transfers between organizations based on data structures and content.</p>

<p>Organizations commonly use information flow control policies and enforcement mechanisms to control the flow of specified information between designated sources and destinations (e.g., networks, individuals, and devices) within systems and between interconnected systems. Flow control is based on characteristics of the information or the information path. Enforcement occurs in boundary protection devices (e.g., encrypted tunnels, routers, gateways, and firewalls) that use rule sets or establish configuration settings that restrict system services, provide a packet-filtering capability based on header information, or provide a message-filtering capability based on message content (e.g., implementing key word searches or using document characteristics). Organizations also consider the trustworthiness of filtering and inspection mechanisms (i.e., hardware, firmware, and software components) that are critical to information flow enforcement.</p>

<p>Transferring specified information between organizations may require an agreement that specifies how the information flow is enforced (see <a href="#03-12-05">Information exchange 03.12.05</a>). Transferring specified information between systems that represent different security domains with different security policies introduces the risk that such transfers may violate one or more domain security policies. In such situations, information custodians provide guidance at designated policy enforcement points between interconnected systems. Organizations consider mandating specific architectural solutions when required to enforce specific security policies. Enforcement includes prohibiting specified information transfers between interconnected systems (i.e., allowing information access only), employing hardware mechanisms to enforce one-way information flows, and implementing trustworthy regrading mechanisms to reassign security attributes and security labels.</p>

<h5>References</h5>

<p>Source control: AC-04<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/baseline-security-requirements-network-security-zones-version-20-itsp80022">Cyber Centre Baseline Security Requirements for Network Security Zones (ITSP.80.022) </a></li>
	<li><a href="/en/guidance/it-media-sanitization-itsp40006">Cyber Centre <abbr title="information technology">IT</abbr> media sanitization (ITSP.40.006) </a></li>
</ul></details><details><summary><h4 id="03-01-04">03.01.04 Separation of duties</h4>
</summary><ol class="lst-upr-alph"><li>Identify the duties of individuals requiring separation.</li>
	<li>Define system access authorizations to support separation of duties.</li>
</ol><h5>Discussion</h5>

<p>Separation of duties addresses the potential for abuse of authorized privileges and reduces the risk of malicious activity without collusion. Separation of duties includes dividing mission functions and support functions among different individuals or roles, conducting system support functions with different individuals or roles (e.g., quality assurance, configuration management, system management, assessments, programming, and network security), and ensuring that personnel who administer access control functions do not also administer audit functions. Because separation of duty violations can span systems and application domains, organizations consider the entirety of their systems and system components when developing policies on separation of duties. This requirement is enforced by <a href="#03-01-02">Access enforcement 03.01.02</a>.</p>

<h5>References</h5>

<p>Source control: AC-05<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/162/upd2/final">NIST SP 800-162 Guide to Attribute Based Access Control (ABAC) Definition and Considerations </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/178/final">NIST SP 800-178 A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) </a></li>
</ul></details><details><summary><h4 id="03-01-05">03.01.05 Least privilege</h4>
</summary><ol class="lst-upr-alph"><li>Allow only the authorized system access for users (or processes acting on behalf of users) that is necessary to accomplish assigned organizational tasks.</li>
	<li>Authorize access to [Assignment: organization-defined security functions] and [Assignment: organization-defined security-relevant information].</li>
	<li>Review the privileges assigned to roles or classes of users [Assignment: organization-defined frequency] to validate the need for such privileges.</li>
	<li>Reassign or remove privileges, as necessary.</li>
</ol><h5>Discussion</h5>

<p>Organizations employ the principle of least privilege for specific duties and authorized access for users and system processes. Least privilege is applied to the development, implementation, and operation of the system. Organizations consider creating additional processes, roles, and system accounts to achieve least privilege. Security functions include establishing system accounts and assigning privileges, installing software, configuring access authorizations, configuring settings for events to be audited, establishing vulnerability scanning parameters, establishing intrusion detection parameters, and managing audit information. Security-relevant information includes threat and vulnerability information, filtering rules for routers or firewalls, configuration parameters for security services, security architecture, cryptographic key management information, access control lists, and audit information.</p>

<h5>References</h5>

<p>Source controls: AC-06, AC-06(01), AC-06(07), AU-09(04)<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-01-06">03.01.06 Least privilege – privileged accounts</h4>
</summary><ol class="lst-upr-alph"><li>Restrict privileged accounts on the system to [Assignment: organization-defined personnel or roles].</li>
	<li>Require that users (or roles) with privileged accounts use non-privileged accounts when accessing non-security functions or non-security information.</li>
	<li>Require any administrative or superuser actions to be performed from a physical workstation which is dedicated to those specific tasks and isolated from all other functions and networks, especially any form of Internet access.</li>
</ol><h5>Discussion</h5>

<p>Privileged accounts refer to accounts that are granted elevated privileges to access resources (including security functions or security-relevant information) that are otherwise restricted for non-privileged accounts. These accounts are typically described as system administrator or super-user accounts. For example, a privileged account is often required in order to perform privileged functions such as executing commands that could modify system behaviour. Restricting privileged accounts to specific personnel or roles prevents non-privileged users from accessing security functions or security-relevant information. Requiring the use of non-privileged accounts when accessing non-security functions or non-security information limits exposure when operating from within privileged accounts.</p>

<p>A dedicated administration workstation (DAW) is typically comprised of a user terminal with a very small selection of software designed for interfacing with the target system. For the purpose of this control, workstation is meant as the system from which you are performing the administration, as opposed to the target system of administration.</p>

<h5>References</h5>

<p>Source controls: AC-06(02), AC-06(05), SI-400<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-01-07">03.01.07 Least privilege – privileged functions</h4>
</summary><ol class="lst-upr-alph"><li>Prevent non-privileged users from executing privileged functions.</li>
	<li>Log the execution of privileged functions.</li>
</ol><h5>Discussion</h5>

<p>Privileged functions include establishing system accounts, performing system integrity checks, conducting patching operations, or administering cryptographic key management activities. Non-privileged users do not possess the authorizations to execute privileged functions. Bypassing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users. This requirement represents a condition to be achieved by the definition of authorized privileges in <a href="#03-01-01">Account management 03.01.01</a> and privilege enforcement in <a href="#03-01-02">Access enforcement 03.01.02</a>.</p>

<p>The misuse of privileged functions – whether intentionally or unintentionally by authorized users or by unauthorized external entities that have compromised system accounts – is a serious and ongoing concern that can have significant adverse impacts on organizations. Logging the use of privileged functions is one way to detect such misuse and mitigate the risks from advanced persistent threats and insider threats.</p>

<h5>References</h5>

<p>Source controls: AC-06(09), AC-06(10)<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-01-08">03.01.08 Unsuccessful logon attempts</h4>
</summary><ol class="lst-upr-alph"><li>Limit the number of consecutive invalid logon attempts to [Assignment: organization-defined number] in [Assignment: organization-defined time period].</li>
	<li>Automatically [Selection (one or more): lock the account or node for an [Assignment: organization-defined time period]; lock the account or node until released by an administrator; delay next logon prompt; notify system administrator; take other action] when the maximum number of unsuccessful attempts is exceeded.</li>
</ol><h5>Discussion</h5>

<p>Due to the potential for denial of service, automatic system lockouts are, in most cases, temporary and automatically release after a predetermined period established by the organization (i.e., using a delay algorithm). Organizations may employ different delay algorithms for different system components based on the capabilities of the respective components. Responses to unsuccessful system logon attempts may be implemented at the system and application levels.</p>

<p>Organization-defined actions that may be taken include prompting the user to answer a secret question in addition to the username and password, invoking a lockdown mode with limited user capabilities (instead of a full lockout), allowing users to only logon from specified Internet Protocol (IP) addresses, requiring a CAPTCHA to prevent automated attacks, or applying user profiles, such as location, time of day, IP address, device, or Media Access Control (MAC) address.</p>

<h5>References</h5>

<p>Source control: AC-07<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise </a></li>
</ul></details><details><summary><h4 id="03-01-09">03.01.09 System use notification</h4>
</summary><p>Display a system use notification message with privacy and security notices consistent with applicable specified information rules before granting access to the system.</p>

<h5>Discussion</h5>

<p>System use notifications can be implemented using warning or banner messages. The messages are displayed before individuals log in to the system. System use notifications are used for access via logon interfaces with human users and are not required when human interfaces do not exist. Organizations consider whether a secondary use notification is needed to access applications or other system resources after the initial network logon. Posters or other printed materials may be used in lieu of an automated system message. This requirement is related to <a href="#03-15-03">Rules of behaviour 03.15.03</a>.</p>

<h5>References</h5>

<p>Source control: AC-08<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-01-10">03.01.10 Device lock</h4>
</summary><ol class="lst-upr-alph"><li>Prevent access to the system by [Selection (one or more): initiating a device lock after [Assignment: organization-defined time period] of inactivity; requiring the user to initiate a device lock before leaving the system unattended].</li>
	<li>Retain the device lock until the user re-establishes access using established identification and authentication procedures.</li>
	<li>Conceal, via the device lock, information previously visible on the display with a publicly viewable image.</li>
</ol><h5>Discussion</h5>

<p>Device locks are temporary actions taken to prevent access to the system when users depart from the immediate vicinity of the system but do not want to log out because of the temporary nature of their absences. Device locks can be implemented at the operating system level or application level. User-initiated device locking is behaviour- or policy-based and requires users to take physical action to initiate the device lock. Device locks are not an acceptable substitute for logging out of the system (e.g., when organizations require users to log out at the end of workdays). Publicly viewable images can include static or dynamic images, such as patterns used with screen savers, photographic images, solid colors, a clock, a battery life indicator, or a blank screen with the caveat that specified information information is not displayed.</p>

<h5>References</h5>

<p>Source controls: AC-11, AC-11(01)<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-01-11">03.01.11 Session termination</h4>
</summary><p>Terminate a user session automatically after [Assignment: organization-defined conditions or trigger events requiring session disconnect].</p>

<h5>Discussion</h5>

<p>This requirement addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., disconnecting from the network) in <a href="file:///C|/Users/fcommiss/Documents/Working on/03-13-09">Network disconnect 03.13.09</a>. A logical session is initiated whenever a user (or processes acting on behalf of a user) accesses a system. Logical sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination ends all system processes associated with a user’s logical session except those processes that are created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events that require automatic session termination can include organization-defined periods of user inactivity, time-of-day restrictions on system use, and targeted responses to certain types of incidents.</p>

<h5>References</h5>

<p>Source control: AC-12<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-01-12">03.01.12 Remote access</h4>
</summary><ol class="lst-upr-alph"><li>Establish usage restrictions, configuration requirements, and connection requirements for each type of allowable remote system access.</li>
	<li>Authorize each type of remote system access prior to establishing such connections.</li>
	<li>Route remote access to the system through authorized and managed access control points.</li>
	<li>Authorize remote execution of privileged commands and remote access to security-relevant information.</li>
</ol><h5>Discussion</h5>

<p>Remote access is access to systems (or processes acting on behalf of users) that communicate through external networks, such as the Internet. Monitoring and controlling remote access methods allows organizations to detect attacks and ensure compliance with remote access policies. Routing remote access through managed access control points enhances explicit control over such connections and reduces susceptibility to unauthorized access to the system, which could result in the unauthorized disclosure of specified information.</p>

<p>Remote access to the system represents a significant potential vulnerability that can be exploited by adversaries. Restricting the execution of privileged commands and access to security-relevant information via remote access reduces the exposure of the organization and its susceptibility to threats by adversaries. A privileged command is a human-initiated command executed on a system that involves the control, monitoring, or administration of the system, including security functions and security-relevant information. Security-relevant information is information that can potentially impact the operation of security functions or the provision of security services in a manner that could result in failure to enforce the system security policy or maintain isolation of code and data. Privileged commands give individuals the ability to execute sensitive, security-critical, or security-relevant system functions.</p>

<h5>References</h5>

<p>Source controls: AC-17, AC-17(03), AC-17(04)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/46/r2/final">NIST SP 800-46 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/77/r1/final">NIST SP 800-77 Guide to IPsec <abbr title="virtual private network">VPN</abbr>s</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/113/final">NIST SP 800-113 Guide to SSL <abbr title="virtual private network">VPN</abbr>s</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/114/r1/final">NIST SP 800-114 User’s Guide to Telework and Bring Your Own Device (BYOD) Security</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/121/r2/upd1/final">NIST SP 800-121 Guide to Bluetooth Security</a></li>
</ul></details><h4 id="03-01-13">03.01.13 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-01-14">03.01.14 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-01-15">03.01.15 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-01-16">03.01.16 Wireless access</h4>
</summary><ol class="lst-upr-alph"><li>Establish usage restrictions, configuration requirements, and connection requirements for each type of wireless access to the system</li>
	<li>Authorize each type of wireless access to the system prior to establishing such connections</li>
	<li>Disable, when not intended for use, wireless networking capabilities prior to issuance and deployment</li>
	<li>Protect wireless access to the system using authentication and encryption</li>
</ol><h5>Discussion</h5>

<p>Wireless networking capabilities represent a significant potential vulnerability that can be exploited by adversaries. Establishing usage restrictions, configuration requirements, and connection requirements for wireless access to the system provides criteria to support access authorization decisions. These restrictions and requirements reduce susceptibility to unauthorized system access through wireless technologies. Wireless networks use authentication protocols that provide credential protection and mutual authentication. Organizations authenticate individuals and devices to protect wireless access to the system. Special attention is given to the variety of devices with potential wireless access to the system, including small form factor mobile devices (e.g., smart phones, tablets, smart watches). Wireless networking capabilities that are embedded within system components represent a significant potential vulnerability that can be exploited by adversaries. Strong authentication of users and devices, strong encryption, and disabling wireless capabilities that are not needed for essential missions or business functions can reduce susceptibility to threats by adversaries involving wireless technologies.</p>

<h5>References</h5>

<p>Source controls: AC-18, AC-18(01), AC-18(03)<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/security-requirements-wireless-local-area-networks-itsg-41">Cyber Centre Security Requirements for Wireless Local Area Networks (ITSG-41) </a></li>
	<li><a href="/en/guidance/guidance-securely-configuring-network-protocols-itsp40062">Cyber Centre Guidance on Securely Configuring Network Protocols (ITSP.40.062) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/94/final">NIST SP 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise </a></li>
</ul></details><h4 id="03-01-17">03.01.17 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-01-18">03.01.18 Access control for mobile devices</h4>
</summary><ol class="lst-upr-alph"><li>Establish usage restrictions, configuration requirements, and connection requirements for mobile devices</li>
	<li>Authorize the connection of mobile devices to the system</li>
	<li>Implement full-device or container-based encryption to protect the confidentiality of specified information on mobile devices</li>
</ol><h5>Discussion</h5>

<p>A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non-removable, or removable data storage; and includes a self-contained power source. Mobile device functionality may also include voice communication capabilities, on-board sensors that allow the device to capture information, and/or built-in features for synchronizing local data with remote locations. Examples include smart phones, smart watches, and tablets. Mobile devices are typically associated with a single individual. The processing, storage, and transmission capabilities of mobile devices may be comparable to or a subset of notebook or desktop systems, depending on the nature and intended purpose of the device. The protection and control of mobile devices are behaviour- or policy-based and requires users to take physical action to protect and control such devices when outside of controlled areas. Controlled areas are spaces for which the organization provides physical or procedural controls to meet the requirements established for protecting specified information.</p>

<p>Due to the large variety of mobile devices with different characteristics and capabilities, organizational restrictions may vary for the different classes or types of such devices. Usage restrictions, configuration requirements, and connection requirements for mobile devices include configuration management, device identification and authentication, implementing mandatory protective software, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system and possibly other software integrity checks, and disabling unnecessary hardware. On mobile devices, secure containers provide software-based data isolation designed to segment enterprise applications and information from personal apps and data. Containers may present multiple user interfaces, one of the most common being a mobile application that acts as a portal to a suite of business productivity apps, such as email, contacts, and calendar. Organizations can employ full-device encryption or container-based encryption to protect the confidentiality of specified information on mobile devices.</p>

<h5>References</h5>

<p>Source controls: AC-19, AC-19(05)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/46/r2/final">NIST SP 800-46 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/114/r1/final">NIST SP 800-114 User’s Guide to Telework and Bring Your Own Device (BYOD) Security </a></li>
</ul></details><h4 id="03-01-19">03.01.19 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-01-20">03.01.20 Use of external systems</h4>
</summary><ol class="lst-upr-alph"><li>Prohibit the use of external systems unless they are specifically authorized</li>
	<li>Establish the following terms, conditions, and security requirements to be satisfied on external systems prior to allowing use of or access to those systems by authorized individuals: [Assignment: organization-defined security requirements]</li>
	<li>Permit authorized individuals to use an external system to access the organization’s system or to process, store, or transmit specified information only after:
	<ol><li>verifying that the security requirements on the external system as specified in the organization’s system security and privacy plans have been satisfied</li>
		<li>retaining approved system connection or processing agreements with the organizational entities hosting the external systems</li>
	</ol></li>
	<li>Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems</li>
</ol><h5>Discussion</h5>

<p>External systems are systems that are used by but are not part of the organization. These systems include personally owned systems, system components, or devices; privately owned computing and communication devices in commercial or public facilities; systems owned or controlled by non-federal organizations; and systems managed by contractors. Organizations have the option to prohibit the use of any type of external system or specified types of external systems, (e.g., prohibit the use of external systems that are not organization-owned). Terms and conditions are consistent with the trust relationships established with the entities that own, operate, or maintain external systems and include descriptions of shared responsibilities.</p>

<p>Authorized individuals include organizational personnel, contractors, or other individuals with authorized access to the organizational system and over whom the organization has the authority to impose specific rules of behaviour regarding system access. Restrictions that organizations impose on authorized individuals may vary depending on the trust relationships between the organization and external entities. Organizations need assurance that the external systems satisfy the necessary security requirements so as not to compromise, damage, or harm the system. This requirement is related to <a href="#03-16-03">External system services 03.16.03</a>.</p>

<h5>References</h5>

<p>Source controls: AC-20, AC-20(01), AC-20(02)<br />
Supporting publications: None</p>
</details><h4 id="03-01-21">03.01.21 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-01-22">03.01.22 Publicly accessible content</h4>
</summary><ol class="lst-upr-alph"><li>Train authorized individuals to ensure that publicly accessible information does not contain specified information</li>
	<li>Review the content on publicly accessible systems for specified information periodically and remove such information, if discovered</li>
</ol><h5>Discussion</h5>

<p>In accordance with applicable laws, Orders in Council, directives, policies, regulations, standards, and guidelines, the public is not authorized to have access to non-public information, including specified information.</p>

<h5>References</h5>

<p>Source control: AC-22<br />
Supporting publications: None</p>
</details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-2">3.2 Awareness and training</h3>

<p>The Awareness and training controls deal with the education of users with respect to the security of the system.</p>
<!--	<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-02-01">03.02.01 Literacy training and awareness</a></li>
<li><a href="#03-02-02">03.02.02 Role-based training</a></li>
<li><a href="#03-02-03">03.02.03 Not allocated</a></li>
				</ul>
</section> -->

<details><summary><h4 id="03-02-01">03.02.01 Literacy training and awareness</h4>
</summary><ol class="lst-upr-alph"><li>Provide security and privacy literacy training to system users:
	<ol><li>as part of initial training for new users and [Assignment: organization-defined frequency] thereafter</li>
		<li>when required by system changes or following [Assignment: organization-defined events]</li>
		<li>on recognizing and reporting indicators of insider threat, social engineering, and social mining</li>
	</ol></li>
	<li>Update security and privacy literacy training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
</ol><h5>Discussion</h5>

<p>Organizations provide basic and advanced levels of security and privacy literacy training to system users (including managers, senior executives, system administrators, and contractors) and measures to test the knowledge level of users. Organizations determine the content of literacy training based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and the actions required of users to maintain security and to respond to incidents. The content also addresses the need for operations security and the handling of specified information.</p>

<p>Security and privacy awareness techniques include displaying posters, offering supplies inscribed with security reminders, displaying logon screen messages, generating email advisories or notices from organizational officials, and conducting awareness events using podcasts, videos, and webinars. Security and privacy literacy training is conducted at a frequency consistent with applicable laws, directives, regulations, and policies. Updating literacy training content on a regular basis ensures that the content remains relevant. Events that may precipitate an update to literacy training content include assessment or audit findings, security incidents or breaches, or changes in applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines.</p>

<p>Potential indicators and possible precursors of insider threats include behaviours such as inordinate, long-term job dissatisfaction; attempts to gain access to information that is not required for job performance; unexplained access to financial resources; sexual harassment or bullying of fellow employees; workplace violence; and other serious violations of the policies, procedures, rules, directives, or practices of organizations. Organizations may consider tailoring insider threat awareness topics to the role (e.g., training for managers may be focused on specific changes in the behaviour of team members, while training for employees may be focused on more general observations).</p>

<p>Social engineering is an attempt to deceive an individual into revealing information or taking an action that can be used to breach, compromise, or otherwise adversely impact a system. Social engineering includes phishing, pretexting, impersonation, baiting, quid pro quo, threadjacking, social media exploitation, and tailgating. Social mining is an attempt to gather information about the organization that may be used to support future attacks. Security and privacy literacy training includes how to communicate employee and management concerns regarding potential indicators of insider threat and potential and actual instances of social engineering and data mining through appropriate organizational channels in accordance with established policies and procedures.</p>

<h5>References</h5>

<p>Source controls: AT-02, AT-02(02), AT-02(03)<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Cyber Centre Offer tailored cyber security training to your employees (ITSAP.10.093) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final">NIST SP 800-160-2 Developing Cyber-Resilient Systems: A Systems Security Engineering Approach </a></li>
</ul></details><details><summary><h4 id="03-02-02">03.02.02 Role-based training</h4>
</summary><ol class="lst-upr-alph"><li>Provide role-based security and privacy training to organizational personnel:
	<ol><li>before authorizing access to the system or specified information, before performing assigned duties, and [Assignment: organization-defined frequency] thereafter</li>
		<li>when required by system changes or following [Assignment: organization-defined events]</li>
	</ol></li>
	<li>Update role-based training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
</ol><h5>Discussion</h5>

<p>Organizations determine the content and frequency of security and privacy training based on the assigned duties, roles, and responsibilities of individuals and the security and privacy requirements of the systems to which personnel have authorized access. In addition, organizations provide system developers, enterprise architects, security architects, privacy officers, software developers, systems integrators, acquisition/procurement officials, system and network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation, security assessors, and personnel with access to system-level software with security-related technical training specifically tailored for their assigned duties.</p>

<p>Comprehensive role-based training addresses management, operational, and technical roles and responsibilities that cover physical, personnel, and technical controls. Such training can include policies, procedures, tools, and artifacts for the security and privacy roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs.</p>

<h5>References</h5>

<p>Source control: AT-03<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/161/r1/final">NIST SP 800-161 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/181/r1/final">NIST SP 800-181 Workforce Framework for Cybersecurity (NICE Framework) </a></li>
</ul></details><h4 id="03-02-03">03.02.03 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-3">3.3 Audit and accountability</h3>

<p>The Audit and accountability controls support the ability to collect, analyze, and store audit records associated with user operations performed within the system.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-03-01">03.03.01 Event logging</a></li>
<li><a href="#03-03-02">03.03.02 Audit record content</a></li>
<li><a href="#03-03-03">03.03.03 Audit record generation</a></li>
<li><a href="#03-03-04">03.03.04 Response to audit logging process failures</a></li>
<li><a href="#03-03-05">03.03.05 Audit record review, analysis, and reporting</a></li>
<li><a href="#03-03-06">03.03.06 Audit record reduction and report generation</a></li>
<li><a href="#03-03-07">03.03.07 Time stamps</a></li>
<li><a href="#03-03-08">03.03.08 Protection of audit information</a></li>
	<li><a href="#03-03-09">03.03.09 Not allocated</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-03-01">03.03.01 Event logging</h4>
</summary><ol class="lst-upr-alph"><li>Specify the following event types selected for logging within the system: [Assignment: organization-defined event types]</li>
	<li>Review and update the event types selected for logging [Assignment: organization-defined frequency]</li>
</ol><h5>Discussion</h5>

<p>An event is any observable occurrence in a system, including unlawful or unauthorized system activity. Organizations identify event types for which a logging functionality is needed. This includes events that are relevant to the security of systems, the privacy of individuals, and the environments in which those systems operate to meet specific and ongoing auditing needs. Event types can include password changes, the execution of privileged functions, failed logons or accesses related to systems, administrative privilege usage, or third-party credential usage. In determining event types that require logging, organizations consider the system monitoring and auditing that are appropriate for each of the security requirements. When defining event types, organizations consider the logging necessary to cover related events, such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented or cloud-based architectures.</p>

<p>Monitoring and auditing requirements can be balanced with other system needs. For example, organizations may determine that systems must have the capability to log every file access, both successful and unsuccessful, but only activate that capability under specific circumstances due to the potential burden on system performance. The event types that are logged by organizations may change over time. Reviewing and updating the set of logged event types is necessary to ensure that the current set remains relevant.</p>

<h5>References</h5>

<p>Source control: AU-02<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/network-security-logging-monitoring-itsap80085">Cyber Centre Network security logging and monitoring (ITSAP.80.085) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/92/final">NIST SP 800-92 Guide to Computer Security Log Management </a></li>
</ul></details><details><summary><h4 id="03-03-02">03.03.02 Audit record content</h4>
</summary><ol class="lst-upr-alph"><li>Include the following content in audit records:
	<ol><li>what type of event occurred</li>
		<li>when the event occurred</li>
		<li>where the event occurred</li>
		<li>source of the event</li>
		<li>outcome of the event</li>
		<li>identity of individuals, subjects, objects, or entities associated with the event</li>
	</ol></li>
	<li>Provide additional information for audit records, as needed</li>
</ol><h5>Discussion</h5>

<p>Audit record content that may be necessary to support the auditing function includes time stamps, source and destination addresses, user or process identifiers, event descriptions, file names, and the access control or flow control rules that are invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the system after the event occurred). Detailed information that organizations may consider in audit records may include a full text recording of privileged commands or the individual identities of group account users.</p>

<h5>References</h5>

<p>Source controls: AU-03, AU-03(01)<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-03-03">03.03.03 Audit record generation</h4>
</summary><ol class="lst-upr-alph"><li>Generate audit records for the selected event types and audit record content specified in <a href="#03-03-01">Event logging 03.03.01</a> and <a href="#03-03-02">Audit record content 03.03.02</a></li>
	<li>Retain audit records for a time period consistent with records retention policy</li>
</ol><h5>Discussion</h5>

<p>Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit logging capability and can facilitate the identification of root causes to problems. The ability to add information generated in audit records is dependent on system functionality to configure the audit record content. Organizations may consider additional information in audit records, including the access control or flow control rules invoked and the individual identities of group account users. Organizations may also consider limiting additional audit record information to only information that is explicitly needed for audit requirements. If records generated for the audit process contain personal information that is not required for the audit process, that personal information should be removed or redacted prior to retention.</p>

<p>If audit records rely on personal information and that information is used to make an administrative decision, the minimum retention standard is at least two years following the last time the personal information was used for an administrative purpose unless the individual consents to its disposal.</p>

<h5>References</h5>

<p>Source controls: AU-11, AU-12<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/92/final">NIST SP 800-92 Guide to Computer Security Log Management</a></p>
</details><details><summary><h4 id="03-03-04">03.03.04 Response to audit logging process failures</h4>
</summary><ol class="lst-upr-alph"><li>Alert organizational personnel or roles within [Assignment: organization-defined time period] in the event of an audit logging process failure</li>
	<li>Take the following additional actions: [Assignment: organization-defined additional actions]</li>
</ol><h5>Discussion</h5>

<p>Audit logging process failures include software and hardware errors, failures in audit log capturing mechanisms, and reaching or exceeding audit log storage capacity. Response actions include overwriting the oldest audit records, shutting down the system, and stopping the generation of audit records. Organizations may choose to define additional actions for audit logging process failures based on the type, location, and severity of the failure, or a combination of such factors. When the audit logging process failure is related to storage, the response is carried out for the audit log storage repository (i.e., the distinct system component where the audit logs are stored), the system on which the audit logs reside, the total audit log storage capacity of the organization (i.e., all audit log storage repositories combined), or all three. Organizations may decide to take no additional actions after alerting designated roles or personnel.</p>

<h5>References</h5>

<p>Source control: AU-05<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-03-05">03.03.05 Audit record review, analysis, and reporting</h4>
</summary><ol class="lst-upr-alph"><li>Review and analyze system audit records [Assignment: organization-defined frequency] for indications and potential impact of inappropriate or unusual activity</li>
	<li>Report findings to organizational personnel or roles</li>
	<li>Analyze and correlate audit records across different repositories to gain organization-wide situational awareness</li>
</ol><h5>Discussion</h5>

<p>Audit record review, analysis, and reporting cover information security- and privacy-related logging performed by organizations and can include logging that results from the monitoring of account usage, remote access, wireless connectivity, configuration settings, the use of maintenance tools and non-local maintenance, system component inventory, mobile device connection, equipment delivery and removal, physical access, temperature and humidity, communications at system interfaces, and the use of mobile code. Findings can be reported to organizational entities, such as the incident response team, help desk, and security or privacy offices. If organizations are prohibited from reviewing and analyzing audit records or unable to conduct such activities, the review or analysis may be carried out by other organizations granted such authority. The scope, frequency, and/or depth of the audit record review, analysis, and reporting may be adjusted to meet organizational needs based on new information received. Correlating audit record review, analysis, and reporting processes helps to ensure that they collectively create a more complete view of events.</p>

<h5>References</h5>

<p>Source controls: AU-06, AU-06(03)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/86/final">NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/101/r1/final">NIST SP 800-101 Guidelines on Mobile Device Forensics </a></li>
</ul></details><details><summary><h4 id="03-03-06">03.03.06 Audit record reduction and report generation</h4>
</summary><ol class="lst-upr-alph"><li>Implement an audit record reduction and report generation capability that supports audit record review, analysis, reporting requirements, and after-the-fact investigations of incidents</li>
	<li>Preserve the original content and time ordering of audit records</li>
</ol><h5>Discussion</h5>

<p>Audit records are generated in <a href="#03-03-03">Audit record generation 03.03.03</a>. Audit record reduction and report generation occur after audit record generation. Audit record reduction is a process that manipulates collected audit information and organizes it in a summary format that is more meaningful to analysts. Audit record reduction and report generation capabilities do not always come from the same system or organizational entities that conduct auditing activities. An audit record reduction capability can include, for example, modern data mining techniques with advanced data filters to identify anomalous behaviour in audit records. The report generation capability provided by the system can help generate customizable reports. The time ordering of audit records can be a significant issue if the granularity of the time stamp in the record is insufficient.</p>

<h5>References</h5>

<p>Source control: AU-07<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-03-07">03.03.07 Time stamps</h4>
</summary><ol class="lst-upr-alph"><li>Use internal system clocks to generate time stamps for audit records</li>
	<li>Record time stamps for audit records that meet [Assignment: organization-defined granularity of time measurement] and that use Coordinated Universal Time (UTC), have a fixed local time offset from <abbr title="Coordinated Universal Time">UTC</abbr>, or include the local time offset as part of the time stamp</li>
</ol><h5>Discussion</h5>

<p>Time stamps generated by the system include the date and time. Time is commonly expressed in <abbr title="Coordinated Universal Time">UTC</abbr> or local time with an offset from <abbr title="Coordinated Universal Time">UTC</abbr>. The granularity of time measurements refers to the degree of synchronization between system clocks and reference clocks (e.g., clocks synchronizing within hundreds or tens of milliseconds). Organizations may define different time granularities for system components. Time service can be critical to other security capabilities (e.g., access control, and identification and authentication), depending on the nature of the mechanisms used to support those capabilities.</p>

<h5>References</h5>

<p>Source control: AU-08<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-03-08">03.03.08 Protection of audit information</h4>
</summary><ol class="lst-upr-alph"><li>Protect audit information and audit logging tools from unauthorized access, modification, and deletion</li>
	<li>Authorize access to management of audit logging functionality to only a subset of privileged users or roles</li>
</ol><h5>Discussion</h5>

<p>Audit information includes the information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personal information. Audit logging tools are programs and devices used to conduct audit and logging activities. The protection of audit information focuses on technical protection and limits the ability to access and execute audit logging tools to authorized individuals. The physical protection of audit information is addressed by media and physical protection requirements.</p>

<p>Individuals or roles with privileged access to a system and who are also the subject of an audit by that system may affect the reliability of the audit information by inhibiting audit activities or modifying audit records. Requiring privileged access to be further defined between audit-related privileges and other privileges limits the number of users or roles with audit-related privileges.</p>

<h5>References</h5>

<p>Source controls: AU-09, AU-09(04)<br />
Supporting publications: None</p>
</details><h4 id="03-03-09">03.03.09 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-4">3.4 Configuration management</h3>

<p>The Configuration management controls support the management and control of all components of the system such as hardware, software, and configuration items.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-04-01">03.04.01 Baseline configuration</a></li>
<li><a href="#03-04-02">03.04.02 Configuration settings</a></li>
<li><a href="#03-04-03">03.04.03 Configuration change control</a></li>
<li><a href="#03-04-04">03.04.04 Impact analyses</a></li>
<li><a href="#03-04-05">03.04.05 Access restrictions for change</a></li>
<li><a href="#03-04-06">03.04.06 Least functionality</a></li>
<li><a href="#03-04-07">03.04.07 Not allocated</a></li>
<li><a href="#03-04-08">03.04.08 Authorized software&nbsp;– allow by exception</a></li>
<li><a href="#03-04-09">03.04.09 Not allocated</a></li>
<li><a href="#03-04-10">03.04.10 System component inventory</a></li>
<li><a href="#03-04-11">03.04.11 Information location</a></li>
<li><a href="#03-04-12">03.04.12 System and component configuration for high-risk areas</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-04-01">03.04.01 Baseline configuration</h4>
</summary><ol class="lst-upr-alph"><li>Develop and maintain under configuration control, a current baseline configuration of the system</li>
	<li>Review and update the baseline configuration of the system [Assignment: organization-defined frequency] and when system components are installed or modified</li>
</ol><h5>Discussion</h5>

<p>Baseline configurations for the system and system components include aspects of connectivity, operation, and communications. Baseline configurations are documented, formally reviewed, and agreed-upon specifications for the system or configuration items within it. Baseline configurations serve as a basis for future builds, releases, or changes to the system and include information about system components, operational procedures, network topology, and the placement of components in the system architecture. Maintaining baseline configurations requires creating new baselines as the system changes over time. Baseline configurations of the system reflect the current enterprise architecture. If the system facilitates the collection or use of personal information, baseline configurations should include providing privacy notice to users.</p>

<h5>References</h5>

<p>Source control: CM-02<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems </a></li>
</ul></details><details><summary><h4 id="03-04-02">03.04.02 Configuration settings</h4>
</summary><ol class="lst-upr-alph"><li>Establish, document, and implement the following configuration settings for the system that reflect the most restrictive mode consistent with operational requirements: [Assignment: organization-defined configuration settings]</li>
	<li>Identify, document, and approve any deviations from established configuration settings.</li>
</ol><h5>Discussion</h5>

<p>Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system which affect the security and privacy posture or functionality of the system. Security-related configuration settings can be defined for systems (e.g., servers, workstations), input and output devices (e.g., scanners, copiers, printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications.</p>

<p>Security parameters are those that impact the security state of the system, including the parameters required to satisfy other security requirements. Security parameters include registry settings; account, file, and directory permission settings (i.e., privileges); and settings for functions, ports, protocols, and remote connections. Privacy parameters are parameters impacting the privacy posture of systems, including those required to satisfy other privacy controls. Privacy parameters include settings for access controls, personal information, data accuracy requirements, data manipulation capabilities, data processing preferences, and information handling and retention permissions. Organizations establish organization-wide configuration settings and subsequently derive specific configuration settings for the system. The established settings become part of the system’s configuration baseline.</p>

<p>Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, and security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific <abbr title="information technology">IT</abbr> platforms/products and instructions for configuring those system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations, including <abbr title="information technology">IT</abbr> product developers, manufacturers, vendors, consortia, academia, industry, federal departments and agencies, and other organizations in the public and private sectors.</p>

<h5>References</h5>

<p>Source control: CM-06<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/baseline-security-requirements-network-security-zones-version-20-itsp80022">Cyber Centre Baseline Security Requirements for Network Security Zones (ITSP.80.022) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/70/r4/final">NIST SP 800-70 National Checklist Program for <abbr title="information technology">IT</abbr> Products: Guidelines for Checklist Users and Developers </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/126/r3/final">NIST SP 800-126 The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3 </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems</a></li>
</ul></details><details><summary><h4 id="03-04-03">03.04.03 Configuration change control</h4>
</summary><ol class="lst-upr-alph"><li>Define the types of changes to the system that are configuration-controlled</li>
	<li>Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security impacts</li>
	<li>Implement and document approved configuration-controlled changes to the system</li>
	<li>Monitor and review activities associated with configuration-controlled changes to the system</li>
</ol><h5>Discussion</h5>

<p>Configuration change control refers to tracking, reviewing, approving or disapproving, and logging changes to the system. Specifically, it involves the systematic proposal, justification, implementation, testing, review, and disposition of changes to the system, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for system components (e.g., operating systems, applications, firewalls, routers, mobile devices) and configuration items of the system, changes to configuration settings, unscheduled and unauthorized changes, and changes to remediate vulnerabilities. This requirement is related to <a href="#03-04-04">Impact analyses 03.04.04</a>.</p>

<h5>References</h5>

<p>Source control: CM-03<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems </a></li>
</ul></details><details><summary><h4 id="03-04-04">03.04.04 Impact analyses</h4>
</summary><ol class="lst-upr-alph"><li>Analyze the security and privacy impacts of changes to the system prior to implementation</li>
	<li>Verify that the security requirements for the system continue to be satisfied after the system changes have been implemented</li>
</ol><h5>Discussion</h5>

<p>Organizational personnel with security or privacy responsibilities conduct impact analyses that include reviewing security and privacy plans, policies, and procedures to understand security and privacy requirements; reviewing system design documentation and operational procedures to understand how system changes might affect the security and privacy state of the system; reviewing the impacts of changes on supply chain partners with stakeholders; and determining how potential changes to a system create new risks to the privacy of individuals, and the ability to mitigate those risks. Impact analyses also include risk assessments to understand the impacts of changes and to determine whether additional security or privacy requirements are needed. Changes to the system may affect the safeguards and countermeasures previously implemented. This requirement is related to <a href="#03-04-03">Configuration change control 03.04.03</a>. Not all changes to the system are configuration controlled.</p>

<h5>References</h5>

<p>Source controls: CM-04, CM-04(02)<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems</a></p>
</details><details><summary><h4 id="03-04-05">03.04.05 Access restrictions for change</h4>
</summary><p>Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.</p>

<h5>Discussion</h5>

<p>Changes to the hardware, software, or firmware components of the system or the operational procedures related to the system can have potentially significant effects on the security of the system or individuals’ privacy. Therefore, organizations permit only qualified and authorized individuals to access the system for the purpose of initiating changes. Access restrictions include physical and logical access controls, software libraries, workflow automation, media libraries, abstract layers (i.e., changes implemented into external interfaces rather than directly into the system), and change windows (i.e., changes occur only during specified times).</p>

<h5>References</h5>

<p>Source control: CM-05<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/fips/140-3/final">NIST FIPS 140-3 Security Requirements for Cryptographic Modules </a></li>
	<li><a href="https://csrc.nist.gov/pubs/fips/186-5/final">NIST FIPS 186-5 Digital Signature Standard (DSS) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems </a></li>
</ul></details><details><summary><h4 id="03-04-06">03.04.06 Least functionality</h4>
</summary><ol class="lst-upr-alph"><li>Configure the system to provide only mission-essential capabilities</li>
	<li>Prohibit or restrict use of the following functions, ports, protocols, connections, and services: [Assignment: organization-defined functions, ports, protocols, connections, and services]</li>
	<li>Review the system [Assignment: organization-defined frequency] to identify unnecessary or nonsecure functions, ports, protocols, connections, and services</li>
	<li>Disable or remove functions, ports, protocols, connections, and services that are unnecessary or nonsecure</li>
</ol><h5>Discussion</h5>

<p>Systems can provide a variety of functions and services. Some functions and services that are routinely provided by default may not be necessary to support essential organizational missions, functions, or operations. It may be convenient to provide multiple services from single system components. However, doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit functionality to a single function per component.</p>

<p>Organizations review the functions and services provided by the system or system components to determine which functions and services are candidates for elimination. Organizations disable unused or unnecessary physical and logical ports and protocols to prevent the unauthorized connection of devices, transfer of information, and tunneling. Organizations can employ network scanning tools, intrusion detection and prevention systems, and endpoint protection systems (e.g., firewalls and host-based intrusion detection systems) to identify and prevent the use of prohibited functions, ports, protocols, system connections, and services. Bluetooth, File Transfer Protocol (FTP), and peer-to-peer networking are examples of the types of protocols that organizations consider eliminating, restricting, or disabling.</p>

<h5>References</h5>

<p>Source controls: CM-07, CM-07(01)<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/application-allow-list-itsap10095">Cyber Centre Application Allow Lists (ITSAP.10.095) </a></li>
	<li><a href="/en/top-top-10-it-security-action-items-no-10-implement-application-allow-lists-itsm10095">Cyber Centre Top 10 <abbr title="information technology">IT</abbr> security action items: No. 10 Implement application allow lists (ITSM.10.095) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final">NIST SP 800-160-1 Engineering Trustworthy Secure Systems </a></li>
	<li>Cyber Centre System lifecycle cyber security and privacy risk management activities (ITSP.10.037)</li>
</ul></details><h4 id="03-04-07">03.04.07 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-04-08">03.04.08 Authorized software – allow by exception</h4>
</summary><ol class="lst-upr-alph"><li>Identify software programs authorized to execute on the system</li>
	<li>Implement a deny-all, allow-by-exception policy for the execution of software programs on the system</li>
	<li>Review and update the list of authorized software programs [Assignment: organization-defined frequency]</li>
</ol><h5>Discussion</h5>

<p>If provided with the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations include updates and security patches to existing software and downloading new applications from organization-approved “app stores.” The policies selected for governing user-installed software are organization-developed or provided by an external entity. Policy enforcement methods can include procedural methods and automated methods.</p>

<p>Authorized software programs can be limited to specific versions or from a specific source. To facilitate a comprehensive authorized software process and increase the strength of protection against attacks that bypass application-level authorized software, software programs may be decomposed into and monitored at different levels of detail. These levels include applications, application programming interfaces, application modules, scripts, system processes, system services, kernel functions, registries, drivers, and dynamic link libraries.</p>

<h5>References</h5>

<p>Source control: CM-07(05)<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/application-allow-list-itsap10095">Cyber Centre Application Allow Lists (ITSAP.10.095) </a></li>
	<li><a href="/en/top-top-10-it-security-action-items-no-10-implement-application-allow-lists-itsm10095">Cyber Centre Top 10 <abbr title="information technology">IT</abbr> security action items: No. 10 Implement application allow lists (ITSM.10.095) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final">NIST SP 800-160-1 Engineering Trustworthy Secure Systems </a></li>
</ul></details><h4 id="03-04-09">03.04.09 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-04-10">03.04.10 System component inventory</h4>
</summary><ol class="lst-upr-alph"><li>Develop and document an inventory of system components</li>
	<li>Review and update the system component inventory [Assignment: organization-defined frequency]</li>
	<li>Update the system component inventory as part of installations, removals, and system updates</li>
</ol><h5>Discussion</h5>

<p>System components are discrete, identifiable assets (i.e., hardware, software, and firmware elements) that compose a system. Organizations may implement centralized system component inventories that include components from all systems. In such situations, organizations ensure that the inventories include system-specific information required for component accountability. The information necessary for effective accountability of system components includes the system name, software owners, software version numbers, hardware inventory specifications, software license information — and for networked components — the machine names and network addresses for all implemented protocols (e.g., IPv4, IPv6). Inventory specifications include component type, physical location, date of receipt, manufacturer, cost, model, serial number, and supplier information.</p>

<h5>References</h5>

<p>Source controls: CM-08, CM-08(01)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems </a></li>
</ul></details><details><summary><h4 id="03-04-11">03.04.11 Information location</h4>
</summary><ol class="lst-upr-alph"><li>Identify and document the location of specified information and the system components on which the information is processed and stored.</li>
	<li>Document changes to the system or system component location where specified information is processed and stored.</li>
</ol><h5>Discussion</h5>

<p>Information location addresses the need to understand the specific system components where specified information is being processed and stored and the users who have access to specified information so that appropriate protection mechanisms can be provided, including information flow controls, access controls, and information management.</p>

<h5>References</h5>

<p>Source control: CM-12<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-04-12">03.04.12 System and component configuration for high-risk areas</h4>
</summary><ol class="lst-upr-alph"><li>Issue systems or system components with the following configurations to individuals traveling to high-risk locations: [Assignment: organization-defined system configurations].</li>
	<li>Apply the following security requirements to the system or system components when the individuals return from travel: [Assignment: organization-defined security requirements].</li>
</ol><h5>Discussion</h5>

<p>When it is known that a system or a specific system component will be in a high-risk area, additional security requirements may be needed to counter the increased threat. Organizations can implement protective measures on systems or system components used by individuals departing on and returning from travel. Actions include determining locations of concern, defining the required configurations for the components, ensuring that the components are configured as intended before travel is initiated, and taking additional actions after travel is completed. For example, systems going into high-risk areas can be configured with sanitized hard drives, limited applications, and more stringent configuration settings. Actions applied to mobile devices upon return from travel include examining the device for signs of physical tampering and purging and reimaging the device storage.</p>

<h5>References</h5>

<p>Source control: CM-02(07)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems </a></li>
</ul></details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-5">3.5 Identification and authentication</h3>

<p>The Identification and authentication controls support the unique identification of users, processes acting on behalf of users and devices. They also support the authentication or verification of the identities of those users, processes or devices as a prerequisite to allowing access to organizational systems.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-05-01">03.05.01 User identification, authentication, and re-authentication</a></li>
<li><a href="#03-05-02">03.05.02 Device identification and authentication</a></li>
<li><a href="#03-05-03">03.05.03 Multi-factor authentication</a></li>
<li><a href="#03-05-04">03.05.04 Replay-resistant authentication</a></li>
<li><a href="#03-05-05">03.05.05 Identifier management</a></li>
<li><a href="#03-05-06">03.05.06 Not allocated</a></li>
<li><a href="#03-05-07">03.05.07 Password management</a></li>
<li><a href="#03-05-08">03.05.08 Not allocated</a></li>
<li><a href="#03-05-09">03.05.09 Not allocated</a></li>
<li><a href="#03-05-10">03.05.10 Not allocated</a></li>
<li><a href="#03-05-11">03.05.11 Authentication feedback</a></li>
<li><a href="#03-05-12">03.05.12 Authenticator management</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-05-01">03.05.01 User identification, authentication, and re-authentication</h4>
</summary><ol class="lst-upr-alph"><li>Uniquely identify and authenticate system users and associate that unique identification with processes acting on behalf of those users</li>
	<li>Re-authenticate users when [Assignment: organization-defined circumstances or situations requiring re-authentication]</li>
</ol><h5>Discussion</h5>

<p>System users include individuals (or system processes acting on behalf of individuals) who are authorized to access a system. Typically, individual identifiers are the usernames associated with the system accounts assigned to those individuals. Since system processes execute on behalf of groups and roles, organizations may require the unique identification of individuals in group accounts or accountability of individual activity. The unique identification and authentication of users applies to all system accesses. Organizations employ passwords, physical authenticators, biometrics, or some combination thereof to authenticate user identities. Organizations may re-authenticate individuals in certain situations, including when roles, authenticators, or credentials change; when the execution of privileged functions occurs; after a fixed time period; or periodically.</p>

<h5>References</h5>

<p>Source controls: IA-02, IA-11<br />
Supporting publications: <a href="https://www.cyber.gc.ca/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031)</a></p>
</details><details><summary><h4 id="03-05-02">03.05.02 Device identification and authentication</h4>
</summary><p>Uniquely identify and authenticate [Assignment: organization-defined devices or types of devices] before establishing a system connection.</p>

<h5>Discussion</h5>

<p>Devices that require unique device-to-device identification and authentication are defined by type, device, or a combination of type and device. Organization-defined device types include devices that are not owned by the organization. Systems use shared known information (e.g., Media Access Control [MAC], Transmission Control Protocol/Internet Protocol [TCP/IP] addresses) for device identification or organizational authentication solutions (e.g., Institute of Electrical and Electronics Engineers [IEEE] 802.1x and Extensible Authentication Protocol [EAP], RADIUS server with EAP-Transport Layer Security [TLS] authentication, Kerberos) to identify and authenticate devices on local and wide area networks. Public Key Infrastructure (PKI) and certificate revocation checking for the certificates exchanged can also be included as part of device authentication.</p>

<h5>References</h5>

<p>Source control: IA-03<br />
Supporting publications: <a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031) </a></p>
</details><details><summary><h4 id="03-05-03">03.05.03 Multi-factor authentication</h4>
</summary><p>Implement strong multi-factor authentication (MFA) for access to privileged and non-privileged accounts.</p>

<h5>Discussion</h5>

<p>This requirement applies to user accounts. Multi-factor authentication requires the use of two or more different factors to achieve authentication. The authentication factors are defined as follows: something you know (e.g., a personal identification number [PIN]), something you have (e.g., a physical authenticator, such as a cryptographic private key), or something you are (e.g., a biometric). Multi-factor authentication solutions that feature physical authenticators include hardware authenticators that provide time-based or challenge-response outputs and smart cards. In addition to authenticating users at the system level, organizations may also employ authentication mechanisms at the application level to provide increased information security.</p>

<h5>References</h5>

<p>Source controls: IA-02(01), IA-02(02)<br />
Supporting publications: <a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031)</a></p>
</details><details><summary><h4 id="03-05-04">03.05.04 Replay-resistant authentication</h4>
</summary><p>Implement replay-resistant authentication mechanisms for access to privileged and non-privileged accounts.</p>

<h5>Discussion</h5>

<p>Authentication processes resist replay attacks if it is impractical to successfully authenticate by recording or replaying previous authentication messages. Replay-resistant techniques include protocols that use nonces or challenges, such as time synchronous or challenge-response one-time authenticators.</p>

<h5>References</h5>

<p>Source control: IA-02(08)<br />
Supporting publications: <a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031)</a></p>
</details><details><summary><h4 id="03-05-05">03.05.05 Identifier management</h4>
</summary><ol class="lst-upr-alph"><li>Receive authorization from organizational personnel or roles to assign an individual, group, role, service, or device identifier</li>
	<li>Select and assign an identifier that identifies an individual, group, role, service, or device</li>
	<li>Prevent reuse of identifiers for [Assignment: organization-defined time period]</li>
	<li>Manage individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteristic identifying individual status]</li>
</ol><h5>Discussion</h5>

<p>Identifiers are provided for users, processes acting on behalf of users, and devices. Prohibiting the reuse of identifiers prevents the assignment of previously used individual, group, role, service, or device identifiers to different individuals, groups, roles, services, or devices.</p>

<p>Characteristics that identify the status of individuals include contractors, foreign nationals, and non-organizational users. Identifying the status of individuals by these characteristics provides information about the people with whom organizational personnel are communicating. For example, it is useful for an employee to know that one of the individuals on an email message is a contractor.</p>

<h5>References</h5>

<p>Source controls: IA-04, IA-04(04)<br />
Supporting publications: <a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031)</a></p>
</details><h4 id="03-05-06">03.05.06 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-05-07">03.05.07 Password management</h4>
</summary><ol class="lst-upr-alph"><li>Maintain a list of commonly used, expected, or compromised passwords and update the list [Assignment: organization-defined frequency] and when organizational passwords are suspected to have been compromised</li>
	<li>Verify that passwords are not found on the list of commonly used, expected, or compromised passwords when users create or update passwords</li>
	<li>Transmit passwords only over cryptographically protected channels</li>
	<li>Store passwords in a cryptographically protected form</li>
	<li>Select a new password upon first use after account recovery</li>
	<li>Enforce the following composition and complexity rules for passwords: [Assignment: organization-defined composition and complexity rules]</li>
</ol><h5>Discussion</h5>

<p>Password-based authentication applies to passwords used in single-factor or multi-factor authentication. Long passwords or passphrases are preferable to shorter passwords. Enforced composition rules provide marginal security benefits while decreasing usability. However, organizations may choose to establish and enforce certain rules for password generation (e.g., minimum character length) under certain circumstances. For example, account recovery can occur when a password is forgotten. Cryptographically protected passwords include salted one-way cryptographic hashes of passwords. The list of commonly used, compromised, or expected passwords includes passwords obtained from previous breach corpuses, dictionary words, and repetitive or sequential characters. The list includes context-specific words, such as the name of the service, username, and derivatives thereof. Changing temporary passwords to permanent passwords immediately after system logon ensures that the necessary strength of the authentication mechanism is implemented at the earliest opportunity and reduces the susceptibility to authenticator compromises. Long passwords and passphrases can be used to increase the complexity of passwords.</p>

<h5>References</h5>

<p>Source control: IA-05(01)<br />
Supporting publications: <a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031)</a></p>
</details><h4 id="03-05-08">03.05.08 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-05-09">03.05.09 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-05-10">03.05.10 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-05-11">03.05.11 Authentication feedback</h4>
</summary><p>Obscure feedback of authentication information during the authentication process.</p>

<h5>Discussion</h5>

<p>Authentication feedback does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For example, for desktop or notebook computers with relatively large monitors, the threat may be significant (commonly referred to as shoulder surfing). For mobile devices with small displays, this threat may be less significant and is balanced against the increased likelihood of input errors due to small keyboards. Therefore, the means for obscuring the authentication feedback is selected accordingly. Obscuring feedback includes displaying asterisks when users type passwords into input devices or displaying feedback for a limited time before fully obscuring it.</p>

<h5>References</h5>

<p>Source control: IA-06<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-05-12">03.05.12 Authenticator management</h4>
</summary><ol class="lst-upr-alph"><li>Verify the identity of the individual, group, role, service, or device receiving the authenticator as part of the initial authenticator distribution</li>
	<li>Establish initial authenticator content for any authenticators issued by the organization</li>
	<li>Establish and implement administrative procedures for initial authenticator distribution, for lost, compromised, or damaged authenticators, and for revoking authenticators</li>
	<li>Change default authenticators at first use</li>
	<li>Change or refresh authenticators [Assignment: organization-defined frequency] or when the following events occur: [Assignment: organization-defined events]</li>
	<li>Protect authenticator content from unauthorized disclosure and modification</li>
</ol><h5>Discussion</h5>

<p>Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. The initial authenticator content is the actual content of the authenticator (e.g., the initial password). In contrast, requirements for authenticator content contain specific characteristics. Authenticator management is supported by organization-defined settings and restrictions for various authenticator characteristics (e.g., password complexity and composition rules, validation time window for time synchronous one-time tokens, and the number of allowed rejections during the verification stage of biometric authentication).</p>

<p>The requirement to protect individual authenticators may be implemented by <a href="#03-15-03">Rules of behaviour 03.15.03</a> for authenticators in the possession of individuals and by <a href="#03-01-01">Account management 03.01.01</a>, <a href="#03-01-01">Access enforcement 03.01.02</a>, <a href="#03-01-05">Least privilege 03.01.05</a>, and <a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a> for authenticators stored in organizational systems. This includes passwords stored in hashed or encrypted formats or files that contain encrypted or hashed passwords accessible with administrator privileges. Actions can be taken to protect authenticators, including maintaining possession of authenticators, not sharing authenticators with others, and immediately reporting lost, stolen, or compromised authenticators.</p>

<p>Developers may deliver system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well-known, easily discoverable, and present a significant risk. Authenticator management includes issuing and revoking authenticators for temporary access when no longer needed. The use of long passwords or passphrases may obviate the need to periodically change authenticators.</p>

<h5>References</h5>

<p>Source control: IA-05<br />
Supporting publications: <a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031)</a></p>
</details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-6">3.6 Incident response</h3>

<p>The Incident response controls support the establishment of an operational incident handling capability for organizational systems that includes adequate preparation, monitoring, detection, analysis, containment, recovery, and response. Incidents are monitored, documented, and reported to appropriate organizational officials and authorities.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-06-01">03.06.01 Incident handling</a></li>
<li><a href="#03-06-02">03.06.02 Incident monitoring, reporting, and response assistance</a></li>
<li><a href="#03-06-03">03.06.03 Incident response testing</a></li>
<li><a href="#03-06-04">03.06.04 Incident response training</a></li>
<li><a href="#03-06-05">03.06.05 Incident response plan</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-06-01">03.06.01 Incident handling</h4>
</summary><p>Implement an incident-handling capability that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery</p>

<h5>Discussion</h5>

<p>Incident-related information can be obtained from a variety of sources, including audit monitoring, network monitoring, physical access monitoring, user and administrator reports, and reported supply chain events. An effective incident handling capability involves coordination among many organizational entities, including mission and business owners, system owners, human resources offices, physical and personnel security offices, legal departments, operations personnel, and procurement offices.</p>

<p>An incident that involves personal information is considered a privacy breach. A privacy breach results in the loss of control, compromise, unauthorized disclosure, unpermitted use, unlawful collection, improper retention or disposal, or a similar occurrence where a person other than an authorized user accesses or potentially accesses or an authorized user accesses or potentially accesses such information for other than authorized purposes.</p>

<p>If the incident involves the breach of personal information, notification to the contract owner is mandatory.</p>

<h5>References</h5>

<p>Source control: IR-04<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Cyber Centre Developing your incident response plan (ITSAP.40.003)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/61/r2/final">NIST SP 800-61 Computer Security Incident Handling Guide </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/161/r1/final">NIST SP 800-161 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations</a></li>
</ul></details><details><summary><h4 id="03-06-02">03.06.02 Incident monitoring, reporting, and response assistance</h4>
</summary><ol class="lst-upr-alph"><li>Track and document system security incidents</li>
	<li>Report suspected incidents to the organizational incident response capability within [Assignment: organization-defined time period]</li>
	<li>Report incident information to [Assignment: organization-defined authorities]</li>
	<li>Provide an incident response support resource that offers advice and assistance to system users for the handling and reporting of incidents</li>
</ol><h5>Discussion</h5>

<p>Documenting incidents includes maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics as well as evaluating incident details, trends, and handling. Incident information can be obtained from many sources, including network monitoring, incident reports, incident response teams, user complaints, supply chain partners, audit monitoring, physical access monitoring, and user and administrator reports. <a href="#03-06-01">Incident handling 03.06.01</a> provides information on the types of incidents that are appropriate for monitoring. The types of incidents reported, the content and timeliness of the reports, and the reporting authorities reflect applicable laws, jurisprudence, Orders in Council, directives, regulations, policies, standards, and guidelines. Incident information informs risk assessments, the effectiveness of security and privacy assessments, the security requirements for acquisitions, and the selection criteria for technology products. Incident response support resources provided by organizations include help desks, assistance groups, automated ticketing systems to open and track incident response tickets, and access to forensic services or consumer redress services, when required.</p>

<h5>References</h5>

<p>Source controls: IR-05, IR-06, IR-07<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/61/r2/final">NIST SP 800-61 Computer Security Incident Handling Guide</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/86/final">NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response</a></li>
	<li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Cyber Centre Developing your incident response plan (ITSAP.40.003)</a></li>
</ul></details><details><summary><h4 id="03-06-03">03.06.03 Incident response testing</h4>
</summary><p>Test the effectiveness of the incident response capability [Assignment: organization-defined frequency].</p>

<h5>Discussion</h5>

<p>Organizations test incident response capabilities to determine their effectiveness and identify potential weaknesses or deficiencies. Incident response testing includes the use of checklists, walk-through or tabletop exercises, and simulations. Incident response testing can include a determination of the effects of incident response on organizational operations, organizational assets, and individuals. Qualitative and quantitative data can help determine the effectiveness of incident response processes.</p>

<h5>References</h5>

<p>Source control: IR-03<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/84/final">NIST SP 800-84 Guide to Test, Training, and Exercise Programs for <abbr title="information technology">IT</abbr> Plans and Capabilities</a></p>
</details><details><summary><h4 id="03-06-04">03.06.04 Incident response training</h4>
</summary><ol class="lst-upr-alph"><li>Provide incident response training to system users consistent with assigned roles and responsibilities:
	<ol><li>within [Assignment: organization-defined time period] of assuming an incident response role or responsibility or acquiring system access</li>
		<li>when required by system changes</li>
		<li>[Assignment: organization-defined frequency] thereafter</li>
	</ol></li>
	<li>Review and update incident response training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]</li>
</ol><h5>Discussion</h5>

<p>Incident response training is associated with the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail are included in such training. For example, users may only need to know whom to call or how to recognize an incident; system administrators may require additional training on how to handle incidents; and incident responders may receive specific training on forensics, data collection techniques, reporting, system recovery, and system restoration. Incident response training includes user training in identifying and reporting suspicious activities from external and internal sources. Incident response training for users may be provided as part of <a href="#03-02-02">Role-based training 03.02.02</a>. Events that may cause an update to incident response training content include incident response plan testing, response to an actual incident, audit or assessment findings, or changes in applicable laws, jurisprudence, Orders in Council, policies, directives, regulations, standards, and guidelines.</p>

<h5>References</h5>

<p>Source control: IR-02<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/86/final">NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/137/final">NIST SP 800-137 Information Security Continuous Monitoring (ISCM)</a></li>
</ul></details><details><summary><h4 id="03-06-05">03.06.05 Incident response plan</h4>
</summary><ol class="lst-upr-alph"><li>Develop an incident response plan that:
	<ol><li>provides the organization with a roadmap for implementing its incident response capability</li>
		<li>describes the structure and organization of the incident response capability</li>
		<li>provides a high-level approach for how the incident response capability fits into the overall organization</li>
		<li>defines reportable incidents</li>
		<li>addresses the sharing of incident information</li>
		<li>designates responsibilities to organizational entities, personnel, or roles</li>
	</ol></li>
	<li>Distribute copies of the incident response plan to designated incident response personnel (identified by name and/or by role) and organizational elements</li>
	<li>Update the incident response plan to address system and organizational changes or problems encountered during plan implementation, execution, or testing</li>
	<li>Protect the incident response plan from unauthorized disclosure</li>
</ol><h5>Discussion</h5>

<p>It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabilities. As part of the incident response capabilities, organizations consider the coordination and sharing of information with external organizations, including external service providers and other organizations involved in the supply chain.</p>

<h5>References</h5>

<p>Source control: IR-08<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Cyber Centre Developing your incident response plan (ITSAP.40.003) </a></li>
	<li><a href="https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/dvlpng-ndnt-rspns-pln/index-en.aspx">Public Safety Canada Developing an Operational Technology and Information Technology Incident Response Plan </a></li>
	<li><a href="https://laws-lois.justice.gc.ca/eng/regulations/SOR-2018-64/index.html">Breach of Security Safeguards Regulations SOR/2018-64 </a></li>
</ul></details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-7">3.7 Maintenance</h3>

<p>The Maintenance controls support periodic and timely maintenance on organizational systems and provide effective controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance to ensure its ongoing availability.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-07-01">03.07.01 Not allocated</a></li>
<li><a href="#03-07-02">03.07.02 Not allocated</a></li>
<li><a href="#03-07-03">03.07.03 Not allocated</a></li>
<li><a href="#03-07-04">03.07.04 Maintenance tools</a></li>
<li><a href="#03-07-05">03.07.05 Non-local maintenance</a></li>
<li><a href="#03-07-06">03.07.06 Maintenance personnel</a></li>
				</ul>
</section>-->

<h4 id="03-07-01">03.07.01 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-07-02">03.07.02 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-07-03">03.07.03 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-07-04">03.07.04 Maintenance tools</h4>
</summary><ol class="lst-upr-alph"><li>Approve, control, and monitor the use of system maintenance tools</li>
	<li>Check media containing diagnostic and test programs for malicious code before the media are used in the system</li>
	<li>Prevent the removal of system maintenance equipment containing specified information by verifying that there is no specified information on the equipment, sanitizing or destroying the equipment, or retaining the equipment within the facility</li>
</ol><h5>Discussion</h5>

<p>Approving, controlling, monitoring, and reviewing maintenance tools address security-related issues associated with the tools that are used for diagnostic and repair actions on the system. Maintenance tools can include hardware and software diagnostic and test equipment as well as packet sniffers. The tools may be pre-installed, brought in with maintenance personnel on media, cloud-based, or downloaded from a website. Diagnostic and test programs are potential vehicles for transporting malicious code into the system, either intentionally or unintentionally. Examples of media inspection include checking the cryptographic hash or digital signatures of diagnostic and test programs and media.</p>

<p>If organizations inspect media that contain diagnostic and test programs and determine that the media also contains malicious code, the incident is handled consistent with incident handling policies and procedures. A periodic review of maintenance tools can result in the withdrawal of approval for outdated, unsupported, irrelevant, or no-longer-used tools. Maintenance tools do not address the hardware and software components that support maintenance and are considered a part of the system.</p>

<h5>References</h5>

<p>Source controls: MA-03, MA-03(01), MA-03(02), MA-03(03)<br />
Supporting publications: <a href="https://www.cyber.gc.ca/en/guidance/it-media-sanitization-itsp40006">Cyber Centre <abbr title="information technology">IT</abbr> media sanitization (ITSP.40.006)</a></p>
</details><details><summary><h4 id="03-07-05">03.07.05 Non-local maintenance</h4>
</summary><ol class="lst-upr-alph"><li>Approve and monitor non-local maintenance and diagnostic activities.</li>
	<li>Implement multi-factor authentication and replay resistance in the establishment of non-local maintenance and diagnostic sessions.</li>
	<li>Terminate session and network connections when non-local maintenance is completed.</li>
</ol><h5>Discussion</h5>

<p>Non-local maintenance and diagnostic activities are conducted by individuals who communicate through an external or internal network. Local maintenance and diagnostic activities are carried out by individuals who are physically present at the system location and not communicating across a network connection. Authentication techniques used to establish non-local maintenance and diagnostic sessions reflect the requirements in <a href="#03-05-01">User identification, authentication, and re-authentication 03.05.01</a>.</p>

<h5>References</h5>

<p>Source control: MA-04<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/user-authentication-guidance-information-technology-systems-itsp30031-v3">Cyber Centre User Authentication Guidance for Information Technology Systems (ITSP.30.031) </a></li>
	<li><a href="/en/guidance/it-media-sanitization-itsp40006">Cyber Centre <abbr title="information technology">IT</abbr> media sanitization (ITSP.40.006) </a></li>
	<li><a href="/en/identity-credential-and-access-management-icam-itsap30018">Cyber Centre Identity, Credential, and Access Management (ICAM) (ITSAP.30.018) </a></li>
</ul></details><details><summary><h4 id="03-07-06">03.07.06 Maintenance personnel</h4>
</summary><ol class="lst-upr-alph"><li>Establish a process for maintenance personnel authorization</li>
	<li>Maintain a list of authorized maintenance organizations or personnel</li>
	<li>Verify that non-escorted personnel who perform maintenance on the system possess the required access authorizations</li>
	<li>Designate organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations</li>
</ol><h5>Discussion</h5>

<p>Maintenance personnel refers to individuals who perform hardware or software maintenance on the system, while <a href="#03-10-01">Physical access authorizations 03.10.01</a> addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the system. The technical competence of supervising individuals relates to the maintenance performed on the system, while having required access authorizations refers to maintenance on and near the system. Individuals who have not been previously identified as authorized maintenance personnel (e.g., manufacturers, consultants, systems integrators, and vendors) may require privileged access to the system, such as when they are required to conduct maintenance with little or no notice. Organizations may choose to issue temporary credentials to these individuals based on their risk assessments. Temporary credentials may be for one-time use or for very limited time periods.</p>

<h5>References</h5>

<p>Source control: MA-05<br />
Supporting publications: None</p>
</details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-8">3.8 Media protection</h3>

<p>Physically control and securely store system media containing <abbr title="controlled information">CI</abbr>.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-08-01">03.08.01 Media storage</a></li>
<li><a href="#03-08-02">03.08.02 Media access</a></li>
<li><a href="#03-08-03">03.08.03 Media sanitization</a></li>
<li><a href="#03-08-04">03.08.04 Media marking</a></li>
<li><a href="#03-08-05">03.08.05 Media transport</a></li>
<li><a href="#03-08-06">03.08.06 Not allocated</a></li>
<li><a href="#03-08-07">03.08.07 Media use</a></li>
<li><a href="#03-08-08">03.08.08 Not allocated</a></li>
<li><a href="#03-08-09">03.08.09 System backup&nbsp;– cryptographic protection</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-08-01">03.08.01 Media storage</h4>
</summary><p>Physically control and securely store system media containing specified information.</p>

<h5>Discussion</h5>

<p>System media includes digital and non-digital media. Digital media includes diskettes, flash drives, magnetic tapes, external or removable solid state or magnetic drives, compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Physically controlling stored media includes conducting inventories, establishing procedures to allow individuals to check out and return media to libraries, and maintaining accountability for stored media. Secure storage includes a locked drawer, desk, or cabinet or a controlled media library. Controlled areas provide physical and procedural controls to meet the requirements established for protecting information and systems. Sanitization techniques (e.g., cryptographically erasing, destroying, clearing, and purging) prevent the disclosure of specified information to unauthorized individuals. The sanitization process removes specified information from media such that the information cannot be retrieved or reconstructed.</p>

<h5>References</h5>

<p>Source control: MP-04<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/111/final">NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices </a></li>
	<li><a href="/en/guidance/it-media-sanitization-itsp40006">Cyber Centre <abbr title="information technology">IT</abbr> media sanitization (ITSP.40.006) </a></li>
</ul></details><details><summary><h4 id="03-08-02">03.08.02 Media access</h4>
</summary><p>Restrict access to specified information on system media to authorized personnel or roles.</p>

<h5>Discussion</h5>

<p>System media includes digital and non-digital media. Access to specified information on system media can be restricted by physically controlling such media. This includes conducting inventories, ensuring that procedures are in place to allow individuals to check out and return media to the media library, and maintaining accountability for stored media. For digital media, access to specified information can be restricted by using cryptographic means. Encrypting data in storage or at rest is addressed in <a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a>.</p>

<h5>References</h5>

<p>Source control: MP-02<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/111/final">NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices</a></p>
</details><details><summary><h4 id="03-08-03">03.08.03 Media sanitization</h4>
</summary><p>Sanitize system media containing specified information prior to disposal, release out of organizational control, or release for reuse.</p>

<h5>Discussion</h5>

<p>Media sanitization applies to digital and non-digital media subject to disposal or reuse, whether or not the media are considered removable. Examples include digital media in scanners, copiers, printers, notebook computers, workstations, mobile devices, network components, and non-digital media. The sanitization process removes specified information from media such that the information cannot be retrieved or reconstructed. Sanitization techniques (e.g., cryptographically erasing, clearing, purging, and destroying) prevent the disclosure of specified information to unauthorized individuals when such media is reused or released for disposal. Cyber Centre and <abbr title="Royal Canadian Mounted Police">RCMP</abbr> endorsed standards control the sanitization process for media containing specified information and may require destruction when other methods cannot be applied to the media.</p>

<h5>References</h5>

<p>Source control: MP-06<br />
Supporting publications:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/it-media-sanitization-itsp40006">Cyber Centre <abbr title="information technology">IT</abbr> media sanitization (ITSP.40.006) </a></li>
	<li><a href="https://www.rcmp-grc.gc.ca/physec-secmat/res-lim/pubs/seg/html/home_e.htm"><abbr title="Royal Canadian Mounted Police">RCMP</abbr> G1-001 Security Equipment Guide (restricted to <abbr title="Government of Canada">GC</abbr>)</a></li>
</ul></details><details><summary><h4 id="03-08-04">03.08.04 Media marking</h4>
</summary><p>Mark system media containing specified information to indicate distribution limitations, handling caveats, and applicable specified information markings.</p>

<h5>Discussion</h5>

<p>System media includes digital and non-digital media. Marking refers to the use or application of human-readable security attributes. Labeling refers to the use of security attributes for internal system data structures. Digital media includes diskettes, magnetic tapes, external or removable solid state or magnetic drives, flash drives, compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Specified information includes any information, other than classified, that a <abbr title="Government of Canada">GC</abbr> authority identifies and qualifies in a contract as requiring safeguarding.</p>

<h5>References</h5>

<p>Source control: MP-03<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-08-05">03.08.05 Media transport</h4>
</summary><ol class="lst-upr-alph"><li>Protect and control system media that contain specified information during transport outside of controlled areas</li>
	<li>Maintain accountability of system media that contain specified information during transport outside of controlled areas.</li>
	<li>Document activities associated with the transport of system media that contain specified information</li>
</ol><h5>Discussion</h5>

<p>System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable solid state or magnetic drives, compact discs, and digital versatile discs. Non-digital media includes microfilm and paper. Controlled areas are spaces for which organizations provide physical or procedural measures to meet the requirements established for protecting specified information and systems. Media protection during transport can include cryptography and/or locked containers. Activities associated with media transport include releasing media for transport, ensuring that media enter the appropriate transport processes, and the actual transport. Authorized transport and courier personnel may include individuals external to the organization. Maintaining accountability of media during transport includes restricting transport activities to authorized personnel and tracking or obtaining records of transport activities as the media move through the transportation system to prevent and detect loss, destruction, or tampering. This requirement is related to <a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a> and <a href="#03-13-11">Cryptographic protection 03.13.11</a>.</p>

<h5>References</h5>

<p>Source controls: MP-05, SC-28<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/111/final">NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices</a></p>
</details><h4 id="03-08-06">03.08.06 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-08-07">03.08.07 Media use</h4>
</summary><ol class="lst-upr-alph"><li>Restrict or prohibit the use of [Assignment: organization-defined types of system media]</li>
	<li>Prohibit the use of removable system media without an identifiable owner</li>
</ol><h5>Discussion</h5>

<p>In contrast to requirement <a href="#03-08-01">Media storage 03.08.01</a>, which restricts user access to media, this requirement restricts or prohibits the use of certain types of media, such as external hard drives, flash drives, or smart displays. Organizations can use technical and non-technical measures (e.g., policies, procedures, and rules of behaviour) to control the use of system media. For example, organizations may control the use of portable storage devices by using physical cages on workstations to prohibit access to external ports or disabling or removing the ability to insert, read, or write to devices.</p>

<p>Organizations may limit the use of portable storage devices to only approved devices, including devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Organizations may also control the use of portable storage devices based on the type of device — prohibiting the use of writeable, portable devices — and implement this restriction by disabling or removing the capability to write to such devices. Limits on the use of organization-controlled system media in external systems include restrictions on how the media may be used and under what conditions. Requiring identifiable owners (e.g., individuals, organizations, or projects) for removable system media reduces the risk of using such technologies by allowing organizations to assign responsibility and accountability for addressing known vulnerabilities in the media (e.g., insertion of malicious code).</p>

<h5>References</h5>

<p>Source control: MP-07<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/111/final">NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices</a></p>
</details><h4 id="03-08-08">03.08.08 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-08-09">03.08.09 System backup – cryptographic protection</h4>
</summary><ol class="lst-upr-alph"><li>Protect the confidentiality of backup information</li>
	<li>Implement cryptographic mechanisms to prevent the unauthorized disclosure of specified information at backup storage locations</li>
</ol><h5>Discussion</h5>

<p>The selection of cryptographic mechanisms is based on the need to protect the confidentiality of backup information. Hardware security module (HSM) devices safeguard and manage cryptographic keys and provide cryptographic processing. Cryptographic operations (e.g., encryption, decryption, and signature generation and verification) are typically hosted on the <abbr title="hardware security module">HSM</abbr> device, and many implementations provide hardware-accelerated mechanisms for cryptographic operations. This requirement is related to <a href="#03-13-11">Cryptographic protection 03.13.11</a>.</p>

<h5>References</h5>

<p>Source controls: CP-09, CP-09(08)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/34/r1/upd1/final">NIST SP 800-34 Contingency Planning Guide for Federal Information Systems</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/130/final">NIST SP 800-130 A Framework for Designing Cryptographic Key Management Systems</a></li>
</ul></details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-9">3.9 Personnel security</h3>

<p>The Personnel security controls support the procedures required to ensure that all personnel who have access to systems have the necessary authorizations as well as appropriate security screening levels. They ensure that organizational information and systems are protected during and after personnel actions such as terminations and transfers.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-09-01">03.09.01 Personnel screening</a></li>
<li><a href="#03-09-02">03.09.02 Personnel termination and transfer</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-09-01">03.09.01 Personnel screening</h4>
</summary><ol class="lst-upr-alph"><li>Screen individuals prior to authorizing access to the system</li>
	<li>Rescreen individuals in accordance with [Assignment: organization-defined conditions requiring rescreening]</li>
</ol><h5>Discussion</h5>

<p>Personnel security screening activities involve the assessment of the conduct, integrity, judgment, loyalty, reliability, and stability of an individual (i.e., the individual’s trustworthiness) prior to authorizing access to the system or when elevating system access. The screening and rescreening activities reflect applicable federal laws, Orders in Council, directives, policies, regulations, and criteria established for the level of access required for the assigned positions.</p>

<h5>References</h5>

<p>Source control: PS-03<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/181/r1/final">NIST SP 800-181 Workforce Framework for Cybersecurity (NICE Framework) </a></li>
	<li><a href="https://www.tpsgc-pwgsc.gc.ca/esc-src/msc-csm/index-eng.html">PSPC Contract Security Manual </a></li>
</ul></details><details><summary><h4 id="03-09-02">03.09.02 Personnel termination and transfer</h4>
</summary><ol class="lst-upr-alph"><li>When individual employment is terminated:
	<ol><li>disable system access within [Assignment: organization-defined time period]</li>
		<li>terminate or revoke authenticators and credentials associated with the individual</li>
		<li>retrieve security-related system property</li>
	</ol></li>
	<li>When individuals are reassigned or transferred to other positions in the organization:
	<ol><li>review and confirm the ongoing operational need for current logical and physical access authorizations to the system and facility</li>
		<li>modify access authorization to correspond with any changes in operational need</li>
	</ol></li>
</ol><h5>Discussion</h5>

<p>Security-related system property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that accountability is achieved for the organizational property. Security topics at exit interviews include reminding individuals of potential limitations on future employment and nondisclosure agreements. Exit interviews may not always be possible for some individuals, including in cases related to the unavailability of supervisors, illnesses, or job abandonment.</p>

<p>The timely execution of termination actions is essential for individuals who have been terminated for cause. Organizations may consider disabling the accounts of individuals who are being terminated prior to the individuals being notified. This requirement applies to the reassignment or transfer of individuals when the personnel action is permanent or of such extended duration as to require protection. Protections that may be required for transfers or reassignments to other positions within organizations include returning old and issuing new identification cards, keys, and building passes; changing system access authorizations (i.e., privileges); closing system accounts and establishing new accounts; and providing access to official records to which individuals had access at previous work locations in previous system accounts.</p>

<h5>References</h5>

<p>Source controls: PS-04, PS-05<br />
Supporting publications: None</p>
</details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-10">3.10 Physical protection</h3>

<p>The Physical protection controls support the control of physical access to systems, equipment, and the respective operating environments to authorized individuals. They facilitate the protection of the physical plant and support infrastructure for systems, the protection of systems against environmental hazards, and provide appropriate environmental controls in facilities containing systems.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-10-01">03.10.01 Physical access authorizations</a></li>
<li><a href="#03-10-02">03.10.02 Monitoring physical access</a></li>
<li><a href="#03-10-03">03.10.03 Not allocated</a></li>
<li><a href="#03-10-04">03.10.04 Not allocated</a></li>
<li><a href="#03-10-05">03.10.05 Not allocated</a></li>
<li><a href="#03-10-06">03.10.06 Alternate work site</a></li>
<li><a href="#03-10-07">03.10.07 Physical access control</a></li>
<li><a href="#03-10-08">03.10.08 Access control for transmission</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-10-01">03.10.01 Physical access authorizations</h4>
</summary><ol class="lst-upr-alph"><li>Develop, approve, and maintain a list of individuals with authorized access to the physical location where the system resides</li>
	<li>Issue authorization credentials for physical access</li>
	<li>Review the physical access list [Assignment: organization-defined frequency]</li>
	<li>Remove individuals from the physical access list when access is no longer required</li>
</ol><h5>Discussion</h5>

<p>A facility can include one or more physical locations containing systems or system components that process, store, or transmit specified information. Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include identification badges, identification cards, and smart cards. Organizations determine the strength of the authorization credentials consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines. Physical access authorizations may not be necessary to access certain areas within facilities that are designated as publicly accessible.</p>

<h5>References</h5>

<p>Source control: PE-02<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-10-02">03.10.02 Monitoring physical access</h4>
</summary><ol class="lst-upr-alph"><li>Monitor physical access to the facility where the system resides to detect and respond to physical security incidents</li>
	<li>Review physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment: organization-defined events or potential indications of events]</li>
</ol><h5>Discussion</h5>

<p>A facility can include one or more physical locations containing systems or system components that process, store, or transmit specified information. Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include guards, video surveillance equipment (i.e., cameras), and sensor devices. Reviewing physical access logs can help identify suspicious activity, anomalous events, or potential threats. The reviews can be supported by audit logging controls if the access logs are part of an automated system. Incident response capabilities include investigations of physical security incidents and responses to those incidents. Incidents include security violations or suspicious physical access activities, such as access outside of normal work hours, repeated access to areas not normally accessed, access for unusual lengths of time, and out-of-sequence access.</p>

<h5>References</h5>

<p>Source control: PE-06<br />
Supporting publications: None</p>
</details><h4 id="03-10-03">03.10.03 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-10-04">03.10.04 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-10-05">03.10.05 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-10-06">03.10.06 Alternate work site</h4>
</summary><ol class="lst-upr-alph"><li>Determine alternate work sites allowed for use by employees</li>
	<li>Employ the following security requirements at alternate work sites: [Assignment: organization-defined security requirements]</li>
</ol><h5>Discussion</h5>

<p>Alternate work sites include the private residences of employees or other facilities designated by the organization. Alternate work sites can provide readily available alternate locations during contingency operations. Organizations can define different security requirements for specific alternate work sites or types of sites, depending on the work-related activities conducted at the sites. Assessing the effectiveness of the requirements and providing a means to communicate incidents at alternate work sites supports the contingency planning activities of organizations.</p>

<h5>References</h5>

<p>Source control: PE-17<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/end-user-device-security-bring-your-own-device-byod-deployment-models-itsm70003">Cyber Centre End user device security for Bring-Your-Own-Device (BYOD) deployment models (ITSM.70.003) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/46/r2/final">NIST SP 800-46 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/114/r1/final">NIST SP 800-114 User’s Guide to Telework and Bring Your Own Device (BYOD) Security</a></li>
</ul></details><details><summary><h4 id="03-10-07">03.10.07 Physical access control</h4>
</summary><ol class="lst-upr-alph"><li>Enforce physical access authorizations at entry and exit points to the facility where the system resides by:
	<ol><li>verifying individual physical access authorizations before granting access to the facility</li>
		<li>controlling ingress and egress with physical access control systems, devices or guards</li>
	</ol></li>
	<li>Maintain physical access audit logs for entry or exit points</li>
	<li>Escort visitors and control visitor activity</li>
	<li>Secure keys, combinations, and other physical access devices</li>
	<li>Control physical access to output devices to prevent unauthorized individuals from obtaining access to specified information</li>
</ol><h5>Discussion</h5>

<p>This requirement addresses physical locations containing systems or system components that process, store, or transmit specified information. Organizations determine the types of guards needed, including professional security staff or administrative staff. Physical access devices include keys, locks, combinations, biometric readers, and card readers. Physical access control systems comply with applicable laws, Orders in Council, directives, policies, regulations, standards, and guidelines. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural, automated, or some combination thereof. Physical access points can include exterior access points, interior access points to systems that require supplemental access controls, or both. Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors.</p>

<p>Controlling physical access to output devices includes placing output devices in locked rooms or other secured areas with keypad or card reader access controls and only allowing access to authorized individuals, placing output devices in locations that can be monitored by personnel, installing monitor or screen filters, and using headphones. Examples of output devices include monitors, printers, scanners, facsimile machines, audio devices, and copiers.</p>

<h5>References</h5>

<p>Source controls: PE-03, PE-05<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-10-08">03.10.08 Access control for transmission</h4>
</summary><p>Control physical access to system distribution and transmission lines in organizational facilities.</p>

<h5>Discussion</h5>

<p>Safeguarding measures applied to system distribution and transmission lines prevent accidental damage, disruption, and physical tampering. Such measures may also be necessary to prevent eavesdropping or the modification of unencrypted transmissions. Safeguarding measures used to control physical access to system distribution and transmission lines include disconnected or locked spare jacks, locked wiring closets, protecting cabling with conduit or cable trays, and wiretapping sensors.</p>

<h5>References</h5>

<p>Source control: PE-04<br />
Supporting publications: None</p>
</details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-11">3.11 Risk assessment</h3>

<p>The Risk assessment controls deal with the periodic conduct of risk assessments, including privacy impact assessments, resulting from the operation of organizational systems and associated handling, storage, or transmission of data and information.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-11-01">03.11.01 Risk assessment</a></li>
<li><a href="#03-11-02">03.11.02 Vulnerability monitoring and scanning</a></li>
<li><a href="#03-11-03">03.11.03 Not allocated</a></li>
<li><a href="#03-11-04">03.11.04 Risk response</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-11-01">03.11.01 Risk assessment</h4>
</summary><ol class="lst-upr-alph"><li>Assess the risk (including supply chain risk) of unauthorized disclosure resulting from the handling, processing, storage, or transmission of specified information</li>
	<li>Update risk assessments [Assignment: organization-defined frequency]</li>
</ol><h5>Discussion</h5>

<p>Establishing the system boundary is a prerequisite to assessing the risk of unauthorized disclosure of specified information. Risk assessments consider threats, vulnerabilities, likelihood, and adverse impacts to organizational operations and assets based on the operation and use of the system and the unauthorized disclosure of specified information. Risk assessments also consider risks from external parties (e.g., contractors operating systems on behalf of the organization, service providers, individuals accessing systems, and outsourcing entities). Risk assessments can be conducted at the organization level, the mission or business process level, or the system level and at any phase in the system development life cycle. Risk assessments include supply chain-related risks associated with suppliers or contractors and the system, system component, or system service that they provide.</p>

<h5>References</h5>

<p>Source controls: RA-03, RA-03(01), SR-06<br />
Supporting publications:</p>

<ul><li><a href="/en/tools-services/harmonized-tra-methodology">CSE-<abbr title="Royal Canadian Mounted Police">RCMP</abbr> Harmonized Threat and Risk Assessment Methodology (TRA-1)</a></li>
	<li><a href="/en/guidance/cyber-supply-chain-approach-assessing-risk-itsap10070">Cyber Centre Cyber supply chain: An approach to assessing risk (ITSAP.10.070)</a></li>
	<li><a href="/en/guidance/supply-chain-security-small-and-medium-sized-organizations-itsap00070">Cyber Centre Supply chain security for small and medium-sized organizations (ITSAP.00.070)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/30/r1/final">NIST SP 800-30 Guide for Conducting Risk Assessments</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/161/r1/final">NIST SP 800-161 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations</a></li>
</ul></details><details><summary><h4 id="03-11-02">03.11.02 Vulnerability monitoring and scanning</h4>
</summary><ol class="lst-upr-alph"><li>Monitor and scan for vulnerabilities in the system [Assignment: organization-defined frequency] and when new vulnerabilities affecting the system are identified</li>
	<li>Remediate system vulnerabilities within [Assignment: organization-defined response times]</li>
	<li>Update system vulnerabilities to be scanned [Assignment: organization-defined frequency] and when new vulnerabilities are identified and reported</li>
</ol><h5>Discussion</h5>

<p>Organizations determine the required vulnerability scanning for system components and ensure that potential sources of vulnerabilities (e.g., networked printers, scanners, and copiers) are not overlooked. Vulnerability analyses for custom software may require additional approaches, such as static analysis, dynamic analysis, or binary analysis. Organizations can use these approaches in source code reviews and tools (e.g., static analysis tools, web-based application scanners, binary analyzers). Vulnerability scanning includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for improperly configured or incorrectly operating flow control mechanisms.</p>

<p>To facilitate interoperability, organizations consider using scanning tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention. Sources for vulnerability information also include the Common Weakness Enumeration (CWE) listing, the National Vulnerability Database (NVD), and the Common Vulnerability Scoring System (CVSS).</p>

<h5>References</h5>

<p>Source controls: RA-05, RA-05(02)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/40/r4/final">NIST SP 800-40 Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/53/a/r5/final">NIST SP 800-53A Assessing Security and Privacy Controls in Information Systems and Organizations</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/70/r4/final">NIST SP 800-70 National Checklist Program for <abbr title="information technology">IT</abbr> Products: Guidelines for Checklist Users and Developers</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/115/final">NIST SP 800-115 Technical Guide to Information Security Testing and Assessment</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/126/r3/final">NIST SP 800-126 The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3</a></li>
	<li><a href="/en/guidance/top-10-it-security-action-items-no2-patch-operating-systems-and-applications-itsm10096">Cyber Centre Top 10 <abbr title="information technology">IT</abbr> security actions: No.2 patch operating systems and applications (ITSM.10.096)</a></li>
</ul></details><h4 id="03-11-03">03.11.03 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-11-04">03.11.04 Risk response</h4>
</summary><p>Respond to findings from security assessments, monitoring, and audits.</p>

<h5>Discussion</h5>

<p>This requirement addresses the need to determine an appropriate response to risk before generating a plan of action and milestones (POAM) entry. It may be possible to mitigate the risk immediately so that a <abbr title="plan of action and milestones">POAM</abbr> entry is not needed. However, a <abbr title="plan of action and milestones">POAM</abbr> entry is generated if the risk response is to mitigate the identified risk and the mitigation cannot be completed immediately.</p>

<h5>References</h5>

<p>Source control: RA-07<br />
Supporting publications:</p>

<ul><li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li>Cyber Centre System lifecycle cyber security and privacy risk management activities (ITSP.10.037)</li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final">NIST SP 800-160-1 Engineering Trustworthy Secure Systems </a></li>
</ul></details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-12">3.12 Security assessment and monitoring</h3>

<p>The Security assessment and monitoring controls deal with the security assessment and monitoring of the system.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-12-01">03.12.01 Security assessment</a></li>
<li><a href="#03-12-02">03.12.02 Plan of action and milestones</a></li>
<li><a href="#03-12-03">03.12.03 Continuous monitoring</a></li>
<li><a href="#03-12-04">03.12.04 Not allocated</a></li>
<li><a href="#03-12-05">03.12.05 Information exchange</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-12-01">03.12.01 Security assessment</h4>
</summary><p>Assess the security and privacy requirements for the system and its environment of operation [Assignment: organization-defined frequency] to determine if the requirements have been satisfied.</p>

<h5>Discussion</h5>

<p>By assessing the security and privacy requirements, organizations determine whether the necessary safeguards and countermeasures are implemented correctly, operating as intended, and producing the desired outcome. Security assessments identify weaknesses and deficiencies in the system and provide the essential information needed to make risk-based decisions. Security and privacy assessment reports document assessment results in sufficient detail as deemed necessary by the organization to determine the accuracy and completeness of the reports. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted.</p>

<h5>References</h5>

<p>Source control: CA-02<br />
Supporting publications:</p>

<ul><li>Cyber Centre Security and privacy controls and assurance activities catalogue (ITSP.10.033)</li>
	<li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li>Cyber Centre System lifecycle cyber security and privacy risk management activities (ITSP.10.037)</li>
	<li><a href="https://www.cyber.gc.ca/en/tools-services/harmonized-tra-methodology">CSE-<abbr title="Royal Canadian Mounted Police">RCMP</abbr> Harmonized Threat and Risk Assessment Methodology (TRA-1)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/115/final">NIST SP 800-115 Technical Guide to Information Security Testing and Assessment</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/53/a/r5/final">NIST SP 800-53A Assessing Security and Privacy Controls in Information Systems and Organizations</a></li>
</ul></details><details><summary><h4 id="03-12-02">03.12.02 Plan of action and milestones</h4>
</summary><ol class="lst-upr-alph"><li>Develop a plan of action and milestones (POAMs) for the system to:
	<ol><li>document the planned remediation actions to correct weaknesses or deficiencies noted during security assessments</li>
		<li>reduce or eliminate known system vulnerabilities</li>
	</ol></li>
	<li>Update the existing <abbr title="plan of action and milestones">POAM</abbr>s based on the findings from:
	<ol><li>security assessments</li>
		<li>audits or reviews</li>
		<li>continuous monitoring activities</li>
	</ol></li>
</ol><h5>Discussion</h5>

<p><abbr title="plan of action and milestones">POAM</abbr>s are important documents in organizational security and privacy programs. Organizations use <abbr title="plan of action and milestones">POAM</abbr>s to describe how unsatisfied security requirements will be met and how planned mitigations will be implemented. Organizations can document system security plans and <abbr title="plan of action and milestones">POAM</abbr>s as separate or combined documents and in any format.</p>

<h5>References</h5>

<p>Source control: CA-05<br />
Supporting publications: Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</p>
</details><details><summary><h4 id="03-12-03">03.12.03 Continuous monitoring</h4>
</summary><p>Develop and implement a system-level continuous monitoring strategy that includes ongoing monitoring and security assessments.</p>

<h5>Discussion</h5>

<p>Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support risk management decisions. The terms "continuous" and "ongoing" imply that organizations assess and monitor their systems at a frequency that is sufficient to support risk-based decisions. Different types of security and privacy requirements may require different monitoring frequencies.</p>

<h5>References</h5>

<p>Source control: CA-07<br />
Supporting publications:</p>

<ul><li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/115/final">NIST SP 800-115 Technical Guide to Information Security Testing and Assessment</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/137/final">NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/53/a/r5/final">NIST SP 800-53A Assessing Security and Privacy Controls in Information Systems and Organizations</a></li>
</ul></details><h4 id="03-12-04">03.12.04 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-12-05">03.12.05 Information exchange</h4>
</summary><ol class="lst-upr-alph"><li>Approve and manage the exchange of specified information between the system and other systems using [Selection (one or more): interconnection security agreements; information exchange security agreements; memoranda of understanding or agreement; information sharing arrangements; service level agreements; user agreements; nondisclosure agreements]</li>
	<li>Document, as part of the exchange agreements, interface characteristics, security and privacy requirements, and responsibilities for each system</li>
	<li>Review and update the exchange agreements [Assignment: organization-defined frequency]</li>
</ol><h5>Discussion</h5>

<p>Information exchange applies to information exchanges between two or more systems, both internal and external to the organization. Organizations consider the risks related to new or increased threats that may be introduced when systems exchange information with other systems that may have different security requirements or policies. The types of agreements selected are based on factors such as the relationship between the organizations exchanging information (e.g., government to government, government to business, business to business, government or business to service provider, government or business to individual) and the level of access to the organizational system by users of the other system. The types of agreements can include information exchange security agreements, interconnection security agreements, memoranda of understanding or agreement, information sharing arrangements, service-level agreements, or other types of agreements.</p>

<p>Organizations may incorporate agreement information into formal contracts, especially for information exchanges established between federal departments and agencies and non-federal organizations (e.g., service providers, contractors, system developers, and system integrators). The types of information contained in exchange agreements include the interface characteristics, security and privacy requirements, controls, and responsibilities for each system.</p>

<h5>References</h5>

<p>Source control: CA-03<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/baseline-security-requirements-network-security-zones-version-20-itsp80022">Cyber Centre Baseline Security Requirements for Network Security Zones (ITSP.80.022) </a></li>
	<li><a href="/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38">Cyber Centre Network security zoning – Design considerations for placement of services within zones (ITSG-38) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/47/r1/final">NIST SP 800-47 Managing the Security of Information Exchanges </a></li>
</ul></details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-13">3.13 System and communications protection</h3>

<p>The System and communications protection controls support the monitoring, control and protection of the systems themselves and of the communications between and within the systems.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-13-01">03.13.01 Boundary protection</a></li>
<li><a href="#03-13-02">03.13.02 Not allocated</a></li>
<li><a href="#03-13-03">03.13.03 Not allocated</a></li>
<li><a href="#03-13-04">03.13.04 Information in shared system resources</a></li>
<li><a href="#03-13-05">03.13.05 Not allocated</a></li>
<li><a href="#03-13-06">03.13.06 Network communications&nbsp;– deny by default&nbsp;– allow by exception</a></li>
<li><a href="#03-13-07">03.13.07 Not allocated</a></li>
<li><a href="#03-13-08">03.13.08 Transmission and storage confidentiality</a></li>
<li><a href="#03-13-09">03.13.09 Network disconnect</a></li>
<li><a href="#03-13-10">03.13.10 Cryptographic key establishment and management</a></li>
<li><a href="#03-13-11">03.13.11 Cryptographic protection</a></li>
<li><a href="#03-13-12">03.13.12 Collaborative computing devices and applications</a></li>
<li><a href="#03-13-13">03.13.13 Mobile code</a></li>
<li><a href="#03-13-14">03.13.14 Not allocated</a></li>
<li><a href="#03-13-15">03.13.15 Session authenticity</a></li>
<li><a href="#03-13-16">03.13.16 Not allocated</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-13-01">03.13.01 Boundary protection</h4>
</summary><ol class="lst-upr-alph"><li>Monitor and control communications at the external managed interfaces to the system and key internal managed interfaces within the system</li>
	<li>Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks</li>
	<li>Connect to external systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture</li>
</ol><h5>Discussion</h5>

<p>Managed interfaces include gateways, routers, firewalls, network-based malicious code analysis, virtualization systems, and encrypted tunnels implemented within a security architecture. Subnetworks that are either physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting both internal and external address spoofing for protocols crossing the boundary.</p>

<h5>References</h5>

<p>Source control: SC-07<br />
Supporting publications:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-version-20-itsp80022">Cyber Centre Baseline Security Requirements for Network Security Zones (ITSP.80.022)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/network-security-zoning-design-considerations-placement-services-within-zones-itsg-38">Cyber Centre Network security zoning – Design considerations for placement of services within zones (ITSG-38)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062">Cyber Centre Guidance on Securely Configuring Network Protocols (ITSP.40.062)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/189/final">NIST SP 800-189 Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/41/r1/final">NIST SP 800-41 Guidelines on Firewalls and Firewall Policy</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final">NIST SP 800-160-1 Engineering Trustworthy Secure Systems</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/125/b/final">NIST SP 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/207/final">NIST SP 800-207 Zero Trust Architecture</a></li>
</ul></details><h4 id="03-13-02">03.13.02 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-13-03">03.13.03 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-13-04">03.13.04 Information in shared system resources</h4>
</summary><p>Prevent unauthorized and unintended information transfer via shared system resources.</p>

<h5>Discussion</h5>

<p>Preventing unauthorized and unintended information transfer via shared system resources stops information produced by the actions of prior users or roles (or actions of processes acting on behalf of prior users or roles) from being available to current users or roles (or current processes acting on behalf of current users or roles) that obtain access to shared system resources after those resources have been released back to the system. Information in shared system resources also applies to encrypted representations of information. In other contexts, the control of information in shared system resources is referred to as object reuse and residual information protection. Information in shared system resources does not address information remanence, which refers to the residual representation of data that has been nominally deleted, covert channels (including storage and timing channels) in which shared system resources are manipulated to violate information flow restrictions, or components within systems for which there are only single users or roles.</p>

<h5>References</h5>

<p>Source control: SC-04<br />
Supporting publications: None</p>
</details><h4 id="03-13-05">03.13.05 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-13-06">03.13.06 Network communications – deny by default – allow by exception</h4>
</summary><p>Deny network communications traffic by default and allow network communications traffic by exception.</p>

<h5>Discussion</h5>

<p>This requirement applies to inbound and outbound network communications traffic at the system boundary and at identified points within the system. A deny-all, allow-by-exception network communications traffic policy ensures that only essential and approved connections are allowed.</p>

<h5>References</h5>

<p>Source control: SC-07(05)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/41/r1/final">NIST SP 800-41 Guidelines on Firewalls and Firewall Policy</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/77/r1/final">NIST SP 800-77 Guide to IPsec <abbr title="virtual private network">VPN</abbr>s</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/189/final">NIST SP 800-189 Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation</a></li>
</ul></details><h4 id="03-13-07">03.13.07 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-13-08">03.13.08 Transmission and storage confidentiality</h4>
</summary><p>Implement cryptographic mechanisms to prevent the unauthorized disclosure of specified information during transmission and while in storage.</p>

<h5>Discussion</h5>

<p>This requirement applies to internal and external networks and any system components that can transmit specified information, including servers, notebook computers, desktop computers, mobile devices, printers, copiers, scanners, facsimile machines, and radios. Unprotected communication paths are susceptible to interception and modification. Encryption protects specified information from unauthorized disclosure during transmission and while in storage. Cryptographic mechanisms that protect the confidentiality of specified information during transmission include <abbr title="Transport Layer Security">TLS</abbr> and IPsec. Information in storage (i.e., information at rest) refers to the state of specified information when it is not in process or in transit and resides on internal or external storage devices, storage area network devices, and databases. Protecting specified information in storage does not focus on the type of storage device or the frequency of access to that device but rather on the state of the information. This requirement relates to <a href="#03-13-11">Cryptographic protection 03.13.11</a>.</p>

<h5>References</h5>

<p>Source controls: SC-08, SC-08(01), SC-28, SC-28(01)<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111">Cyber Centre Cryptographic Algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B Information (ITSP.40.111)</a></li>
	<li><a href="/en/guidance/guidance-securely-configuring-network-protocols-itsp40062">Cyber Centre Guidance on Securely Configuring Network Protocols (ITSP.40.062)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/fips/140-3/final">NIST FIPS 140-3 Security Requirements for Cryptographic Modules</a></li>
	<li><a href="https://csrc.nist.gov/pubs/fips/197/final">NIST FIPS 197 Advanced Encryption Standard</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/46/r2/final">NIST SP 800-46 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/52/r2/final">NIST SP 800-52 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/56/a/r3/final">NIST SP 800-56A Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/56/b/r2/final">NIST SP 800-56B Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/56/c/r2/final">NIST SP 800-56C Recommendation for Key-Derivation Methods in Key-Establishment Schemes</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/57/pt1/r5/final">NIST SP 800-57-1 Recommendation for Key Management: Part 1 – General</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/57/pt2/r1/final">NIST SP 800-57-2 Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/57/pt3/r1/final">NIST SP 800-57-3 Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/77/r1/final">NIST SP 800-77 Guide to IPsec <abbr title="virtual private network">VPN</abbr>s</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/111/final">NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/113/final">NIST SP 800-113 Guide to SSL <abbr title="virtual private network">VPN</abbr>s</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/114/r1/final">NIST SP 800-114 User’s Guide to Telework and Bring Your Own Device (BYOD) Security</a></li>
	<li><a href="/en/guidance/end-user-device-security-bring-your-own-device-byod-deployment-models-itsm70003">Cyber Centre End user device security for Bring-Your-Own-Device (BYOD) deployment models (ITSM.70.003)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/121/r2/upd1/final">NIST SP 800-121 Guide to Bluetooth Security</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/124/r2/final">NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/177/r1/final">NIST SP 800-177 Trustworthy Email</a></li>
</ul></details><details><summary><h4 id="03-13-09">03.13.09 Network disconnect</h4>
</summary><p>Terminate network connections associated with communications sessions at the end of the sessions or after [Assignment: organization-defined time period] of inactivity.</p>

<h5>Discussion</h5>

<p>This requirement applies to internal and external networks. Terminating network connections associated with communications sessions includes deallocating <abbr title="Transmission Control Protocol/Internet Protocol">TCP/IP</abbr> addresses or port pairs at the operating system level or deallocating networking assignments at the application level if multiple application sessions are using a single network connection. Time periods of inactivity may be established by organizations and include time periods by type of network access or for specific network accesses.</p>

<h5>References</h5>

<p>Source control: SC-10<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-13-10">03.13.10 Cryptographic key establishment and management</h4>
</summary><p>Establish and manage cryptographic keys in the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].</p>

<h5>Discussion</h5>

<p>Cryptographic keys can be established and managed using either manual procedures or automated mechanisms supported by manual procedures. Organizations satisfy key establishment and management requirements in accordance with applicable federal laws, Orders in Council, policies, directives, regulations, and standards that specify appropriate options, levels, and parameters. This requirement is related to <a href="#03-13-11">Cryptographic protection 03.13.11</a>.</p>

<h5>References</h5>

<p>Source control: SC-12<br />
Supporting publications:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062">Cyber Centre Guidance on Securely Configuring Network Protocols (ITSP.40.062)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/fips/140-3/final">NIST FIPS 140-3 Security Requirements for Cryptographic Modules</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/56/a/r3/final">NIST SP 800-56A Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/56/b/r2/final">NIST SP 800-56B Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/56/c/r2/final">NIST SP 800-56C Recommendation for Key-Derivation Methods in Key-Establishment Schemes</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/57/pt1/r5/final">NIST SP 800-57-1 Recommendation for Key Management: Part 1 – General</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/57/pt2/r1/final">NIST SP 800-57-2 Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/57/pt3/r1/final">NIST SP 800-57-3 Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance</a></li>
</ul></details><details><summary><h4 id="03-13-11">03.13.11 Cryptographic protection</h4>
</summary><p>Implement the following types of cryptography when used to protect the confidentiality of specified information: [Assignment: organization-defined types of cryptography].</p>

<h5>Discussion</h5>

<p>Cryptography is implemented in accordance with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines. Federal information processing standard (FIPS)-validated cryptography is recommended for the protection of specified information.</p>

<h5>References</h5>

<p>Source control: SC-13<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/fips/140-3/final">NIST FIPS 140-3 Security Requirements for Cryptographic Modules</a></p>
</details><details><summary><h4 id="03-13-12">03.13.12 Collaborative computing devices and applications</h4>
</summary><ol class="lst-upr-alph"><li>Prohibit remote activation of collaborative computing devices and applications with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed]</li>
	<li>Provide an explicit indication of use to users physically present at the devices</li>
</ol><h5>Discussion</h5>

<p>Collaborative computing devices include white boards, microphones, and cameras. Notebook computers, smartphones, display monitors, and tablets containing cameras and microphones are considered part of collaborative computing devices when conferencing software is in use. Indication of use includes notifying users (e.g., a pop-up menu stating that recording is in progress, or that the microphone has been turned on) when collaborative computing devices are activated. Dedicated video conferencing systems, which typically rely on one of the participants calling or connecting to the other party to activate the video conference, are excluded. Solutions to prevent device usage include webcam covers and buttons to disable microphones.</p>

<h5>References</h5>

<p>Source control: SC-15<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-13-13">03.13.13 Mobile code</h4>
</summary><ol class="lst-upr-alph"><li>Define acceptable mobile code and mobile code technologies</li>
	<li>Authorize, monitor, and control the use of mobile code</li>
</ol><h5>Discussion</h5>

<p>Mobile code includes software programs or parts of programs that are obtained from remote systems, transmitted across a network, and executed on a local system without explicit installation or execution by the recipient. Decisions regarding the use of mobile code are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include Java applets, JavaScript, HTML5, VBScript, and WebGL. Usage restrictions and implementation guidelines apply to the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations and devices, including notebook computers, smart phones, and smart devices. Mobile code policies and procedures address the actions taken to prevent the development, acquisition, and use of unacceptable mobile code within the system, including requiring mobile code to be digitally signed by a trusted source.</p>

<h5>References</h5>

<p>Source control: SC-18<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/28/ver2/final">NIST SP 800-28 Guidelines on Active Content and Mobile Code</a></p>
</details><h4 id="03-13-14">03.13.14 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-13-15">03.13.15 Session authenticity</h4>
</summary><p>Protect the authenticity of communications sessions.</p>

<h5>Discussion</h5>

<p>Protecting session authenticity addresses communications protection at the session level, not at the packet level. Such protection establishes grounds for confidence at both ends of the communications sessions in the ongoing identities of other parties and the validity of the transmitted information. Authenticity protection includes protecting against adversary-in-the-middle attacks, session hijacking, and the insertion of false information into sessions.</p>

<h5>References</h5>

<p>Source control: SC-23<br />
Supporting publications:</p>

<ul><li><a href="/en/guidance/guidance-securely-configuring-network-protocols-itsp40062">Cyber Centre Guidance on Securely Configuring Network Protocols (ITSP.40.062)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/52/r2/final">NIST SP 800-52 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/77/r1/final">NIST SP 800-77 Guide to IPsec <abbr title="virtual private network">VPN</abbr>s</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/95/final">NIST SP 800-95 Guide to Secure Web Services</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/113/final">NIST SP 800-113 Guide to SSL <abbr title="virtual private network">VPN</abbr>s</a></li>
</ul><h4 id="03-13-16">03.13.16 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>
</details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-14">3.14 System and information integrity</h3>

<p>The System and information integrity controls support the protection of the integrity of the system components and the data that it processes. They allow an organization to identify, report and correct data and system flaws in a timely manner, to provide protection against malicious code, and to monitor system security alerts and advisories, and to take appropriate actions in response.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-14-01">03.14.01 Flaw remediation</a></li>
<li><a href="#03-14-02">03.14.02 Malicious code protection</a></li>
<li><a href="#03-14-03">03.14.03 Security alerts, advisories, and directives</a></li>
<li><a href="#03-14-04">03.14.04 Not allocated</a></li>
<li><a href="#03-14-05">03.14.05 Not allocated</a></li>
<li><a href="#03-14-06">03.14.06 System monitoring</a></li>
<li><a href="#03-14-07">03.14.07 Not allocated</a></li>
<li><a href="#03-14-08">03.14.08 Information management and retention</a></li>
<li><a href="#03-14-09">03.14.09 Dedicated administration workstation</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-14-01">03.14.01 Flaw remediation</h4>
</summary><ol class="lst-upr-alph"><li>Identify, report, and correct system flaws</li>
	<li>Install security-relevant software and firmware updates within [Assignment: organization-defined time period] of the release of the updates</li>
</ol><h5>Discussion</h5>

<p>Organizations identify systems that are affected by announced software and firmware flaws, including potential vulnerabilities that result from those flaws, and report this information to designated personnel with information security and privacy responsibilities. Security-relevant updates include patches, service packs, hot fixes, and anti-virus signatures. Organizations address the flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations can take advantage of available resources (e.g., <abbr title="Common Weakness Enumeration">CWE</abbr> or <abbr title="Common Vulnerabilities and Exposures">CVE</abbr> databases) when remediating system flaws. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors, including the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types.</p>

<h5>References</h5>

<p>Source control: SI-02<br />
Supporting publications:</p>

<ul><li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/40/r4/final">NIST SP 800-40 Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/128/upd1/final">NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems </a></li>
</ul></details><details><summary><h4 id="03-14-02">03.14.02 Malicious code protection</h4>
</summary><ol class="lst-upr-alph"><li>Implement malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code</li>
	<li>Update malicious code protection mechanisms as new releases are available in accordance with configuration management policies and procedures</li>
	<li>Configure malicious code protection mechanisms to:
	<ol><li>perform scans of the system [assignment: organization-defined frequency] and real-time scans of files from external sources at endpoints or system entry and exit points as the files are downloaded, opened, or executed</li>
		<li>block or quarantine malicious code, or take other mitigation actions in response to malicious code detection</li>
	</ol></li>
</ol><h5>Discussion</h5>

<p>Malicious code insertions occur through the exploitation of system vulnerabilities. Malicious code can be inserted into the system in a variety of ways, including email, the Internet, and portable storage devices. Malicious code includes viruses, worms, Trojan horses, and spyware. Malicious code can be encoded in various formats, contained in compressed or hidden files, or hidden in files using techniques such as steganography. Malicious code may be present in commercial off-the-shelf software and custom-built software and could include logic bombs, backdoors, and other types of attacks that could affect organizational mission and business functions. Periodic scans of the system and real-time scans of files from external sources as files are downloaded, opened, or executed can detect malicious code. Malicious code protection mechanisms can also monitor systems for anomalous or unexpected behaviours and take appropriate actions.</p>

<p>Malicious code protection mechanisms include signature- and non-signature-based technologies. Non-signature-based detection mechanisms include artificial intelligence (AI) techniques that use heuristics to detect, analyze, and describe the characteristics or behaviour of malicious code. They also provide controls against such code for which signatures do not yet exist or for which existing signatures may not be effective. Malicious code for which active signatures do not yet exist or may be ineffective includes polymorphic malicious code (i.e., code that changes signatures when it replicates). Non-signature-based mechanisms include reputation-based technologies. Pervasive configuration management, anti-exploitation software, and software integrity controls may also be effective in preventing unauthorized code execution.</p>

<p>If malicious code cannot be detected by detection methods or technologies, organizations can rely on secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that the software only performs intended functions. Organizations may determine that different actions are warranted in response to the detection of malicious code. For example, organizations can define actions to be taken in response to the detection of malicious code during scans, malicious downloads, or malicious activity when attempting to open or execute files.</p>

<h5>References</h5>

<p>Source control: SI-03<br />
Supporting publications:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/protect-your-organization-malware-itsap00057">Cyber Centre Protect your organization from malware (ITSAP.00.057)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/spotting-malicious-email-messages-itsap00100">Cyber Centre Spotting malicious email messages (ITSAP.00.100)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/83/r1/final">NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/125/b/final">NIST SP 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/177/r1/final">NIST SP 800-177 Trustworthy Email</a></li>
</ul></details><details><summary><h4 id="03-14-03">03.14.03 Security alerts, advisories, and directives</h4>
</summary><ol class="lst-upr-alph"><li>Receive system security alerts, advisories, and directives from external organizations on an ongoing basis</li>
	<li>Generate and disseminate internal system security alerts, advisories, and directives, as necessary</li>
</ol><h5>Discussion</h5>

<p>There are many publicly available sources of system security alerts and advisories. For example, the Canadian Centre for Cyber Security (Cyber Centre) generates security alerts and advisories to maintain situational awareness across the <abbr title="Government of Canada">GC</abbr> and in non-<abbr title="Government of Canada">GC</abbr> organizations. Software vendors, subscription services, and industry Information Sharing and Analysis Centres (ISACs) may also provide security alerts and advisories. Compliance with security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and Canada should the directives not be implemented in a timely manner.</p>

<h5>References</h5>

<p>Source control: SI-05<br />
Supporting publications: <a href="https://csrc.nist.gov/pubs/sp/800/161/r1/final">NIST SP 800-161 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations</a></p>
</details><h4 id="03-14-04">03.14.04 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<h4 id="03-14-05">03.14.05 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-14-06">03.14.06 System monitoring</h4>
</summary><ol class="lst-upr-alph"><li>Monitor the system to detect:
	<ol><li>attacks and indicators of potential attacks</li>
		<li>unauthorized connections</li>
	</ol></li>
	<li>Identify unauthorized use of the system</li>
	<li>Monitor inbound and outbound communications traffic to detect unusual or unauthorized activities or conditions</li>
</ol><h5>Discussion</h5>

<p>System monitoring involves external and internal monitoring. Internal monitoring includes the observation of events that occur within the system. External monitoring includes the observation of events that occur at the system boundary. Organizations can monitor the system by observing audit record activities in real time or by observing other system aspects, such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events.</p>

<p>A system monitoring capability is achieved through a variety of tools and techniques (e.g., audit record monitoring software, intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, network monitoring software). Strategic locations for monitoring devices include selected perimeter locations and near server farms that support critical applications with such devices being employed at managed system interfaces. The granularity of monitoring the information collected is based on organizational monitoring objectives and the capability of the system to support such objectives.</p>

<p>Systems connections can be network, remote, or local. A network connection is any connection with a device that communicates through a network (e.g., local area network, the Internet). A remote connection is any connection with a device that communicates through an external network (e.g., the Internet). Network, remote, and local connections can be either wired or wireless.</p>

<p>Unusual or unauthorized activities or conditions related to inbound and outbound communications traffic include internal traffic that indicates the presence of malicious code in the system or propagating among system components, the unauthorized export of information, or signaling to external systems. Evidence of malicious code is used to identify a potentially compromised system. System monitoring requirements, including the need for types of system monitoring, may be referenced in other requirements.</p>

<h5>References</h5>

<p>Source controls: SI-04, SI-04(04)<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/61/r2/final">NIST SP 800-61 Computer Security Incident Handling Guide</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/83/r1/final">NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/92/final">NIST SP 800-92 Guide to Computer Security Log Management</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/94/final">NIST SP 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/137/final">NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/177/r1/final">NIST SP 800-177 Trustworthy Email</a></li>
</ul></details><h4 id="03-14-07">03.14.07 Not allocated</h4>

<p>Withdrawn by <abbr title="National Institute of Standards and Technology">NIST</abbr>.</p>

<details><summary><h4 id="03-14-08">03.14.08 Information management and retention</h4>
</summary><p>Manage and retain specified information within the system and specified information output from the system in accordance with applicable laws, Orders in Council, directives, regulations, policies, standards, guidelines, and operational requirements.</p>

<h5>Discussion</h5>

<p>Federal departments and agencies consider data retention requirements for non-federal organizations. Retaining specified information on non-federal systems after contracts or agreements have concluded increases the attack surface for those systems and the risk of the information being compromised. The Library and Archives Canada provides federal policy and guidance on records retention and schedules.</p>

<h5>References</h5>

<p>Source control: SI-12<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-14-09">03.14.09 Dedicated administration workstation</h4>
</summary><ol class="lst-upr-alph"><li>Require any administrative or superuser actions to be performed from a physical workstation which is dedicated to those specific tasks and isolated from all other functions and networks, and especially from any form of internet access</li>
	<li>Remote connection of a <abbr title="dedicated administration workstation">DAW</abbr> to a target network is to use carrier private networks (e.g., virtual private LAN service (VPLS) or multiprotocol label switching (MPLS)) with <abbr title="virtual private network">VPN</abbr> encryption</li>
	<li>Use a dedicated and hardened single-purpose physical workstation or thin client as the <abbr title="dedicated administration workstation">DAW</abbr>, that is not shared between security realms</li>
</ol><h5>Discussion</h5>

<p>A dedicated administration workstation (DAW) is typically comprised of a user terminal with a very small selection of software designed for interfacing with the target system. For the purpose of this control, workstation means the system from which you are performing the administration, as opposed to the target system of administration. The <abbr title="dedicated administration workstation">DAW</abbr> must be hardened for the role, in order to minimize the likelihood that a superuser’s or administrator’s endpoint may be compromised by any threat actor (which would logically lead to the compromise of the target system). Typical office productivity tools are not required on the <abbr title="dedicated administration workstation">DAW</abbr>. All non-essential applications and services are removed. <abbr title="dedicated administration workstation">DAW</abbr>s are not domain-joined, cannot download patches from the internet, and cannot update documentation in networked applications.</p>

<p>Removing public Internet access from administrative workstations substantially reduces risk of compromise. Internet-exposed <abbr title="virtual private network">VPN</abbr> gateways are not preferred for remote administration, private carriers provide better protection, but still require <abbr title="virtual private network">VPN</abbr> encryption within that network. The <abbr title="dedicated administration workstation">DAW</abbr> must not become a means of moving laterally between security realms.</p>

<h5>References</h5>

<p>Source controls: SI-400, SI-400(02), SI-400(05)<br />
Supporting publications: None</p>
</details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-15">3.15 Planning</h3>

<p>The Planning controls and assurance activities deal with the development, documentation, update, and implementation of security and privacy plans for organizational systems. Those plans describe the security and privacy controls and assurance activities in place or planned for the systems, and the rules of behaviour for individuals accessing the systems.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-15-01">03.15.01 Policy and procedures</a></li>
<li><a href="#03-15-02">03.15.02 System security plan</a></li>
<li><a href="#03-15-03">03.15.03 Rules of behaviour</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-15-01">03.15.01 Policy and procedures</h4>
</summary><ol class="lst-upr-alph"><li>Develop, document, and disseminate to organizational personnel or roles, policies and procedures needed to satisfy the security requirements for the protection of specified information</li>
	<li>Review and update policies and procedures [Assignment: organization-defined frequency]</li>
</ol><h5>Discussion</h5>

<p>This requirement addresses policies and procedures for the protection of specified information. Policies and procedures contribute to security assurance and should address each family of the specified information security requirements. Policies can be included as part of the organizational security policy or be represented by separate policies that address each family of requirements. Procedures describe how policies are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security plans or in one or more separate documents.</p>

<h5>References</h5>

<p>Source controls: AC-01, AT-01, AU-01, CA-01, CM-01, IA-01, IR-01, MA-01, MP-01, PE-01, PL-01, PS-01, RA-01, SA-01, SC-01, SI-01, SR-01<br />
Supporting publications:</p>

<ul><li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/12/r1/final">NIST SP 800-12 An Introduction to Information Security</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/100/upd1/final">NIST SP 800-100 Information Security Handbook</a></li>
</ul></details><details><summary><h4 id="03-15-02">03.15.02 System security plan</h4>
</summary><ol class="lst-upr-alph"><li>Develop a system security and privacy plan that:
	<ol><li>defines the constituent system components</li>
		<li>identifies the information types processed, stored, and transmitted by the system</li>
		<li>describes specific threats to the system that are of concern to the organization</li>
		<li>describes the operational environment for the system and any dependencies on or connections to other systems or system components</li>
		<li>provides an overview of the security requirements for the system</li>
		<li>describes the safeguards in place or planned for meeting the security requirements</li>
		<li>identifies individuals that fulfill system roles and responsibilities</li>
		<li>includes other relevant information necessary for the protection of specified information</li>
	</ol></li>
	<li>Review and update the system security plan [Assignment: organization-defined frequency]</li>
	<li>Protect the system security plan from unauthorized disclosure</li>
</ol><h5>Discussion</h5>

<p>System security and privacy plans provide key characteristics of the system that is processing, storing, and transmitting specified information and how the system and information are protected. System security and privacy plans contain sufficient information to facilitate a design and implementation that are unambiguously compliant with the intent of the plans and the subsequent determinations of risk if the plan is implemented as intended. System security and privacy plans can be a collection of documents, including documents that already exist. Effective system security plans make use of references to policies, procedures, and additional documents (e.g., design specifications) where detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security information in other established management or operational areas related to enterprise architecture, the system development life cycle, systems engineering, and acquisition.</p>

<h5>References</h5>

<p>Source control: PL-02<br />
Supporting publications:</p>

<ul><li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/18/r1/final">NIST SP 800-18 Guide for Developing Security Plans for Federal Information Systems</a></li>
</ul></details><details><summary><h4 id="03-15-03">03.15.03 Rules of behaviour</h4>
</summary><ol class="lst-upr-alph"><li>Establish, rules that describe the responsibilities and expected behaviour for system usage and protecting specified information</li>
	<li>Provide rules to individuals who require access to the system</li>
	<li>Receive a documented acknowledgement from individuals indicating that they have read, understand, and agree to abide by the rules of behaviour before authorizing access to specified information and the system</li>
	<li>Review and update the rules of behaviour [Assignment: organization-defined frequency]</li>
</ol><h5>Discussion</h5>

<p>Rules of behaviour represent a type of access agreement for system users. Organizations consider rules of behaviour for the handling of specified information based on individual user roles and responsibilities and differentiate between rules that apply to privileged users and rules that apply to general users.</p>

<h5>References</h5>

<p>Source control: PL-04<br />
Supporting publications:</p>

<ul><li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/18/r1/final">NIST SP 800-18 Guide for Developing Security Plans for Federal Information Systems</a></li>
</ul></details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-16">3.16 System and services acquisition</h3>

<p>The System and services acquisition controls deal with the contracting of products and services required to support the implementation and operation of organizational systems. They ensure that sufficient resources are allocated for the protection of organizational systems, and they support system development lifecycle processes that incorporate security considerations.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-16-01">03.16.01 Security engineering principles</a></li>
<li><a href="#03-16-02">03.16.02 Unsupported system components</a></li>
<li><a href="#03-16-03">03.16.03 External system services</a></li>
				</ul>
</section>-->

<details><summary><h4 id="03-16-01">03.16.01 Security engineering principles</h4>
</summary><p>Apply the following systems security engineering principles to the development or modification of the system and system components: [Assignment: organization-defined systems security engineering principles].</p>

<h5>Discussion</h5>

<p>Organizations apply systems security engineering principles to new development systems. For legacy systems, organizations apply systems security engineering principles to system modifications to the extent feasible, given the current state of hardware, software, and firmware components. The application of systems security engineering principles helps to develop trustworthy, secure, and resilient systems and reduce the susceptibility of organizations to disruptions, hazards, and threats. Examples include developing layered protections; establishing security policies, architectures, and controls as the foundation for system design; incorporating security requirements into the system development life cycle; delineating physical and logical security boundaries; ensuring that developers are trained on how to build trustworthy secure software; and performing threat modeling to identify use cases, threat agents, attack vectors and patterns, design patterns, and compensating controls needed to mitigate risk. Organizations that apply security engineering principles can facilitate the development of trustworthy, secure systems, system components, and system services; reduce risks to acceptable levels; and make informed risk-management decisions.</p>

<h5>References</h5>

<p>Source control: SA-08<br />
Supporting publications:</p>

<ul><li>Cyber Centre System lifecycle cyber security and privacy risk management activities (ITSP.10.037)</li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final">NIST SP 800-160-1 Engineering Trustworthy Secure Systems</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final">NIST SP 800-160-2 Developing Cyber-Resilient Systems: A Systems Security Engineering Approach</a></li>
</ul></details><details><summary><h4 id="03-16-02">03.16.02 Unsupported system components</h4>
</summary><ol class="lst-upr-alph"><li>Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer</li>
	<li>Provide options for risk mitigation or alternative sources for continued support for unsupported components if components cannot be replaced</li>
</ol><h5>Discussion</h5>

<p>Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide critical software patches or product updates, which can result in opportunities for adversaries to exploit weaknesses or deficiencies in the installed components. Exceptions to replacing unsupported system components include systems that provide critical mission or business capabilities when newer technologies are unavailable or when the systems are so isolated that installing replacement components is not an option.</p>

<p>Alternative sources of support address the need to provide continued support for system components that are no longer supported by the original manufacturers, developers, or vendors when such components remain essential to organizational mission and business functions. If necessary, organizations can establish in-house support by developing customized patches for critical software components or obtain the services of external providers who provide ongoing support for unsupported components through contractual relationships. Such contractual relationships can include open-source software value-added vendors. The increased risk of using unsupported system components can be mitigated by prohibiting the connection of such components to public or uncontrolled networks or implementing other forms of isolation.</p>

<h5>References</h5>

<p>Source control: SA-22<br />
Supporting publications: None</p>
</details><details><summary><h4 id="03-16-03">03.16.03 External system services</h4>
</summary><ol class="lst-upr-alph"><li>Require the providers of external system services used for the processing, storage, or transmission of specified information, to comply with the following security requirements: [Assignment: organization-defined security requirements]</li>
	<li>Define and document user roles and responsibilities with regard to external system services including shared responsibilities with external service providers</li>
	<li>Implement processes, methods, and techniques to monitor security requirement compliance by external service providers on an ongoing basis</li>
</ol><h5>Discussion</h5>

<p>External system services are provided by external service providers. Organizations establish relationships with external service providers in a variety of ways, including through business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, joint ventures, and supply chain exchanges. The responsibility for managing risks from the use of external system services remains with the organization charged with protecting specified information. Service-level agreements define expectations of performance, describe measurable outcomes, and identify remedies, mitigations, and response requirements for instances of noncompliance. Information from external service providers regarding the specific functions, ports, protocols, and services used in the provision of such services can be useful when there is a need to understand the trade-offs involved in restricting certain functions and services or blocking certain ports and protocols. This requirement is related to <a href="#03-01-20">Use of external systems 03.01.20</a>.</p>

<h5>References</h5>

<p>Source control: SA-09<br />
Supporting publications:</p>

<ul><li><a href="https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final">NIST SP 800-160-1 Engineering Trustworthy Secure Systems </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/161/r1/final">NIST SP 800-161 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations </a></li>
</ul></details></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h3 class="h2 mrgn-tp-lg" id="3-17">3.17 Supply chain risk management</h3>

<p>The Supply chain risk management controls support the mitigation of cyber security risks throughout all phases of the supply chain.</p>
<!--<section>
			<h4>In this section</h4>
<ul class="list-unstyled">
<li><a href="#03-17-01">03.17.01 Supply chain risk management plan</a></li>
<li><a href="#03-17-02">03.17.02 Acquisition strategies, tools, and methods</a></li>
<li><a href="#03-17-03">03.17.03 Supply chain requirements and processes</a></li>

				</ul>
</section>-->

<details><summary><h4 id="03-17-01">03.17.01 Supply chain risk management plan</h4>
</summary><ol class="lst-upr-alph"><li>Develop a plan for managing supply chain risks associated with the research, development, design, manufacturing, acquisition, delivery, integration, operations, maintenance, and disposal of the system, system components, or system services</li>
	<li>Review and update the supply chain risk management plan [Assignment: organization-defined frequency]</li>
	<li>Protect the supply chain risk management plan from unauthorized disclosure</li>
</ol><h5>Discussion</h5>

<p>Dependence on the products, systems, and services of external providers and the nature of the relationships with those providers present an increasing level of risk to an organization. Threat actions that may increase security or privacy risks include unauthorized production, the insertion or use of counterfeits, tampering, poor manufacturing and development practices in the supply chain, theft, and the insertion of malicious software, firmware, and hardware. Supply chain risks can be endemic or systemic within a system, component, or service. Managing supply chain risks is a complex, multifaceted undertaking that requires a coordinated effort across an organization to build trust relationships and communicate with internal and external stakeholders.</p>

<p>Supply chain risk management (SCRM) activities include identifying and assessing risks, determining appropriate risk response actions, developing <abbr title="supply chain risk management">SCRM</abbr> plans to document response actions, and monitoring performance against the plans. The system-level <abbr title="supply chain risk management">SCRM</abbr> plan is implementation-specific and provides policy implementation, requirements, constraints, and implications. It can either be stand-alone or incorporated into system security and privacy plans. The <abbr title="supply chain risk management">SCRM</abbr> plan addresses the management, implementation, and monitoring of <abbr title="supply chain risk management">SCRM</abbr> controls and the development or sustainment of systems across the system development life cycle to support mission and business functions. Because supply chains can differ significantly across and within organizations, <abbr title="supply chain risk management">SCRM</abbr> plans are tailored to individual program, organizational, and operational contexts.</p>

<h5>References</h5>

<p>Source control: SR-02<br />
Supporting publications:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/tools-services/harmonized-tra-methodology">CSE-<abbr title="Royal Canadian Mounted Police">RCMP</abbr> Harmonized Threat and Risk Assessment Methodology (TRA-1)</a></li>
	<li>Cyber Centre Organizational cyber security and privacy risk management activities (ITSP.10.036)</li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protecting-your-organization-software-supply-chain-threats-itsm10071">Cyber Centre Protecting your organization from software supply chain threats (ITSM.10.071)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-supply-chain-approach-assessing-risk-itsap10070">Cyber Centre Cyber supply chain: An approach to assessing risk (ITSAP.10.070)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/supply-chain-security-small-and-medium-sized-organizations-itsap00070">Cyber Centre Supply chain security for small and medium-sized organizations (ITSAP.00.070)</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final">NIST SP 800-160-1 Engineering Trustworthy Secure Systems</a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/181/r1/final">NIST SP 800-181 Workforce Framework for Cybersecurity (NICE Framework)</a></li>
</ul></details><details><summary><h4 id="03-17-02">03.17.02 Acquisition strategies, tools, and methods</h4>
</summary><p>Develop and implement acquisition strategies, contract tools, and procurement methods to identify, protect against, and mitigate supply chain risks.</p>

<h5>Discussion</h5>

<p>The acquisition process provides an important vehicle for protecting the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or system component, using blind purchases, requiring tamper-evident packaging, or using trusted or controlled distribution. The results from a supply chain risk assessment can inform the strategies, tools, and methods that are most applicable to the situation. Tools and techniques may provide protections against unauthorized production, theft, tampering, the insertion of counterfeits, the insertion of malicious software or backdoors, and poor development practices throughout the system life cycle.</p>

<p>Organizations also consider providing incentives for suppliers to implement controls, promote transparency in their processes and security practices, provide contract language that addresses the prohibition of tainted or counterfeit components, and restrict purchases from untrustworthy suppliers. Organizations consider providing training, education, and awareness programs for personnel regarding supply chain risks, available mitigation strategies, and when the programs should be employed. Methods for reviewing and protecting development plans, documentation, and evidence are commensurate with the security requirements of the organization. Contracts may specify documentation protection requirements.</p>

<h5>References</h5>

<p>Source control: SR-05<br />
Supporting publications:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/tools-services/harmonized-tra-methodology">CSE-<abbr title="Royal Canadian Mounted Police">RCMP</abbr> Harmonized Threat and Risk Assessment Methodology (TRA-1) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/161/r1/final">NIST SP 800-161 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations </a></li>
</ul></details><details><summary><h4 id="03-17-03">03.17.03 Supply chain requirements and processes</h4>
</summary><ol class="lst-upr-alph"><li>Establish a process for identifying and addressing weaknesses or deficiencies in the supply chain elements and processes</li>
	<li>Enforce the following security requirements to protect against supply chain risks to the system, system components, or system services and to limit the harm or consequences from supply chain-related events: [Assignment: organization-defined security requirements]</li>
</ol><h5>Discussion</h5>

<p>Supply chain elements include organizations, entities, or tools that are employed for the research, development, design, manufacturing, acquisition, delivery, integration, operations, maintenance, and disposal of systems and system components. Supply chain processes include hardware, software, firmware, and systems development processes; shipping and handling procedures; physical security programs; personnel security programs; configuration management tools, techniques, and measures to maintain provenance; or other programs, processes, or procedures associated with the development, acquisition, maintenance, and disposal of systems and system components. Supply chain elements and processes may be provided by organizations, system integrators, or external providers. Weaknesses or deficiencies in supply chain elements or processes represent potential vulnerabilities that can be exploited by adversaries to harm the organization and affect its ability to carry out its core missions or business functions.</p>

<h5>References</h5>

<p>Source control: SR-03<br />
Supporting publications:</p>

<ul><li><a href="https://www.cyber.gc.ca/en/tools-services/harmonized-tra-methodology">CSE-<abbr title="Royal Canadian Mounted Police">RCMP</abbr> Harmonized Threat and Risk Assessment Methodology (TRA-1) </a></li>
	<li><a href="https://csrc.nist.gov/pubs/sp/800/161/r1/final">NIST SP 800-161 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations </a></li>
</ul></details></section></section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="AA">Annex A Tailoring criteria</h2>

<section><h3>In this section</h3>

<ul class="list-unstyled"><li><a href="#tab1">Table 1: Access control (AC)</a></li>
	<li><a href="#tab2">Table 2: Awareness and training (AT)</a></li>
	<li><a href="#tab3">Table 3: Audit and accountability (AU)</a></li>
	<li><a href="#tab4">Table 4: Assessment, authorization, and monitoring (CA)</a></li>
	<li><a href="#tab5">Table 5: Configuration management (CM)</a></li>
	<li><a href="#tab6">Table 6: Contingency planning (CP)</a></li>
	<li><a href="#tab7">Table 7: Identification and Authentication (IA)</a></li>
	<li><a href="#tab8">Table 8: Incident Response (IR)</a></li>
	<li><a href="#tab9">Table 9: Maintenance (MA)</a></li>
	<li><a href="#tab10">Table 10: Media protection (MP)</a></li>
	<li><a href="#tab11">Table 11: Physical and environmental protection (PE)</a></li>
	<li><a href="#tab12">Table 12: Planning (PL)</a></li>
	<li><a href="#tab13">Table 13: Program management (PM)</a></li>
	<li><a href="#tab14">Table 14: Personnel security (PS)</a></li>
	<li><a href="#tab15">Table 15: Personal information handling and transparency (PT)</a></li>
	<li><a href="#tab16">Table 16: Risk assessment (RA)</a></li>
	<li><a href="#tab17">Table 17: System and services acquisition (SA)</a></li>
	<li><a href="#tab18">Table 18: System and communications protection (SC)</a></li>
	<li><a href="#tab19">Table 19: System and information integrity (SI)</a></li>
	<li><a href="#tab20">Table 20: Supply chain risk management (SR)</a></li>
</ul></section><p>This appendix describes the security control tailoring criteria used to develop the specified information security requirements. Table 1 through Table 20 specify the tailoring actions applied to the controls in the ITSP.10.033-01 medium impact baseline to obtain the security requirements in section 3. The controls, assurances activities and enhancements are hyperlinked to their corresponding entry in ITSP.10.033<!--when published-->.</p>

<p>The security control tailoring criteria are the following:</p>

<ul><li>NCO: the control is not directly related to protecting the confidentiality of specified information</li>
	<li><abbr title="Government of Canada">GC:</abbr> the control is primarily the responsibility of the Government of Canada</li>
	<li>ORC: the outcome of the control related to protecting the confidentiality of specified information is adequately covered by other related controls</li>
	<li>N/A: the control is not applicable</li>
	<li>C: the control is directly related to protecting the confidentiality of specified information</li>
</ul><div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab1"><caption>Table 1: Access control (AC)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>AC-01</td>
			<td>Access control policy and procedures </td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>AC-02</td>
			<td>Account management</td>
			<td>C</td>
			<td><a href="#03-01-01">Account management 03.01.01</a></td>
		</tr><tr><td>AC-02(01)</td>
			<td>Account management: Automated system account management</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AC-02(02)</td>
			<td>Account management: Automated temporary and emergency account management</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AC-02(03)</td>
			<td>Account management: Disable accounts</td>
			<td>C</td>
			<td><a href="#03-01-01">Account management 03.01.01</a></td>
		</tr><tr><td>AC-02(04)</td>
			<td>Account management: Automated audit actions</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AC-02(05)</td>
			<td>Account management: Inactivity logout</td>
			<td>C</td>
			<td><a href="#03-01-01">Account management 03.01.01</a></td>
		</tr><tr><td>AC-02(07)</td>
			<td>Account management: Privileged user accounts</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AC-02(13)</td>
			<td>Account management: Disable accounts for high-risk individuals</td>
			<td>C</td>
			<td><a href="#03-01-01">Account management 03.01.01</a></td>
		</tr><tr><td>AC-03</td>
			<td>Access enforcement</td>
			<td>C</td>
			<td><a href="#03-01-02">Access enforcement 03.01.02</a></td>
		</tr><tr><td>AC-03(02)</td>
			<td>Access enforcement: Dual authorization</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AC-03(04)</td>
			<td>Access enforcement: Discretionary access control</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-03(09)</td>
			<td>Access enforcement: Controlled release</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-04</td>
			<td>Information flow enforcement</td>
			<td>C</td>
			<td><a href="#03-01-03">Information flow enforcement 03.01.03</a></td>
		</tr><tr><td>AC-05</td>
			<td>Separation of duties</td>
			<td>C</td>
			<td><a href="#03-01-04">Separation of duties 03.01.04</a></td>
		</tr><tr><td>AC-06</td>
			<td>Least privilege</td>
			<td>C</td>
			<td><a href="#03-01-05">Least privilege 03.01.05</a></td>
		</tr><tr><td>AC-06(01)</td>
			<td>Least privilege: Authorize access to security functions</td>
			<td>C</td>
			<td><a href="#03-01-05">Least privilege 03.01.05</a></td>
		</tr><tr><td>AC-06(02)</td>
			<td>Least privilege: Non-privileged access for non-security functions</td>
			<td>C</td>
			<td><a href="#03-01-06">Least privilege - privileged accounts 03.01.06</a></td>
		</tr><tr><td>AC-06(05)</td>
			<td>Least privilege: Privileged accounts</td>
			<td>C</td>
			<td><a href="#03-01-06">Least privilege - privileged accounts 03.01.06</a></td>
		</tr><tr><td>AC-06(07)</td>
			<td>Least privilege: Review of user privileges</td>
			<td>C</td>
			<td><a href="#03-01-05">Least privilege 03.01.05</a></td>
		</tr><tr><td>AC-06(09)</td>
			<td>Least privilege: Log use of privileged functions</td>
			<td>C</td>
			<td><a href="#03-01-07">Privileged accounts - privileged functions 03.01.07</a></td>
		</tr><tr><td>AC-06(10)</td>
			<td>Least privilege: Prohibit non-privileged users from executing privileged functions</td>
			<td>C</td>
			<td><a href="#03-01-07">Privileged accounts - privileged functions 03.01.07</a></td>
		</tr><tr><td>AC-07</td>
			<td>Unsuccessful logon attempts</td>
			<td>C</td>
			<td><a href="#03-01-08">Unsuccessful logon attempts 03.01.08</a></td>
		</tr><tr><td>AC-08</td>
			<td>System use notification</td>
			<td>C</td>
			<td><a href="#03-01-09">System use notification 03.01.09</a></td>
		</tr><tr><td>AC-11</td>
			<td>Device lock</td>
			<td>C</td>
			<td><a href="#03-01-10">Device lock 03.01.10</a></td>
		</tr><tr><td>AC-11(01)</td>
			<td>Device lock: Pattern-hiding displays</td>
			<td>C</td>
			<td><a href="#03-01-10">Device lock 03.01.10</a></td>
		</tr><tr><td>AC-12</td>
			<td>Session termination</td>
			<td>C</td>
			<td><a href="#03-01-11">Session termination 03.01.11</a></td>
		</tr><tr><td>AC-14</td>
			<td>Permitted actions without identification or authentication</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>AC-16</td>
			<td>Security and privacy attributes</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-16(02)</td>
			<td>Security and privacy attributes: Attribute value changes by authorized individuals</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-16(05)</td>
			<td>Security and privacy attributes: Attribute displays on objects to be output</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-17</td>
			<td>Remote access</td>
			<td>C</td>
			<td><a href="#03-01-02">Access enforcement 03.01.02</a></td>
		</tr><tr><td>AC-17(01)</td>
			<td>Remote access: Monitoring and control</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AC-17(02)</td>
			<td>Remote access: Protection of confidentiality and integrity using encryption</td>
			<td>C</td>
			<td><a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a></td>
		</tr><tr><td>AC-17(03)</td>
			<td>Remote access: Managed access control points</td>
			<td>C</td>
			<td><a href="#03-01-12">Remote access 03.01.12</a></td>
		</tr><tr><td>AC-17(04)</td>
			<td>Remote access: Privileged commands and access</td>
			<td>C</td>
			<td><a href="#03-01-12">Remote access 03.01.12</a></td>
		</tr><tr><td>AC-17(400)</td>
			<td>Remote access: Privileged accounts remote access</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-18</td>
			<td>Wireless access</td>
			<td>C</td>
			<td><a href="#03-01-16">Wireless access 03.01.16</a></td>
		</tr><tr><td>AC-18(01)</td>
			<td>Wireless access: Authentication and encryption</td>
			<td>C</td>
			<td><a href="#03-01-16">Wireless access 03.01.16</a></td>
		</tr><tr><td>AC-18(03)</td>
			<td>Wireless access: Disable wireless networking</td>
			<td>C</td>
			<td><a href="#03-01-16">Wireless access 03.01.16</a></td>
		</tr><tr><td>AC-18(04)</td>
			<td>Wireless access: Restrict configurations by users</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-19</td>
			<td>Access control for mobile devices</td>
			<td>C</td>
			<td><a href="#03-01-18">Access control for mobile devices 03.01.18</a></td>
		</tr><tr><td>AC-19(05)</td>
			<td>Access control for mobile devices: Full device or container-based encryption</td>
			<td>C</td>
			<td><a href="#03-01-18">Access control for mobile devices 03.01.18</a></td>
		</tr><tr><td>AC-20</td>
			<td>Use of external systems</td>
			<td>C</td>
			<td><a href="#03-01-20">Use of external systems 03.01.20</a></td>
		</tr><tr><td>AC-20(01)</td>
			<td>Use of external systems: Limits on authorized use</td>
			<td>C</td>
			<td><a href="#03-01-20">Use of external systems 03.01.20</a></td>
		</tr><tr><td>AC-20(02)</td>
			<td>Use of external systems: Portable storage devices – restricted use</td>
			<td>C</td>
			<td><a href="#03-01-20">Use of external systems 03.01.20</a></td>
		</tr><tr><td>AC-20(04)</td>
			<td>Use of external systems: Network accessible storage devices – restricted use</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>AC-21</td>
			<td>Information sharing</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>AC-21(400)</td>
			<td>Information sharing: Information sharing agreement</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>AC-21(401)</td>
			<td>Information sharing: Information sharing arrangement</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>AC-22</td>
			<td>Publicly accessible content</td>
			<td>C</td>
			<td><a href="#03-01-22">Publicly accessible content 03.01.22</a></td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab2"><caption>Table 2: Awareness and training</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>AT-01</td>
			<td>Awareness and training policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>AT-02</td>
			<td>Literacy training and awareness</td>
			<td>C</td>
			<td><a href="#03-02-01">Literacy training and awareness 03.02.01</a></td>
		</tr><tr><td>AT-02(02)</td>
			<td>Literacy training and awareness: Insider threat</td>
			<td>C</td>
			<td><a href="#03-02-01">Literacy training and awareness 03.02.01</a></td>
		</tr><tr><td>AT-02(03)</td>
			<td>Literacy training and awareness: Social engineering and mining</td>
			<td>C</td>
			<td><a href="#03-02-01">Literacy training and awareness 03.02.01</a></td>
		</tr><tr><td>AT-03</td>
			<td>Role-based training</td>
			<td>C</td>
			<td><a href="#03-02-02">Role-based training 03.02.02</a></td>
		</tr><tr><td>AT-04</td>
			<td>Training records</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab3"><caption>Table 3: Audit and accountability</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>AU-01</td>
			<td>Audit and accountability policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>AU-02</td>
			<td>Event logging</td>
			<td>C</td>
			<td><a href="#03-03-01">Event logging 03.03.01</a></td>
		</tr><tr><td>AU-03</td>
			<td>Content of audit records</td>
			<td>C</td>
			<td><a href="#03-03-02">Audit record content 03.03.02</a></td>
		</tr><tr><td>AU-03(01)</td>
			<td>Additional audit information</td>
			<td>C</td>
			<td><a href="#03-03-02">Audit record content 03.03.02</a></td>
		</tr><tr><td>AU-04</td>
			<td>Audit log storage capacity</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-04(01)</td>
			<td>Audit log storage capacity: Transfer to alternate storage</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-05</td>
			<td>Response to audit logging process failures</td>
			<td>C</td>
			<td><a href="#03-03-04">Response to audit logging process failures 03.03.04</a></td>
		</tr><tr><td>AU-05(01)</td>
			<td>Response to audit logging process failures: Storage capacity warning</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-06</td>
			<td>Audit record review, analysis, and reporting</td>
			<td>C</td>
			<td><a href="#03-03-05">Audit record review, analysis, and reporting 03.03.05</a></td>
		</tr><tr><td>AU-06(01)</td>
			<td>Audit record review, analysis, and reporting: Automated process integration</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-06(03)</td>
			<td>Audit record review, analysis, and reporting: Correlate audit record repositories</td>
			<td>C</td>
			<td><a href="#03-03-05">Audit record review, analysis, and reporting 03.03.05</a></td>
		</tr><tr><td>AU-06(04)</td>
			<td>Audit record review, analysis, and reporting: Central review and analysis</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-07</td>
			<td>Audit record reduction and report generation</td>
			<td>C</td>
			<td><a href="#03-03-06">Audit record reduction and report generation 03.03.06</a></td>
		</tr><tr><td>AU-07(01)</td>
			<td>Audit record reduction and report generation: Automatic processing</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-08</td>
			<td>Time stamps</td>
			<td>C</td>
			<td><a href="#03-03-07">Time stamps 03.03.07</a></td>
		</tr><tr><td>AU-09</td>
			<td>Protection of audit information</td>
			<td>C</td>
			<td><a href="#03-03-08">Protection of audit information 03.03.08</a></td>
		</tr><tr><td>AU-09(02)</td>
			<td>Protection of audit information: Store on separate physical system or component</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-09(04)</td>
			<td>Protection of audit information: Access by subset of privileged users</td>
			<td>C</td>
			<td><a href="#03-03-08">Protection of audit information 03.03.08</a></td>
		</tr><tr><td>AU-09(06)</td>
			<td>Protection of audit information: Read-only access</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>AU-11</td>
			<td>Audit record retention</td>
			<td>C</td>
			<td><a href="#03-03-03">Audit record generation 03.03.03</a></td>
		</tr><tr><td>AU-12</td>
			<td>Audit record generation</td>
			<td>C</td>
			<td><a href="#03-03-03">Audit record generation 03.03.03</a></td>
		</tr><tr><td>AU-12(01)</td>
			<td>Audit record generation: System-wide and time-correlated audit trail</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab4"><caption>Table 4: Assessment, authorization, and monitoring (CA)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">TSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>CA-01</td>
			<td>Assessment, authorization, and monitoring policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>CA-02</td>
			<td>Control assessments</td>
			<td>C</td>
			<td><a href="#03-12-01">Security assessment 03.12.01</a></td>
		</tr><tr><td>CA-02(01)</td>
			<td>Control assessments: Independent assessors</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CA-03</td>
			<td>Information exchange</td>
			<td>C</td>
			<td><a href="#03-12-05">Information exchange 03.12.05</a></td>
		</tr><tr><td>CA-05</td>
			<td>Plan of action and milestones</td>
			<td>C</td>
			<td><a href="#03-12-02">Plan of action and milestones 03.12.02</a></td>
		</tr><tr><td>CA-06</td>
			<td>Authorization</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>CA-07</td>
			<td>Continuous monitoring</td>
			<td>C</td>
			<td><a href="#03-12-03">Continuous monitoring 03.12.03</a></td>
		</tr><tr><td>CA-07(01)</td>
			<td>Continuous monitoring: Independent assessment</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CA-07(04)</td>
			<td>Continuous monitoring: Risk monitoring</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CA-09</td>
			<td>Internal system connections</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CA-09(01)</td>
			<td>Internal system connections: Compliance checks</td>
			<td>ORC</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab5"><caption>Table 5: Configuration management (CM)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>CM-01</td>
			<td>Configuration management policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>CM-02</td>
			<td>Baseline configuration</td>
			<td>C</td>
			<td><a href="#03-04-01">Baseline configuration 03.04.01</a></td>
		</tr><tr><td>CM-02(02)</td>
			<td>Baseline configuration: Automation support for accuracy and currency</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-02(03)</td>
			<td>Baseline configuration: Retention of previous configurations</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-02(06)</td>
			<td>Baseline configuration: Development and test environments</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-02(07)</td>
			<td>Baseline configuration: Configure systems and components for high-risk areas</td>
			<td>C</td>
			<td><a href="#03-04-12">System and component configuration for high-risk areas 03.04.12</a></td>
		</tr><tr><td>CM-03</td>
			<td>Configuration change control</td>
			<td>C</td>
			<td><a href="#03-04-03">Configuration change control 03.04.03</a></td>
		</tr><tr><td>CM-03(02)</td>
			<td>Configuration change control: Testing, validation, and documentation of changes</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-03(04)</td>
			<td>Configuration change control: Security and privacy representatives</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-04</td>
			<td>Impact analyses</td>
			<td>C</td>
			<td><a href="#03-04-04">Impact analyses 03.04.04</a></td>
		</tr><tr><td>CM-04(01)</td>
			<td>Impact analyses: Separate test environments</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-04(02)</td>
			<td>Impact analyses: Verification of controls</td>
			<td>C</td>
			<td><a href="#03-04-04">Impact analyses 03.04.04</a></td>
		</tr><tr><td>CM-05</td>
			<td>Access restrictions for change</td>
			<td>C</td>
			<td><a href="#03-04-05">Access restrictions for change 03.04.05</a></td>
		</tr><tr><td>CM-06</td>
			<td>Configuration settings</td>
			<td>C</td>
			<td><a href="#03-04-02">Configuration settings 03.04.02</a></td>
		</tr><tr><td>CM-07</td>
			<td>Least functionality</td>
			<td>C</td>
			<td><a href="#03-04-06">Least functionality 03.04.06</a></td>
		</tr><tr><td>CM-07(01)</td>
			<td>Least functionality: Periodic review</td>
			<td>C</td>
			<td><a href="#03-04-06">Least functionality 03.04.06</a></td>
		</tr><tr><td>CM-07(02)</td>
			<td>Least functionality: Prevent program execution</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>CM-07(05)</td>
			<td>Least functionality: Authorized software – allow by exception</td>
			<td>C</td>
			<td><a href="#03-04-08">Authorized software - allow by exception 03.04.08</a></td>
		</tr><tr><td>CM-08</td>
			<td>System component inventory</td>
			<td>C</td>
			<td><a href="#03-04-10">System component inventory 03.04.10</a></td>
		</tr><tr><td>CM-08(01)</td>
			<td>System component inventory: Updates during installation and removal</td>
			<td>C</td>
			<td><a href="#03-04-10">System component inventory 03.04.10</a></td>
		</tr><tr><td>CM-08(03)</td>
			<td>System component inventory: Automated unauthorized component detection</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-08(04)</td>
			<td>System component inventory: Accountability information</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-08(06)</td>
			<td>System component inventory: Assessed configurations and approved deviations</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-09</td>
			<td>Configuration management plan</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-10</td>
			<td>Software usage restrictions</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CM-11</td>
			<td>User-installed software</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>CM-11(02)</td>
			<td>User-installed software: Software installation with privileged status</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>CM-12</td>
			<td>Information location</td>
			<td>C</td>
			<td><a href="#03-04-11">Information location 03.04.11</a></td>
		</tr><tr><td>CM-12(01)</td>
			<td>Information location: Automated tools to support information location</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab6"><caption>Table 6: Contingency planning (CP)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>CP-01</td>
			<td>Contingency planning policy and procedures</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-02</td>
			<td>Contingency plan</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-02(01)</td>
			<td>Contingency plan: Coordinate with related plans</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-02(02)</td>
			<td>Contingency plan: Capacity planning</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-02(03)</td>
			<td>Contingency plan: Resume mission and business functions</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-02(08)</td>
			<td>Contingency plan: Identify critical assets</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-03</td>
			<td>Contingency training</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-04</td>
			<td>Contingency plan testing</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-04(01)</td>
			<td>Contingency plan testing: Coordinate related plans</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-06</td>
			<td>Alternate storage site</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-06(01)</td>
			<td>Alternate storage site: Separation of primary site</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-06(03)</td>
			<td>Alternate storage site: Accessibility</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-07</td>
			<td>Alternate processing site</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-07(01)</td>
			<td>Alternate processing site: Separation of primary site</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-07(02)</td>
			<td>Alternate processing site: Accessibility</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-07(03)</td>
			<td>Alternate processing site: Priority of service</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-07(04)</td>
			<td>Alternate processing site: Preparation for use</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-07(06)</td>
			<td>Alternate processing site: Inability to return to primary site</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-08</td>
			<td>Telecommunications services</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-08(01)</td>
			<td>Telecommunications services: Priority of service provisions</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-08(02)</td>
			<td>Telecommunications services: Single points of failure</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-08(03)</td>
			<td>Telecommunications services: Separation of primary and alternate providers</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-08(05)</td>
			<td>Telecommunications services: Alternate telecommunication service testing</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-09</td>
			<td>System backup</td>
			<td>C</td>
			<td><a href="#03-08-09">System backup - cryptographic protection 03.08.09</a></td>
		</tr><tr><td>CP-09(01)</td>
			<td>System backup: Testing for reliability and integrity</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-09(03)</td>
			<td>System backup: Separate storage for critical information</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-09(05)</td>
			<td>System backup: Transfer to alternate storage site</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-09(07)</td>
			<td>System backup: Dual authorization for deletion or destruction</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-09(08)</td>
			<td>System backup: Cryptographic protection</td>
			<td>C</td>
			<td><a href="#03-08-09">System backup - cryptographic protection 03.08.09</a></td>
		</tr><tr><td>CP-10</td>
			<td>System recovery and reconstitution</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-10(02)</td>
			<td>System recovery and reconstitution: Transaction recovery</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-10(04)</td>
			<td>System recovery and reconstitution: Restore within time period</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>CP-10(06)</td>
			<td>System recovery and reconstitution: Component protection</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab7"><caption>Table 7: Identification and Authentication (IA)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>IA-01</td>
			<td>Identification and authentication policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>IA-02</td>
			<td>Identification and authentication (organizational users)</td>
			<td>C</td>
			<td><a href="#03-05-01">User identification, authentication, and re-authentication 03.05.01</a></td>
		</tr><tr><td>IA-02(01)</td>
			<td>Identification and authentication (organizational users): Multi-factor authentication to privileged accounts</td>
			<td>C</td>
			<td><a href="#03-05-03">Multi-factor authentication 03.05.03</a></td>
		</tr><tr><td>IA-02(02)</td>
			<td>Identification and authentication (organizational users): Multi-factor authentication to non-privileged accounts</td>
			<td>C</td>
			<td><a href="#03-05-03">Multi-factor authentication 03.05.03</a></td>
		</tr><tr><td>IA-02(08)</td>
			<td>Identification and authentication (organizational users): Access to accounts – replay resistant</td>
			<td>C</td>
			<td><a href="#03-05-04">Replay-resistant authentication 03.05.04</a></td>
		</tr><tr><td>IA-02(10)</td>
			<td>Identification and authentication (organizational users): Single sign-on</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IA-02(12)</td>
			<td>Identification and authentication (organizational users): Use of hardware token <abbr title="Government of Canada">GC</abbr>-issued <abbr title="Public Key Infrastructure">PKI</abbr>-based credentials</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-03</td>
			<td>Device identification and authentication</td>
			<td>C</td>
			<td><a href="#03-05-02">Device identification and authentication 03.05.02</a></td>
		</tr><tr><td>IA-04</td>
			<td>Identifier management</td>
			<td>C</td>
			<td><a href="#03-05-05">Identifier management 03.05.05</a></td>
		</tr><tr><td>IA-04(04)</td>
			<td>Identifier management: Identify user status</td>
			<td>C</td>
			<td><a href="#03-05-05">Identifier management 03.05.05</a></td>
		</tr><tr><td>IA-05</td>
			<td>Authenticator management</td>
			<td>C</td>
			<td><a href="#03-05-12">Authenticator management 03.05.12</a></td>
		</tr><tr><td>IA-05(01)</td>
			<td>Authenticator management: Password-based authentication</td>
			<td>C</td>
			<td><a href="#03-05-07">Password management 03.05.07</a></td>
		</tr><tr><td>IA-05(02)</td>
			<td>Authenticator management: Public key-based authentication</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-05(06)</td>
			<td>Authenticator management: Protection of authenticators</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-05(07)</td>
			<td>Authenticator management: No embedded unencrypted static authenticators</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IA-05(08)</td>
			<td>Authenticator management: Multiple system accounts</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IA-05(09)</td>
			<td>Authenticator management: Federated credential management</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-05(13)</td>
			<td>Authenticator management: Expiration of cached authenticators</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>IA-05(14)</td>
			<td>Authenticator management: Managing content of <abbr title="Public Key Infrastructure">PKI</abbr> trust stores</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-06</td>
			<td>Authentication feedback</td>
			<td>C</td>
			<td><a href="#03-05-11">Authentication feedback 03.05.11</a></td>
		</tr><tr><td>IA-07</td>
			<td>Cryptographic module authentication</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-08</td>
			<td>Identification and authentication (non-organizational users)</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-08(01)</td>
			<td>Identification and authentication (non-organizational users): Acceptance of <abbr title="Public Key Infrastructure">PKI</abbr>-based credentials from other agencies</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-08(02)</td>
			<td>Identification and authentication (non-organizational users): Acceptance of external authenticators</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-08(04)</td>
			<td>Identification and authentication (non-organizational users): Use of defined profiles</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-11</td>
			<td>Re-authentication</td>
			<td>C</td>
			<td><a href="#03-05-01">User identification, authentication, and re-authentication 03.05.01</a></td>
		</tr><tr><td>IA-12</td>
			<td>Identity proofing</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-12(02)</td>
			<td>Identity proofing: Identity evidence</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-12(03)</td>
			<td>Identity proofing: Identity evidence validation and verification</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-12(04)</td>
			<td>Identity proofing: In-person validation and verification</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>IA-12(05)</td>
			<td>Identity proofing: Address confirmation</td>
			<td>GC</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab8"><caption>Table 8: Incident Response (IR)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>IR-01</td>
			<td>Incident response policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>IR-02</td>
			<td>Incident response training</td>
			<td>C</td>
			<td><a href="#03-06-04">Incident response training 03.06.04</a></td>
		</tr><tr><td>IR-03</td>
			<td>Incident response testing</td>
			<td>C</td>
			<td><a href="#03-06-03">Incident response testing 03.06.03</a></td>
		</tr><tr><td>IR-03(02)</td>
			<td>Incident response testing: Coordinate with related plans</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-04</td>
			<td>Incident handling</td>
			<td>C</td>
			<td><a href="#03-06-01">Incident handling 03.06.01</a></td>
		</tr><tr><td>IR-04(03)</td>
			<td>Incident handling: Continuity of operations</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-04(08)</td>
			<td>Incident handling: Correlation with external organizations</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-04(09)</td>
			<td>Incident handling: Dynamic response capability</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-05</td>
			<td>Incident monitoring</td>
			<td>C</td>
			<td><a href="#03-06-02">Incident monitoring, reporting, and response assistance 03.06.02</a></td>
		</tr><tr><td>IR-06</td>
			<td>Incident reporting</td>
			<td>C</td>
			<td><a href="#03-06-02">Incident monitoring, reporting, and response assistance 03.06.02</a></td>
		</tr><tr><td>IR-06(01)</td>
			<td>Incident reporting: Automated reporting</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-06(02)</td>
			<td>Incident reporting: Vulnerabilities related to incidents</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-06(03)</td>
			<td>Incident reporting: Supply chain coordination</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-07</td>
			<td>Incident response assistance</td>
			<td>C</td>
			<td><a href="#03-06-02">Incident monitoring, reporting, and response assistance 03.06.02</a></td>
		</tr><tr><td>IR-07(01)</td>
			<td>Incident response assistance: Automation support for availability of information and support</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>IR-08</td>
			<td>Incident response plan</td>
			<td>C</td>
			<td><a href="#03-06-05">Incident response plan 03.06.05</a></td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab9"><caption>Table 9: Maintenance (MA)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>MA-01</td>
			<td>System maintenance policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>MA-02</td>
			<td>Controlled maintenance</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>MA-03</td>
			<td>Maintenance tools</td>
			<td>C</td>
			<td><a href="#03-07-04">Maintenance tools 03.07.04</a></td>
		</tr><tr><td>MA-03(01)</td>
			<td>Maintenance tools: Inspect tools</td>
			<td>C</td>
			<td><a href="#03-07-04">Maintenance tools 03.07.04</a></td>
		</tr><tr><td>MA-03(02)</td>
			<td>Maintenance tools: Inspect media</td>
			<td>C</td>
			<td><a href="#03-07-04">Maintenance tools 03.07.04</a></td>
		</tr><tr><td>MA-03(03)</td>
			<td>Maintenance tools: Prevent unauthorized removal</td>
			<td>C</td>
			<td><a href="#03-07-04">Maintenance tools 03.07.04</a></td>
		</tr><tr><td>MA-04</td>
			<td>Non-local maintenance</td>
			<td>C</td>
			<td><a href="#03-07-05">Non-local maintenance 03.07.05</a></td>
		</tr><tr><td>MA-04(01)</td>
			<td>Non-local maintenance: Logging and review</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>MA-04(03)</td>
			<td>Non-local maintenance: Comparable security and sanitization</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MA-04(04)</td>
			<td>Non-local maintenance: Authentication and separation of maintenance sessions</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MA-04(05)</td>
			<td>Non-local maintenance: Approvals and notifications</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MA-04(06)</td>
			<td>Non-local maintenance: Cryptographic protection</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MA-05</td>
			<td>Maintenance personnel</td>
			<td>C</td>
			<td><a href="#03-07-06">Maintenance personnel 03.07.06</a></td>
		</tr><tr><td>MA-05(01)</td>
			<td>Maintenance personnel: Individuals without appropriate access</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MA-06</td>
			<td>Timely maintenance</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab10"><caption>Table 10: Media protection (MP)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>MP-01</td>
			<td>Media protection policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>MP-02</td>
			<td>Media access</td>
			<td>C</td>
			<td><a href="#03-08-02">Media access 03.08.02</a></td>
		</tr><tr><td>MP-03</td>
			<td>Media marking</td>
			<td>C</td>
			<td><a href="#03-08-04">Media marking 03.08.04</a></td>
		</tr><tr><td>MP-04</td>
			<td>Media storage</td>
			<td>C</td>
			<td><a href="#03-08-01">Media storage 03.08.01</a></td>
		</tr><tr><td>MP-05</td>
			<td>Media transport</td>
			<td>C</td>
			<td><a href="#03-08-05">Media transport 03.08.05</a></td>
		</tr><tr><td>MP-06</td>
			<td>Media sanitization</td>
			<td>C</td>
			<td><a href="#03-08-03">Media sanitization 03.08.03</a></td>
		</tr><tr><td>MP-06(03)</td>
			<td>Media sanitization: Non-destructive techniques</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MP-06(08)</td>
			<td>Media sanitization: Remote purging or wiping of information</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MP-07</td>
			<td>Media use</td>
			<td>C</td>
			<td><a href="#03-08-07">Media use 03.08.07</a></td>
		</tr><tr><td>MP-08</td>
			<td>Media downgrading</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>MP-08(03)</td>
			<td>Media downgrading: Protected information</td>
			<td>ORC</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab11"><caption>Table 11: Physical and environmental protection (PE)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>PE-01</td>
			<td>Physical and environmental protection policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>PE-02</td>
			<td>Physical access authorizations</td>
			<td>C</td>
			<td><a href="#03-10-01">Physical access authorizations 03.10.01</a></td>
		</tr><tr><td>PE-02(400)</td>
			<td>Physical access authorizations: Identification cards requirements</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>PE-03</td>
			<td>Physical access control</td>
			<td>C</td>
			<td><a href="#03-10-07">Physical access control 03.10.07</a></td>
		</tr><tr><td>PE-03(400)</td>
			<td>Physical access control: Security inspections</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>PE-04</td>
			<td>Access control for transmission</td>
			<td>C</td>
			<td><a href="#03-10-08">Access control for transmission 03.10.08</a></td>
		</tr><tr><td>PE-05</td>
			<td>Access control for output devices</td>
			<td>C</td>
			<td><a href="#03-10-07">Physical access control 03.10.07</a></td>
		</tr><tr><td>PE-06</td>
			<td>Monitoring physical access</td>
			<td>C</td>
			<td><a href="#03-10-02">Monitoring physical access 03.10.02</a></td>
		</tr><tr><td>PE-06(01)</td>
			<td>Monitoring physical access: Intrusion alarms and surveillance equipment</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-08</td>
			<td>Visitor access records</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-09</td>
			<td>Power equipment and cabling</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-10</td>
			<td>Emergency shutoff</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-11</td>
			<td>Emergency power</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-12</td>
			<td>Emergency lighting</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-13</td>
			<td>Fire protection</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-13(01)</td>
			<td>Fire protection: Detection systems – automatic activation and notification</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-13(04)</td>
			<td>Fire protection: Inspections</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-13(400)</td>
			<td>Fire protection: Emergency services</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-14</td>
			<td>Environmental controls</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-15</td>
			<td>Water damage protection</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-16</td>
			<td>Delivery and removal</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PE-17</td>
			<td>Alternate work site</td>
			<td>C</td>
			<td><a href="#03-10-06">Alternate work site 03.10.06</a></td>
		</tr><tr><td>PE-400</td>
			<td>Remote and telework environments</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>PE-400(01)</td>
			<td>Remote and telework environments: Physical information and assets storage</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>PE-400(02)</td>
			<td>Remote and telework environments: International remote/telework</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>PE-401</td>
			<td>Security operations centre</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab12"><caption>Table 12: Planning (PL)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>PL-01</td>
			<td>Planning policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>PL-02</td>
			<td>System security and privacy plans</td>
			<td>C</td>
			<td><a href="#03-15-02">System security plan 03.15.02</a></td>
		</tr><tr><td>PL-04</td>
			<td>Rules of behaviour</td>
			<td>C</td>
			<td><a href="#03-15-03">Rules of behaviour 03.15.03</a></td>
		</tr><tr><td>PL-04(01)</td>
			<td>Rules of behaviour: Social media and external site/application usage restrictions</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PL-08</td>
			<td>Security and privacy architectures</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PL-10</td>
			<td>Baseline selection</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>PL-11</td>
			<td>Baseline tailoring</td>
			<td>GC</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab13"><caption>Table 13: Program management (PM)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>PM-01</td>
			<td>Information security program plan</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-02</td>
			<td>Information security program leadership role</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-03</td>
			<td>Information security and privacy resources</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-04</td>
			<td>Plan of action and milestones process</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-05</td>
			<td>System and program inventory</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-05(01)</td>
			<td>System inventory: Inventory of personal information</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-06</td>
			<td>Measures of performance</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-07</td>
			<td>Enterprise architecture</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-07(01)</td>
			<td>Enterprise architecture: Offloading</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-08</td>
			<td>Critical infrastructure plan</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-09</td>
			<td>Risk management strategy</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-10</td>
			<td>Authorization process</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-11</td>
			<td>Mission and business process definition</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-12</td>
			<td>Insider threat program</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-13</td>
			<td>Security and privacy workforce</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-14</td>
			<td>Testing, training, and monitoring</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-15</td>
			<td>Security and privacy groups and associations</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-16</td>
			<td>Threat awareness program</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-16(01)</td>
			<td>Threat awareness program: Automated means for sharing threat intelligence</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-17</td>
			<td>Protecting specified information on outsourced external systems</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-18</td>
			<td>Privacy program plan</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-19</td>
			<td>Privacy program leadership role</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-20</td>
			<td>Communication of key privacy services</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-20(01)</td>
			<td>Communication of key privacy services: Privacy policies on websites, applications, and digital services</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-21</td>
			<td>Maintain a record of disclosures</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-22</td>
			<td>Personal information quality management</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-23</td>
			<td>Data governance committee</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-24</td>
			<td>Data integrity board</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-25</td>
			<td>Minimization of personal information used in testing, training, and research</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-26</td>
			<td>Complaint management</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-27</td>
			<td>Privacy reporting</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-28</td>
			<td>Risk framing</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-29</td>
			<td>Risk management program leadership roles</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-30</td>
			<td>Supply chain risk management strategy</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-30(01)</td>
			<td>Supply chain risk management strategy: Suppliers of critical or mission-essential items</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-31</td>
			<td>Continuous monitoring strategy</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PM-32</td>
			<td>Purposing</td>
			<td>N/A</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab14"><caption>Table 14: Personnel security (PS)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>PS-01</td>
			<td>Personnel security policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>PS-02</td>
			<td>Position security analysis</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>PS-03</td>
			<td>Personnel screening</td>
			<td>C</td>
			<td><a href="#03-09-01">Personnel screening 03.09.01</a></td>
		</tr><tr><td>PS-04</td>
			<td>Personnel termination</td>
			<td>C</td>
			<td><a href="#03-09-02">Personnel termination and transfer 03.09.02</a></td>
		</tr><tr><td>PS-05</td>
			<td>Personnel transfer</td>
			<td>C</td>
			<td><a href="#03-09-02">Personnel termination and transfer 03.09.02</a></td>
		</tr><tr><td>PS-06</td>
			<td>Access agreements</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PS-07</td>
			<td>External personnel security</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PS-08</td>
			<td>Personnel sanctions</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>PS-09</td>
			<td>Position descriptions</td>
			<td>GC</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab15"><caption>Table 15: Personal information handling and transparency (PT)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>PT-01</td>
			<td>Personal information handling and transparency policy and procedures</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-02</td>
			<td>Authority to collect and use personal information</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-02(01)</td>
			<td>Authority to collect and use personal information: Data tagging</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-02(02)</td>
			<td>Authority to collect and use personal information: Automation</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-03</td>
			<td>Personal information handling uses and disclosures</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-03(01)</td>
			<td>Personal information handling uses and disclosures: Data tagging</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-03(02)</td>
			<td>Personal information handling uses and disclosures: Automation</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-04</td>
			<td>Consent</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-04(01)</td>
			<td>Consent: Tailored consent Government of Canada</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-04(02)</td>
			<td>Consent: Timely consent</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-04(03)</td>
			<td>Consent: Revocation</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-04(400)</td>
			<td>Consent: Tailored consent privatesector</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-05</td>
			<td>Privacy notice</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-05(01)</td>
			<td>Privacy notice: Timely privacy notice statements</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-05(02)</td>
			<td>Privacy notice: Privacy notice statements</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-06</td>
			<td>Personal information banks</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-06(01)</td>
			<td>Personal information banks: Consistent uses and disclosures</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-06(02)</td>
			<td>Personal information banks: Exempt banks</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-07</td>
			<td>Particularly sensitive personal information</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-07(01)</td>
			<td>Particularly sensitive personal information: Social insurance numbers</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-07(02)</td>
			<td>Particularly sensitive personal information: <em>Canadian Charter of Rights and Freedoms</em></td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-07(400)</td>
			<td>Particularly sensitive personal information: Private sector</td>
			<td>N/A</td>
			<td>none</td>
		</tr><tr><td>PT-08</td>
			<td>Data matching requirements</td>
			<td>N/A</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab16"><caption>Table 16: Risk assessment (RA)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>RA-01</td>
			<td>Risk assessment policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>RA-02</td>
			<td>Security categorization</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>RA-03</td>
			<td>Risk assessment</td>
			<td>C</td>
			<td><a href="#03-11-01">Risk assessment 03.11.01</a></td>
		</tr><tr><td>RA-03(01)</td>
			<td>Risk assessment: Supply chain risk assessment</td>
			<td>C</td>
			<td><a href="#03-11-01">Risk assessment 03.11.01</a></td>
		</tr><tr><td>RA-05</td>
			<td>Vulnerability monitoring and scanning</td>
			<td>C</td>
			<td><a href="#03-11-02">Vulnerability monitoring and scanning 03.11.02</a></td>
		</tr><tr><td>RA-05(02)</td>
			<td>Vulnerability monitoring and scanning: Update vulnerabilities to be scanned</td>
			<td>C</td>
			<td><a href="#03-11-02">Vulnerability monitoring and scanning 03.11.02</a></td>
		</tr><tr><td>RA-05(05)</td>
			<td>Vulnerability monitoring and scanning: Privileged access</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>RA-05(11)</td>
			<td>Vulnerability monitoring and scanning: Public disclosure program</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>RA-07</td>
			<td>Risk response</td>
			<td>C</td>
			<td><a href="#03-11-04">Risk response 03.11.04</a></td>
		</tr><tr><td>RA-09</td>
			<td>Criticality analysis</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab17"><caption>Table 17: System and services acquisition (SA)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>SA-01</td>
			<td>System and services acquisition policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>SA-02</td>
			<td>Allocation of resources</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-03</td>
			<td>System development life cycle</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-04</td>
			<td>Acquisition process</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-04(01)</td>
			<td>Acquisition process: Functional properties of controls</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-04(09)</td>
			<td>Acquisition process: Functions, ports, protocols, and services in use</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-04(10)</td>
			<td>Acquisition process: Use of approved digital credential products</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>SA-04(12)</td>
			<td>Acquisition process: Data ownership</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>SA-05</td>
			<td>System documentation</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-08</td>
			<td>Security and privacy engineering principles</td>
			<td>C</td>
			<td><a href="#03-16-01">Security engineering principles 03.16.01</a></td>
		</tr><tr><td>SA-09</td>
			<td>External system services</td>
			<td>C</td>
			<td><a href="#03-16-03">External system services 03.16.03</a></td>
		</tr><tr><td>SA-09(01)</td>
			<td>External system services: Risk assessments and organizational approvals</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-09(02)</td>
			<td>External System Services: Identification of functions, ports,protocols, and services</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SA-10</td>
			<td>Developer configuration management</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-10(01)</td>
			<td>Developer configuration management: Software and firmware integrity verification</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-11</td>
			<td>Developer testing and evaluation</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-15</td>
			<td>Development process, standards, and tools</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-15(03)</td>
			<td>Development process, standards, and tools: Criticality Analysis</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-16</td>
			<td>Developer provided training</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-17</td>
			<td>Developer security and privacy architecture and design</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SA-22</td>
			<td>Unsupported system components</td>
			<td>C</td>
			<td><a href="#03-16-02">Unsupported system components 03.16.02</a></td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab18"><caption>Table 18: System and communications protection (SC)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>SC-01</td>
			<td>System and communications protection policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>SC-02</td>
			<td>Separation of system and user functionality</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-04</td>
			<td>Information in shared system resources</td>
			<td>C</td>
			<td><a href="#03-13-04">Information in shared system resources 03.13.04</a></td>
		</tr><tr><td>SC-05</td>
			<td>Denial-of-service protection</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-05(02)</td>
			<td>Denial-of-service protection: Capacity, bandwidth, and redundancy</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-05(03)</td>
			<td>Denial-of-service protection: Detection and monitoring</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-07</td>
			<td>Boundary protection</td>
			<td>C</td>
			<td><a href="#03-13-01">Boundary protection 03.13.01</a></td>
		</tr><tr><td>SC-07(03)</td>
			<td>Boundary protection: Access points</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-07(04)</td>
			<td>Boundary protection: External telecommunications services</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-07(05)</td>
			<td>Boundary protection: Deny by default – allow by exception</td>
			<td>C</td>
			<td><a href="#03-13-06">Network communications - deny by default - allow by exception 03.13.06</a></td>
		</tr><tr><td>SC-07(07)</td>
			<td>Boundary protection: Split tunneling for remote devices</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-07(08)</td>
			<td>Boundary protection: Route traffic to authenticated proxy servers</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-07(09)</td>
			<td>Boundary protection: Restrict threatening outgoing communications traffic</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-07(11)</td>
			<td>Boundary protection: Incoming communications traffic</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-07(12)</td>
			<td>Boundary protection: Host-based protection</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-07(13)</td>
			<td>Boundary protection: Isolation of security tools, mechanisms, and support components</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-08</td>
			<td>Transmission confidentiality and integrity</td>
			<td>C</td>
			<td><a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a></td>
		</tr><tr><td>SC-08(01)</td>
			<td>Transmission confidentiality and integrity: Cryptographic protection</td>
			<td>C</td>
			<td><a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a></td>
		</tr><tr><td>SC-10</td>
			<td>Network disconnect</td>
			<td>C</td>
			<td><a href="#03-13-09">Network disconnect 03.13.09</a></td>
		</tr><tr><td>SC-12</td>
			<td>Cryptographic key establishment and management</td>
			<td>C</td>
			<td><a href="#03-13-10">Cryptographic key establishment and management 03.13.10</a></td>
		</tr><tr><td>SC-12(01)</td>
			<td>Cryptographic key establishment and management: Availability</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-13</td>
			<td>Cryptographic protection</td>
			<td>C</td>
			<td><a href="#03-13-11">Cryptographic protection 03.13.11</a></td>
		</tr><tr><td>SC-15</td>
			<td>Collaborative computing devices and applications</td>
			<td>C</td>
			<td><a href="#03-13-12">Collaborative computing devices and applications 03.13.12</a></td>
		</tr><tr><td>SC-15(03)</td>
			<td>Collaborative computing devices and applications: Disabling and removal in secure work areas</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>SC-17</td>
			<td>Public key infrastructure certificates</td>
			<td>GC</td>
			<td>none</td>
		</tr><tr><td>SC-18</td>
			<td>Mobile code</td>
			<td>C</td>
			<td><a href="#03-13-13">Mobile code 03.13.13</a></td>
		</tr><tr><td>SC-18(01)</td>
			<td>Mobile code: Identify unacceptable code and take corrective actions</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-18(02)</td>
			<td>Mobile code: Acquisition, development, and use</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-18(03)</td>
			<td>Mobile code: Prevent downloading and execution</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-18(04)</td>
			<td>Mobile code: Prevent automatic execution</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-18(05)</td>
			<td>Mobile code: Allow execution only in confined environments</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-20</td>
			<td>Secure name/address resolution service (authoritative source)</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-21</td>
			<td>Secure name/address resolution service (recursive or caching resolver)</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-22</td>
			<td>Architecture and provisioning for name/address resolution service</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-23</td>
			<td>Session authenticity</td>
			<td>C</td>
			<td><a href="#03-13-15">Session authenticity 03.13.15</a></td>
		</tr><tr><td>SC-23(01)</td>
			<td>Session authenticity: Invalidate session identifiers at logout</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-23(03)</td>
			<td>Session authenticity: Unique system-generated session identifiers</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SC-28</td>
			<td>Protection of information at rest</td>
			<td>C</td>
			<td><a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a></td>
		</tr><tr><td>SC-28(01)</td>
			<td>Protection of information at rest: Cryptographic protection</td>
			<td>C</td>
			<td><a href="#03-13-08">Transmission and storage confidentiality 03.13.08</a></td>
		</tr><tr><td>SC-29</td>
			<td>Heterogeneity</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SC-39</td>
			<td>Process isolation</td>
			<td>NCO</td>
			<td>none</td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab19"><caption>Table 19: System and information integrity (SI)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>SI-01</td>
			<td>System and information integrity policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>SI-02</td>
			<td>Flaw remediation</td>
			<td>C</td>
			<td><a href="#03-14-01">Flaw remediation 03.14.01</a></td>
		</tr><tr><td>SI-02(02)</td>
			<td>Flaw remediation: Automated flaw remediation status</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-02(06)</td>
			<td>Flaw remediation: Removal of previous versions of software and firmware</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-03</td>
			<td>Malicious code protection</td>
			<td>C</td>
			<td><a href="#03-14-02">Malicious code protection 03.14.02</a></td>
		</tr><tr><td>SI-03(04)</td>
			<td>Malicious code protection: Updates only by privileged users</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04</td>
			<td>System monitoring</td>
			<td>C</td>
			<td><a href="#03-14-06">System monitoring 03.14.06</a></td>
		</tr><tr><td>SI-04(02)</td>
			<td>System monitoring: Automated tools and mechanisms for real-time analysis</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04(04)</td>
			<td>System monitoring: Inbound and outbound communications traffic</td>
			<td>C</td>
			<td><a href="#03-14-06">System monitoring 03.14.06</a></td>
		</tr><tr><td>SI-04(05)</td>
			<td>System monitoring: System-generated alerts</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04(10)</td>
			<td>System monitoring: Visibility of encrypted communications</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04(11)</td>
			<td>System monitoring: Analyze communications traffic anomalies</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04(12)</td>
			<td>System monitoring: Automated organization-generated alerts</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04(13)</td>
			<td>System monitoring: Analyze traffic and event patterns</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04(14)</td>
			<td>System monitoring: Wireless intrusion detection</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-04(15)</td>
			<td>System monitoring: Wireless to wireline communications</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-05</td>
			<td>Security alerts, advisories, and directives</td>
			<td>C</td>
			<td><a href="#03-14-03">Security alerts, advisories, and directives 03.14.03</a></td>
		</tr><tr><td>SI-07</td>
			<td>Software, firmware, and information integrity</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-07(01)</td>
			<td>Software, firmware, and information integrity: Integrity checks</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-07(02)</td>
			<td>Software, firmware, and information integrity: Automated notifications of integrity violations</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-07(03)</td>
			<td>Software, firmware, and information integrity: Centrally-managed integrity tools</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-07(07)</td>
			<td>Software, firmware, and information integrity: Integration of detection and response</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-08</td>
			<td>Spam protection</td>
			<td>ORC</td>
			<td>none</td>
		</tr><tr><td>SI-08(02)</td>
			<td>Spam protection: Automatic updates</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-10</td>
			<td>Information input validation</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-11</td>
			<td>Error handling</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-12</td>
			<td>Information management and retention </td>
			<td>C</td>
			<td><a href="#03-14-08">Information management and retention 03.14.08</a></td>
		</tr><tr><td>SI-16</td>
			<td>Memory protection</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SI-400</td>
			<td>Dedicated administration workstation</td>
			<td>C</td>
			<td><a href="#03-14-09">Dedicated administration workstation 03.14.09</a></td>
		</tr></tbody></table></div>
<!--** TOP OF PAGE ******-->

<div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab20"><caption>Table 20: Supply chain risk management (SR)</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Control / activity number</th>
			<th class="text-center" scope="col">ITSP.10.033-01 Medium impact baseline</th>
			<th class="text-center" scope="col">Tailoring criteria</th>
			<th class="text-center" scope="col">Security requirement</th>
		</tr></thead><tbody><tr><td>SR-01</td>
			<td>Supply chain risk management policy and procedures</td>
			<td>C</td>
			<td><a href="#03-15-01">Policy and procedures 03.15.01</a></td>
		</tr><tr><td>SR-02</td>
			<td>Supply chain risk management plan</td>
			<td>C</td>
			<td><a href="#03-17-01">Supply chain risk management plan 03.17.01</a></td>
		</tr><tr><td>SR-02(01)</td>
			<td>Supply chain risk management plan: Establish <abbr title="supply chain risk management">SCRM</abbr> team</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SR-03</td>
			<td>Supply chain controls and processes</td>
			<td>C</td>
			<td><a href="#03-17-03">Supply chain requirements and processes 03.17.03</a></td>
		</tr><tr><td>SR-05</td>
			<td>Acquisition strategies, tools, and methods</td>
			<td>C</td>
			<td><a href="#03-17-02">Acquisition strategies, tools, and methods 03.17.02</a></td>
		</tr><tr><td>SR-06</td>
			<td>Supplier assessments and reviews</td>
			<td>C</td>
			<td><a href="#03-11-01">Risk assessment 03.11.01</a></td>
		</tr><tr><td>SR-08</td>
			<td>Notification agreements</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SR-10</td>
			<td>Inspection of systems or components</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SR-11</td>
			<td>Component authenticity</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SR-11(01)</td>
			<td>Component authenticity: Anti-counterfeit training</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SR-11(02)</td>
			<td>Component authenticity: Configuration control for component service and repair</td>
			<td>NCO</td>
			<td>none</td>
		</tr><tr><td>SR-12</td>
			<td>Component disposal</td>
			<td>ORC</td>
			<td>none</td>
		</tr></tbody></table></div>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **-->

<section><h2 class="text-info" id="AB">Annex B Organization-defined parameters</h2>

<p>This appendix lists the organization-defined parameters (ODPs) that are included in the security requirements in Section 3. The <abbr title="organization-defined parameter">ODP</abbr>s are listed sequentially by requirement family, beginning with the first requirement containing an <abbr title="organization-defined parameter">ODP</abbr> in the Access Control (AC) family and ending with the last requirement containing an <abbr title="organization-defined parameter">ODP</abbr> in the Supply Chain Risk Management (SR) family.</p>

<div class="table-responsive col-md-12">
<table class="table table-bordered" id="tab21"><caption>Table 21: Organization-defined parameters</caption>
	<thead><tr class="active"><th class="text-center" scope="col">Security requirement</th>
			<th class="text-center" scope="col">Organization-defined parameter</th>
		</tr></thead><tbody><tr><td><a href="#03-01-01">Account management 03.01.01</a>.F.02</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-01-01">Account management 03.01.01</a>.G.01</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-01-01">Account management 03.01.01</a>.G.02</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-01-01">Account management 03.01.01</a>.G.03</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-01-01">Account management 03.01.01</a>.H</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-01-01">Account management 03.01.01</a>.H</td>
			<td>[Assignment: organization-defined circumstances]</td>
		</tr><tr><td><a href="#03-01-05">Least privilege 03.01.05</a>.B</td>
			<td>[Assignment: organization-defined security functions]</td>
		</tr><tr><td><a href="#03-01-05">Least privilege 03.01.05</a>.B</td>
			<td>[Assignment: organization-defined security-relevant information]</td>
		</tr><tr><td><a href="#03-01-05">Least privilege 03.01.05</a>.C</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-01-06">Least privilege - privileged accounts 03.01.06</a>.A</td>
			<td>[Assignment: organization-defined personnel or roles]</td>
		</tr><tr><td><a href="#03-01-08">Unsuccessful logon attempts 03.01.08</a>.A</td>
			<td>[Assignment: organization-defined number]</td>
		</tr><tr><td><a href="#03-01-08">Unsuccessful logon attempts 03.01.08</a>.A</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-01-08">Unsuccessful logon attempts 03.01.08</a>.B</td>
			<td>[Selection (one or more): lock the account or node for an [Assignment: organization-defined time period]; lock the account or node until released by an administrator; delay next logon prompt; notify system administrator; take other action]</td>
		</tr><tr><td><a href="#03-01-10">Device lock 03.01.10</a>.A</td>
			<td>[Selection (one or more): initiating a device lock after [Assignment: organization-defined time period] of inactivity; requiring the user to initiate a device lock before leaving the system unattended]</td>
		</tr><tr><td><a href="#03-01-11">Session termination 03.01.11</a></td>
			<td>[Assignment: organization-defined conditions or trigger events requiring session disconnect]</td>
		</tr><tr><td><a href="#03-01-20">Use of external systems 03.01.20</a>.B</td>
			<td>[Assignment: organization-defined security requirements]</td>
		</tr><tr><td><a href="#03-02-01">Literacy training and awareness 03.02.01</a>.A.01</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-02-01">Literacy training and awareness 03.02.01</a>.A.02</td>
			<td>[Assignment: organization-defined events]</td>
		</tr><tr><td><a href="#03-02-01">Literacy training and awareness 03.02.01</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-02-01">Literacy training and awareness 03.02.01</a>.B</td>
			<td>[Assignment: organization-defined events]</td>
		</tr><tr><td><a href="#03-02-02">Role-based training 03.02.02</a>.A.01</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-02-02">Role-based training 03.02.02</a>.A.02</td>
			<td>[Assignment: organization-defined events]</td>
		</tr><tr><td><a href="#03-02-02">Role-based training 03.02.02</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-02-02">Role-based training 03.02.02</a>.B</td>
			<td>[Assignment: organization-defined events]</td>
		</tr><tr><td><a href="#03-03-01">Event logging 03.03.01</a>.A</td>
			<td>[Assignment: organization-defined event types]</td>
		</tr><tr><td><a href="#03-03-01">Event logging 03.03.01</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-03-04">Response to audit logging process failures 03.03.04</a>.A</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-03-04">Response to audit logging process failures 03.03.04</a>.B</td>
			<td>[Assignment: organization-defined additional actions]</td>
		</tr><tr><td><a href="#03-03-05">Audit record review, analysis, and reporting 03.03.05</a>.A</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-03-07">Time stamps 03.03.07</a>.B</td>
			<td>[Assignment: organization-defined granularity of time measurement]</td>
		</tr><tr><td><a href="#03-04-01">Baseline configuration 03.04.01</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-04-02">Configuration settings 03.04.02</a>.A</td>
			<td>[Assignment: organization-defined configuration settings]</td>
		</tr><tr><td><a href="#03-04-06">Least functionality 03.04.06</a>.B</td>
			<td>[Assignment: organization-defined functions, ports, protocols, connections, and/or services]</td>
		</tr><tr><td><a href="#03-04-06">Least functionality 03.04.06</a>.C</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-04-08">Authorized software - allow by exception 03.04.08</a>.C</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-04-10">System component inventory 03.04.10</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-04-12">System and component configuration for high-risk areas 03.04.12</a>.A</td>
			<td>[Assignment: organization-defined system configurations]</td>
		</tr><tr><td><a href="#03-04-12">System and component configuration for high-risk areas 03.04.12</a>.B</td>
			<td>[Assignment: organization-defined security requirements]</td>
		</tr><tr><td><a href="#03-05-01">User identification, authentication, and re-authentication 03.05.01</a>.B</td>
			<td>[Assignment: organization-defined circumstances or situations requiring re-authentication]</td>
		</tr><tr><td><a href="#03-05-02">Device identification and authentication 03.05.02</a></td>
			<td>[Assignment: organization-defined devices or types of devices]</td>
		</tr><tr><td><a href="#03-05-05">Identifier management 03.05.05</a>.C</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-05-05">Identifier management 03.05.05</a>.D</td>
			<td>[Assignment: organization-defined characteristic identifying individual status]</td>
		</tr><tr><td><a href="#03-05-07">Password management 03.05.07</a>.A</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-05-07">Password management 03.05.07</a>.F</td>
			<td>[Assignment: organization-defined composition and complexity rules]</td>
		</tr><tr><td><a href="#03-05-12">Authenticator management 03.05.12</a>.E</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-05-12">Authenticator management 03.05.12</a>.E</td>
			<td>[Assignment: organization-defined events]</td>
		</tr><tr><td><a href="#03-06-02">Incident monitoring, reporting, and response assistance 03.06.02</a>.B</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-06-02">Incident monitoring, reporting, and response assistance 03.06.02</a>.C</td>
			<td>[Assignment: organization-defined authorities]</td>
		</tr><tr><td><a href="#03-06-03">Incident response testing 03.06.03</a></td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-06-04">Incident response training 03.06.04</a>.A.01</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-06-04">Incident response training 03.06.04</a>.A.03</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-06-04">Incident response training 03.06.04</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-06-04">Incident response training 03.06.04</a>.B</td>
			<td>[Assignment: organization-defined events]</td>
		</tr><tr><td><a href="#03-08-07">Media use 03.08.07</a>.A</td>
			<td>[Assignment: organization-defined types of system media]</td>
		</tr><tr><td><a href="#03-09-01">Personnel screening 03.09.01</a>.B</td>
			<td>[Assignment: organization-defined conditions requiring rescreening]</td>
		</tr><tr><td><a href="#03-09-02">Personnel termination and transfer 03.09.02</a>.A.01</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-10-01">Physical access authorizations 03.10.01</a>.C</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-10-02">Monitoring physical access 03.10.02</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-10-02">Monitoring physical access 03.10.02</a>.B</td>
			<td>[Assignment: organization-defined events or potential indications of events]</td>
		</tr><tr><td><a href="#03-10-06">Alternate work site 03.10.06</a>.B</td>
			<td>[Assignment: organization-defined security requirements]</td>
		</tr><tr><td><a href="#03-11-01">Risk assessment 03.11.01</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-11-02">Vulnerability monitoring and scanning 03.11.02</a>.A</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-11-02">Vulnerability monitoring and scanning 03.11.02</a>.B</td>
			<td>[Assignment: organization-defined response times]</td>
		</tr><tr><td><a href="#03-11-02">Vulnerability monitoring and scanning 03.11.02</a>.C</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-12-01">Security assessment 03.12.01</a></td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-12-05">Information exchange 03.12.05</a>.A</td>
			<td>[Selection (one or more): interconnection security agreements; information exchange security agreements; memoranda of understanding or agreement; service-level agreements; user agreements; nondisclosure agreements; other types of agreements]</td>
		</tr><tr><td><a href="#03-12-05">Information exchange 03.12.05</a>.C</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-13-09">Network disconnect 03.13.09</a></td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-13-10">Cryptographic key establishment and management 03.13.10</a></td>
			<td>[Assignment: organization-defined requirements for key establishment and management]</td>
		</tr><tr><td><a href="#03-13-11">Cryptographic protection 03.13.11</a></td>
			<td>[Assignment: organization-defined types of cryptography]</td>
		</tr><tr><td><a href="#03-13-12">Collaborative computing devices and applications 03.13.12</a>.A</td>
			<td>[Assignment: organization-defined exceptions where remote activation is to be allowed]</td>
		</tr><tr><td><a href="#03-14-01">Flaw remediation 03.14.01</a>.B</td>
			<td>[Assignment: organization-defined time period]</td>
		</tr><tr><td><a href="#03-14-02">Malicious code protection 03.14.02</a>.C.01</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-15-01">Policy and procedures 03.15.01</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-15-02">System security plan 03.15.02</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-15-03">Rules of behaviour 03.15.03</a>.D</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-16-01">Security engineering principles 03.16.01</a></td>
			<td>[Assignment: organization-defined systems security engineering principles]</td>
		</tr><tr><td><a href="#03-16-03">External system services 03.16.03</a>.A</td>
			<td>[Assignment: organization-defined security requirements]</td>
		</tr><tr><td><a href="#03-17-01">Supply chain risk management plan 03.17.01</a>.B</td>
			<td>[Assignment: organization-defined frequency]</td>
		</tr><tr><td><a href="#03-17-03">Supply chain requirements and processes 03.17.03</a>.B</td>
			<td>[Assignment: organization-defined security requirements]</td>
		</tr></tbody></table></div>
</section><!--** TOP OF PAGE ******--><div class="clearfix"> </div>

<div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"></span></div>
<!--** END TOP OF PAGE **--><!--FOOTNOTE SECTION EN-->

<aside class="wb-fnote" role="note"><h2 id="reference">Notes</h2>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p>System that is used or operated by a <abbr title="Government of Canada">GC</abbr> department or agency, by a contractor, or by another organization on behalf of a department or agency. The term system as used in this publication includes people, processes and technologies involved in the handling, processing, storage or transmission of specified information. Systems can include operational technology (OT), information technology (IT), Internet of Things (IoT) devices, industrial IoT (IIoT) devices, specialized systems, cyber-physical systems, embedded systems, and sensors.</p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p>Components include workstations, servers, notebook computers, smartphones, tablets, input and output devices, network components, operating systems, virtual machines, database management systems, and applications.</p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
</div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/series-joint-guidance-modern-defensible-architecture</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/series-joint-guidance-modern-defensible-architecture"/><title><![CDATA[Series of joint guidance on modern defensible architecture]]></title><updated>2025-10-23T14:05:12Z</updated><summary><![CDATA[MDA is ASD’s ACSC initiative to ensure that organizations consider and actively apply secure design and architecture in their cyber security strategy, resilience planning and implementations.
This series of guidance includes 3 publications.]]></summary><content><![CDATA[<article data-history-node-id="6904" about="/en/news-events/series-joint-guidance-modern-defensible-architecture" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and the following international partners in releasing guidance on modern defensible architecture (MDA):</p>

<ul><li>Czech Republic’s National Cyber and Information Security Agency (NÚKIB)</li>
	<li>Germany’s Federal Office for Information Security (BSI)</li>
	<li>Japan’s Computer Emergency Response Team Coordination Center (JPCERT/CC)</li>
	<li>Japan’s National Cybersecurity Office (NCO)</li>
	<li>Japan’s National Police Agency (NPA)</li>
	<li>New Zealand’s National Cyber Security Centre (NCSC-NZ)</li>
	<li>Republic of Korea’s National Intelligence Service (NIS)</li>
</ul><p><abbr title="Modern Defensible Architecture">MDA</abbr> is <abbr title="Australian Signals Directorate’s Australian Cyber Security Centre">ASD’s ACSC</abbr> initiative to ensure that organizations consider and actively apply secure design and architecture in their cyber security strategy, resilience planning and implementations.</p>

<p>This series of guidance includes 3 publications.</p>

<h2>Foundations for modern defensible architecture</h2>

<p>This joint guidance provides organizations with a baseline of secure design and architecture practices that prepare them to adapt to current and emerging cyber threats and challenges.</p>

<p>Read the full joint publication: <a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/foundations-for-modern-defensible-architecture">Foundations for modern defensible architecture</a></p>

<h2>Modern defensible architecture for senior decision makers</h2>

<p>This joint guidance aims to assist senior decision-makers in understanding the contemporary threat landscape and how MDA can support organizations in defending against current threats and preparing for future threats.</p>

<p>Read the full joint publication: <a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/modern-defensible-architecture-for-senior-decision-makers">Modern defensible architecture for senior decision makers</a></p>

<h2>Investing in modern defensible architecture</h2>

<p>This joint guidance aims to assist organizations in developing an <abbr title="Modern Defensible Architecture">MDA</abbr> investment roadmap based on their organizational:</p>

<ul><li>strategy</li>
	<li>business and security objectives</li>
	<li>risk profile</li>
	<li>threat context</li>
</ul><p>Read the full joint publication: <a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/investing-in-modern-defensible-architecture">Investing in modern defensible architecture</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/security-considerations-internet-protocol-version-6-itsm80003</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/security-considerations-internet-protocol-version-6-itsm80003"/><title><![CDATA[Security considerations for Internet Protocol version 6 (ITSM.80.003)]]></title><updated>2025-10-10T17:23:26Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6622" about="/en/guidance/security-considerations-internet-protocol-version-6-itsm80003" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row"><!--Info across the top under the image-->
<div class="col-md-4 col-sm-12 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>October 2025</strong></p>
</div>

<div class="col-md-4 col-sm-12 hidden-xs hidden-sm">
<p class="text-center"><strong>Management series</strong></p>
</div>

<div class="col-md-4 col-sm-12 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSM.80.003</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>October 2025 | Management series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/security-considerations-ipv6-itsm80003-e.pdf">Security considerations for Internet Protocol version 6 - ITSM.80.003 (PDF, 551 KB)</a></p>
</div>

<section><h2 class="text-info mrgn-tp-0">Foreword</h2>

<p>This is an <span class="text-uppercase">unclassfied</span>, publication, issued under the authority of the Head of the Canadian Centre for Cyber Security (Cyber Centre). For more information, contact the Cyber Centre:</p>

<p><span class="glyphicon glyphicon-envelope"></span><span class="wb-inv">email</span> <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> |<span class="glyphicon glyphicon-phone"></span><span class="wb-inv">Mobile</span> <a href="tel:613-949-7048">613-949-7048</a> or <a href="tel:+1-833-292-3788">1<span>‑</span>833<span>‑</span>CYBER<span>‑</span>88</a></p>
</section></div>
</div>

<section><h2 class="text-info">Effective date</h2>

<p>This publication takes effect on October 10, 2025.</p>
</section><section><h2 class="text-info">Revision history</h2>

<ol><li><strong>First release:</strong> October 10, 2025.</li>
</ol></section><section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of Contents</h2>
</summary><ul class="list-unstyled mrgn-tp-lg"><li><a href="#1">1 Introduction</a>

	<ul><li><a href="#1.1">1.1 Internet Protocol version 6</a></li>
		<li><a href="#1.2">1.2 Internet Protocol version 6 enhancements</a>
		<ul><li><a href="#1.2.1">1.2.1 IP security support</a></li>
			<li><a href="#1.2.2">1.2.2 Autoconfiguration</a></li>
			<li><a href="#1.2.3">1.2.3 Neighbor discovery</a></li>
			<li><a href="#1.2.4">1.2.4 Dynamic host configuration protocol security</a></li>
			<li><a href="#1.2.5">1.2.5 Extension headers</a></li>
			<li><a href="#1.2.6">1.2.6 No broadcast addresses</a></li>
		</ul></li>
		<li><a href="#1.3">1.3 Problem statement</a></li>
		<li><a href="#1.4">1.4 Threat context</a>
		<ul><li><a href="#1.4.1">1.4.1 Protocol tunneling</a></li>
			<li><a href="#1.4.2">1.4.2 Distributed denial-of-service attacks</a></li>
			<li><a href="#1.4.3">1.4.3 Command and control</a></li>
			<li><a href="#1.4.4">1.4.4 Network device misconfigurations</a></li>
			<li><a href="#1.4.5">1.4.5 Network service discovery</a></li>
		</ul></li>
	</ul></li>
	<li><a href="#2">2 Security considerations</a>
	<ul><li><a href="#2.1">2.1 Migration risks</a></li>
		<li><a href="#2.2">2.2 Procurement and testing</a></li>
		<li><a href="#2.3">2.3 Target architecture</a></li>
		<li><a href="#2.4">2.4 Legacy applications</a></li>
		<li><a href="#2.5">2.5 Unauthorized tunnels</a></li>
		<li><a href="#2.6">2.6 Default configurations</a></li>
		<li><a href="#2.7">2.7 Unauthorized IPv6 traffic flows</a></li>
		<li><a href="#2.8">2.8 Monitoring and management tools</a></li>
		<li><a href="#2.9">2.9 Addressing scheme</a></li>
		<li><a href="#2.10">2.10 Multi-addressing support</a></li>
		<li><a href="#2.11">2.11 Dynamic Host Configuration Protocol for IPv6</a></li>
		<li><a href="#2.12">2.12 Address autoconfiguration protections</a></li>
		<li><a href="#2.13">2.13 Dual-stack environments</a></li>
		<li><a href="#2.14">2.14 Protection of data and management planes</a></li>
		<li><a href="#2.15">2.15 Neighbor discovery messages</a></li>
		<li><a href="#2.16">2.16 Address translation risks</a></li>
		<li><a href="#2.17">2.17 Zero trust architecture</a></li>
		<li><a href="#2.18">2.18 Technical and operational depth</a></li>
	</ul></li>
	<li><a href="#3">3 Conclusion</a></li>
	<li><a href="#reference">Reference</a></li>
</ul></details></section><section><h2 class="mrgn-tp-xl text-info">Overview</h2>

<p>Exponential growth in the use of Internet-based technologies to deliver modern business services and applications is linked to the depletion of globally available Internet Protocol version 4 (IPv4) addresses. The Internet Protocol version 6 (IPv6) addressing scheme was designed by the Internet Engineering Task Force (IETF) to replace <abbr title="Internet Protocol version 4">IPv4</abbr>, and it offers significantly larger private and public address blocks to adequately support modern enterprise and non-enterprise needs. Deploying <abbr title="Internet Protocol version 6">IPv6</abbr> endpoints alongside existing <abbr title="Internet Protocol version 4">IPv4</abbr> infrastructure is emerging as a common strategy within enterprise networks. While <abbr title="Internet Protocol version 6">IPv6</abbr> offers several security enhancements that <abbr title="Internet Protocol version 4">IPv4</abbr> does not, running dual-stack architectures introduces new risks that must be appropriately managed.</p>

<p>To ensure its service architecture continues to evolve, the Government of Canada (GC) will need to design new network architectures and migrate existing digital infrastructure to support <abbr title="Internet Protocol version 6">IPv6</abbr>. As part of this strategy, <abbr title="Internet Protocol version 6">IPv6</abbr>-enabled services must be designed to securely co-exist alongside existing <abbr title="Internet Protocol version 4">IPv4</abbr> infrastructure until an <abbr title="Internet Protocol version 6">IPv6</abbr>-only enterprise architecture emerges. While introducing <abbr title="Internet Protocol version 6">IPv6</abbr> within GC infrastructure may have little or no direct impact on users and front-end services, GC departments must examine and assess the implications of <abbr title="Internet Protocol version 6">IPv6</abbr> on their business services and security objectives.</p>

<p>This publication highlights critical security considerations for <abbr title="Internet Protocol version 6">IPv6</abbr> deployments within GC networks. GC departments must design transition plans to support <abbr title="Internet Protocol version 6">IPv6</abbr> addressing while ensuring operational and security risks are mitigated.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h2 class="mrgn-tp-xl text-info" id="1">1 Introduction</h2>

<p>The GC relies on digital, inter-networked systems for delivering essential services to Canadians. Networking technologies continuously evolve due to the requirements of the digital infrastructure needed to support modern service connectivity. While the average Canadian user may not understand which Internet Protocol (IP) stack supports their services, the expectation is that GC digital service infrastructure should be able to process service requests from <abbr title="Internet Protocol version 6">IPv6</abbr>-enabled or <abbr title="Internet Protocol version 4">IPv4</abbr>-enabled devices. As GC networks and services are built to support the <abbr title="Internet Protocol version 6">IPv6</abbr> technology stack, key stakeholders must assess the potential risks and impact of adopting the <abbr title="Internet Protocol version 6">IPv6</abbr> protocol within the enterprise network, particularly security risks associated with implementing a dual-stack (<abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr>) architecture.</p>

<p>Modern systems and applications have varying <abbr title="Internet Protocol version 6">IPv6</abbr> protocol support; sometimes the protocol is available by default while other times, vendor-unique customizations are implemented, which can lead to interoperability challenges. These can expose enterprise networks to considerable security risks, increasing the likelihood for misconfigurations and gaps in security controls.</p>

<p>In 2013, <abbr title="Treasury Board of Canada Secretariat">TBS</abbr> released the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=26295"><abbr title="Internet Protocol version 6">IPv6</abbr> Network Equipment Procurement Guideline</a> as a follow-up to the <abbr title="Internet Protocol version 6">IPv6</abbr> Adoption Strategy. This guideline was meant to help GC departments understand the technical requirements when procuring network equipment (for example, routers, network monitoring devices, proxy servers, firewalls) to ensure <abbr title="Internet Protocol version 6">IPv6</abbr> capabilities are evaluated as part of system procurement processes. However, neither the strategy nor the procurement guidelines adequately address security considerations for <abbr title="Internet Protocol version 6">IPv6</abbr>.</p>

<p>While sections of the existing departmental digital architecture may be capable of supporting <abbr title="Internet Protocol version 6">IPv6</abbr>, without a secured framework for implementation, security risks may be inadvertently introduced into the enterprise environment. Departments should not assume that enabling support for <abbr title="Internet Protocol version 6">IPv6</abbr> can simply occur by flipping a switch.</p>

<p>According to the <abbr title="Internet Protocol version 6">IPv6</abbr> protocol specification, <abbr title="Internet Protocol version 6">IPv6</abbr> is prioritized over <abbr title="Internet Protocol version 4">IPv4</abbr> by default. Although business enterprise applications may not use the <abbr title="Internet Protocol version 6">IPv6</abbr> protocol, defined specification standards and vendor-implemented default configurations may allow communications with <abbr title="Internet Protocol version 6">IPv6</abbr> link-local addresses. For example, Microsoft<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> does not recommend disabling <abbr title="Internet Protocol version 6">IPv6</abbr> support on Windows operating environments even when not in use. To assess these and other issues, the Cyber Centre recommends that GC departments conduct a review of <abbr title="Internet Protocol version 6">IPv6</abbr> network flows within their environment and address gaps that may exist within their network security monitoring tools before implementation. Enabling <abbr title="Internet Protocol version 6">IPv6</abbr> traffic flows without adequate network visibility monitoring or appropriate network filtering protections may increase the enterprise attack surface and expose the network to additional security risks.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="1.1">1.1 Internet Protocol version 6</h3>

<p><abbr title="Internet Protocol">IP</abbr> is the primary communications protocol of the Internet; it specifies how network packets are to be transported across network boundaries. <abbr title="Internet Protocol">IP</abbr> is a component of the network layer in the Open Systems Interconnection reference model, a framework for organizing communication protocols and sharing information over the public Internet.</p>

<p><abbr title="Internet Protocol version 6">IPv6</abbr> was designed to replace <abbr title="Internet Protocol version 4">IPv4</abbr>, with some enhancements in operational and security functions. Differences exist between <abbr title="Internet Protocol version 6">IPv6</abbr> and <abbr title="Internet Protocol version 4">IPv4</abbr> which have implications on network architecture designs. The <abbr title="Internet Protocol version 6">IPv6</abbr> protocol standard is a 128-bit network addressing scheme, which provides a significantly wider address space compared to <abbr title="Internet Protocol version 4">IPv4</abbr> (which uses a 32-bit network addressing scheme). By default, <abbr title="Internet Protocol version 6">IPv6</abbr> is not backward compatible with <abbr title="Internet Protocol version 4">IPv4</abbr>, which may require network administrators to implement changes to existing network architectures.</p>

<h3 class="mrgn-tp-md">Internet Protocol version 6 compared to Internet Protocol version 4</h3>

<h3>Protocol components - Address space and notation</h3>

<h4>Internet Protocol version 4</h4>

<ul><li>uses 32-bit address space, and therefore offers a limited address space for private and public use cases</li>
	<li>address notation consists of numbers separated by a period, for example, 192.168.0.1</li>
</ul><h4>Internet Protocol version 6</h4>

<ul><li>uses 128-bit address space, and therefore allows up to 2^128 unique network addresses (approximately 340 trillion)</li>
	<li>address notation consists of eight colon-separated hexadecimal values, for example, 2001:0DB8:0000:0000:0000:000A:09C0:00B4</li>
</ul><h3>Protocol components - Security functions</h3>

<h4>Internet Protocol version 4</h4>

<ul><li>Protocol does not natively support authentication and security functions</li>
</ul><h4>Internet Protocol version 6</h4>

<ul><li>Natively supports authentication, data integrity, and data confidentiality (for example, IP security (IPsec) support)</li>
</ul><h3>Protocol components - Types</h3>

<h4>Internet Protocol version 4</h4>

<ul><li>Supports public and private static addressing to manage networks; however, address space is limited</li>
</ul><h4>Internet Protocol version 6</h4>

<ul><li>supports public routing and private static addressing to manage network devices</li>
	<li>typical network address is composed of sections and identifiers (global routing prefix, local subnet identifier and interface identifier)</li>
</ul><h3>Protocol components - Address distribution</h3>

<h4>Internet Protocol version 4</h4>

<ul><li>Autoconfiguration is not supported and would require static or Dynamic Host Configuration Protocol (DHCP) assignment of IP addresses</li>
</ul><h4>Internet Protocol version 6</h4>

<ul><li>Allows autoconfiguration (stateless address configurations), easing the need for address assignment by a DHCP server. Autoconfiguration relies on router information for network addresses to access network services</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="1.2">1.2 Internet Protocol version 6 enhancements</h3>

<p>The <abbr title="Internet Protocol version 6">IPv6</abbr> specification standard proposed enhancements which were not previously available in <abbr title="Internet Protocol version 4">IPv4</abbr>. The following subsections provide additional information on the security enhancements.</p>

<h4 id="1.2.1">1.2.1 Internet Protocol security support</h4>

<p>IPsec is a suite of protocols that can be used for authentication, encryption, and integrity protections. While IPsec can be used as a retroactive extension in <abbr title="Internet Protocol version 4">IPv4</abbr>, for <abbr title="Internet Protocol version 6">IPv6</abbr> it is supported as part of the standard. Note, IPsec is no longer mandatory in <abbr title="Internet Protocol version 6">IPv6</abbr> as per <abbr title="request for comments">RFC</abbr> 8504<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>.</p>

<h4 id="1.2.2">1.2.2 Autoconfiguration</h4>

<p>Autoconfiguration provides the ability for a node to self-assign its <abbr title="Internet Protocol version 6">IPv6</abbr> network address based on the network prefix information advertised by the router. Stateless address autoconfiguration (SLAAC) is the mechanism by which this can be achieved.</p>

<h4 id="1.2.3">1.2.3 Neighbor discovery</h4>

<p>The neighbor discovery (ND) protocol replaces the address resolution protocol used in <abbr title="Internet Protocol version 4">IPv4</abbr> networks, providing cryptographic options to secure discovery messages.</p>

<h4 id="1.2.4">1.2.4 Dynamic host configuration protocol security</h4>

<p>The dynamic host configuration protocol for <abbr title="Internet Protocol version 6">IPv6</abbr> (DHCPv6) supports authentication (and encryption) of <abbr title="Dynamic Host Configuration Protocol">DHCP</abbr> messages using IPsec, thus preventing eavesdropping and message intercept attacks.</p>

<h4 id="1.2.5">1.2.5 Extension headers</h4>

<p><abbr title="Internet Protocol version 6">IPv6</abbr> extension headers can be used to improve security, debugging, and management functions.</p>

<h4 id="1.2.6">1.2.6 No broadcast addresses</h4>

<p>The <abbr title="Internet Protocol version 6">IPv6</abbr> standard abolished the use of broadcast addresses and adopted multicast addresses as the primary mechanism for group communications.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="1.3">1.3 Problem statement</h3>

<p>As enterprise networks evolve, <abbr title="Internet Protocol version 6">IPv6</abbr> will inevitably need to be supported and managed. New network devices will likely support <abbr title="Internet Protocol version 6">IPv6</abbr> and have it enabled by default, prioritizing its traffic flow in line with the specification standard. Deploying <abbr title="Internet Protocol version 6">IPv6</abbr>-enabled devices without proper understanding, adequate monitoring, hardening, and deployment of appropriate mitigation controls will increase the enterprise attack surface and expose the organization to significant risks.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="1.4">1.4 Threat context</h3>

<p>This guidance is intended for systems operating at the UNCLASSIFIED, PROTECTED A, and PROTECTED B levels. In general, the Cyber Centre recommends that GC departments and agencies conduct a threat and risk assessment within the context of their business needs before partial or full-scale adoption of <abbr title="Internet Protocol version 6">IPv6</abbr>. As organizations consider threat sources that may exploit <abbr title="Internet Protocol version 6">IPv6</abbr> vulnerabilities, the Cyber Centre assesses that unsophisticated threat actors (Td3) may target device misconfiguration errors and unintentionally exposed devices to infiltrate networks and maximize their criminal operations. Cybercrime groups and financially motivated cyber threat actors (Td4 and Td5) may target <abbr title="Internet Protocol version 6">IPv6</abbr>-related device vulnerabilities and design implementation weaknesses<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>. State-sponsored actors (Td6 and above), in addition to lower-level tactics, may target IPv6 protocol specification weaknesses and system integration vulnerabilities to achieve larger strategic objectives. Mitigations to address state-sponsored advanced threats are considered out of scope for this guidance.</p>

<p>Below are some identified potential threat events (attacks) that could be applicable within <abbr title="Internet Protocol version 6">IPv6</abbr> environments:</p>

<h4 id="1.4.1">1.4.1 Protocol tunneling</h4>

<p>Threat actors may encapsulate network packets within another protocol or create multiple tunnels through a network device to evade detection controls. For example, network devices may allow a malicious actor to embed unauthorized <abbr title="Internet Protocol version 6">IPv6</abbr> packets within <abbr title="Internet Protocol version 4">IPv4</abbr> tunnels to evade or bypass network filtering controls. Additionally, threat actors may launch spoofing attacks utilizing tunnel injection techniques, i.e. where a threat actor forges a valid encapsulated packet (based on partial knowledge of the tunnel endpoints and the encapsulation protocol)<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup>.</p>

<h4 id="1.4.2">1.4.2 Distributed denial-of-service attacks</h4>

<p>Threat actors may utilize <abbr title="Internet Protocol version 6">IPv6</abbr> protocol capabilities such as multicast messages or extension headers to launch distributed denial-of-service (DDoS) attacks to overwhelm network defence systems. For example, a threat actor can use spoofed <abbr title="Internet Protocol version 6">IPv6</abbr> link-layer multicast messages to launch a denial-of-service attack on a target source address.</p>

<h4 id="1.4.3">1.4.3 Command and control</h4>

<p>Threat actors may leverage <abbr title="Internet Protocol version 6">IPv6</abbr> enhancements (extension headers or others) to embed and communicate control signals or beacons through a compromised network. Globally accessible and larger address space blocks make <abbr title="Internet Protocol version 6">IPv6</abbr> attractive for threat actors to deploy command and control channels.</p>

<h4 id="1.4.4">1.4.4 Network device misconfigurations</h4>

<p>Threat actors may exploit network device misconfigurations or inconsistencies when perimeter gateway access control filters are not properly implemented. Threat actors may exploit network devices which expose unconfigured <abbr title="Internet Protocol version 6">IPv6</abbr> interfaces by default to bypass network security controls.</p>

<h4 id="1.4.5">1.4.5 Network service discovery</h4>

<p><abbr title="Internet Protocol version 6">IPv6</abbr> multicast service discovery messages (e.g. multicast DNS (mDNS)<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup> or Link-Local Multicast Name Resolution (LLMNR)<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup>) can be spoofed or crafted to redirect endpoints to an attacker-controlled infrastructure. Also, threat actors may leverage <abbr title="Internet Protocol version 6">IPv6</abbr>’s default protocol capabilities (such as Neighbor Discovery) to support reconnaissance operations (for example, extracting sensitive network device information) which can then be used to target vulnerabilities.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h2 class="mrgn-tp-xl text-info" id="2">2 Security considerations</h2>

<p>The security model required for enterprise network architectures to support IPv6-enabled devices is different from traditional <abbr title="Internet Protocol version 4">IPv4</abbr> implementations. This section highlights cyber security considerations and recommended actions to mitigate risks associated with the use of <abbr title="Internet Protocol version 6">IPv6</abbr> within an enterprise network. <abbr title="Internet Protocol version 6">IPv6</abbr> transition plans must consider the impact on business services and the organization’s security posture.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.1">2.1 Migration risks</h3>

<p>Enabling <abbr title="Internet Protocol version 6">IPv6</abbr> alters an organization’s network communications and security monitoring requirements. Accordingly, a systematic approach considering transition plans, interoperability risks and future operational requirements is highly recommended. Organizations may have both <abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr> deployed over their transition period. As such, it is crucial to consider whether existing network security infrastructures can support <abbr title="Internet Protocol version 6">IPv6</abbr>. Management must ensure that <abbr title="Internet Protocol version 6">IPv6</abbr> transition plans adhere to change management processes. Security program policies and procedures at the organization level may require updates as necessary.</p>

<p>Management should identify the target objective, transition timelines, and migration paths. Security control policies that manage audit and monitoring, interconnection requirements, device identification and authentication, boundary protection, and managed interfaces may require updates. In general, the Cyber Centre recommends using the risk management framework detailed in <a href="https://www.cyber.gc.ca/en/guidance/it-security-risk-management-lifecycle-approach-itsg-33">IT security risk management: A lifecycle approach (ITSG-33)</a> to identify and manage related information system security risks.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.2">2.2 Procurement and testing</h3>

<p><abbr title="Internet Protocol version 6">IPv6</abbr> transition and implementation plans must be aligned with the organization’s procurement strategy. Procurement of assets with networking functions should be assessed for <abbr title="Internet Protocol version 6">IPv6</abbr> support. The National Institute of Standards and Technology (NIST) and the University of New Hampshire (UNH) InterOperability Laboratory have developed an assessment and testing program that can assist with functional evaluation of <abbr title="Internet Protocol version 6">IPv6</abbr> products. This program maintains a product registry of <abbr title="Internet Protocol version 6">IPv6</abbr> devices and applications that have been tested against the technical requirements of the United States Government <abbr title="Internet Protocol version 6">IPv6</abbr> standards profile (USGv6-r1 Profile)<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup> for performance and conformance. The Cyber Centre recommends that organizations consider products on the <abbr title="United States Government IPv6">USGv6</abbr> program registry as part of their procurement strategy. Organizations should review a product’s Supplier Declaration of Conformity (SDoC), which documents <abbr title="Internet Protocol version 6">IPv6</abbr> capability claims. Additionally, organizations should test the network infrastructure’s capability to support <abbr title="Internet Protocol version 6">IPv6</abbr>-only deployment scenarios.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.3">2.3 Target architecture</h3>

<p>The target architecture for the adoption of <abbr title="Internet Protocol version 6">IPv6</abbr> must fall within an acceptable level of residual risk (risk tolerance) for the organization. The Cyber Centre recommends a target architecture plan that ultimately leads to an <abbr title="Internet Protocol version 6">IPv6</abbr>-only network infrastructure end-state. While dual-stack architectures (<abbr title="Internet Protocol version 4">IPv4</abbr>/<abbr title="Internet Protocol version 6">IPv6</abbr>) might be an obvious transition choice, the Cyber Centre recommends designing the transition plan with the goal of an <abbr title="Internet Protocol version 6">IPv6</abbr>-only end-state architecture. A single-stack (<abbr title="Internet Protocol version 6">IPv6</abbr>-only) end-state architecture simplifies network management and security monitoring, as well as a reduction in the overall operational costs.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.4">2.4 Legacy applications</h3>

<p>Legacy applications may lack native support for <abbr title="Internet Protocol version 6">IPv6</abbr>, making them incapable of processing <abbr title="Internet Protocol version 6">IPv6</abbr> packet data. This can be particularly complicated with critical business applications with no mechanisms to support <abbr title="Internet Protocol version 6">IPv6</abbr>. When <abbr title="Internet Protocol version 6">IPv6</abbr> is enabled, legacy applications or security controls that rely on hard-coded <abbr title="Internet Protocol version 4">IPv4</abbr> addresses as hostnames may be impacted. If adequate traffic translation mechanisms are not implemented, <abbr title="Internet Protocol version 6">IPv6</abbr>-only endpoints may be prevented from connecting to services that are only <abbr title="Internet Protocol version 4">IPv4</abbr>-aware and vice-versa. The Cyber Centre recommends that organizations assess the impact of their transition plans on their software applications.</p>

<p>The <a href="https://datatracker.ietf.org/doc/html/rfc8305">Happy Eyeballs Version 2: Better Connectivity Using Concurrency algorithm</a><sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup> is an <abbr title="Internet Engineering Task Force">IETF</abbr>-proposed standard for managing how system applications can initiate and process asynchronous Domain Name System (DNS) queries on dual-stack hosts. The algorithm allows web applications to switch seamlessly between <abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr> networks. Network administrators should therefore test business applications for <abbr title="Internet Protocol version 6">IPv6</abbr>-based capabilities. While the Happy Eyeballs algorithm offers the benefit of managing switches between <abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr>, it may also mask network problems. Hence, successfully connecting to an application may not be an indication of a clean bill of health on the <abbr title="Internet Protocol version 4">IPv4</abbr> or <abbr title="Internet Protocol version 6">IPv6</abbr> networks in a dual-stack environment.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.5">2.5 Unauthorized tunnels</h3>

<p>Organizations should implement network security controls to detect and block the use of unauthorized <abbr title="Internet Protocol version 6">IPv6</abbr> transition tunnels. Transition tunnels are techniques used to transport <abbr title="Internet Protocol version 6">IPv6</abbr> packets over <abbr title="Internet Protocol version 4">IPv4</abbr> network infrastructure. <abbr title="Internet Protocol version 6">IPv6</abbr> tunnels can be manual or automatic tunnels, such as those provided by Teredo, 6to4<sup id="fn9-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup>, or Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)<sup id="fn10-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup>. Teredo is an automatic tunneling protocol designed by Microsoft, and it uses User Datagram Protocol (UDP) to tunnel <abbr title="Internet Protocol version 6">IPv6</abbr> packets over <abbr title="Internet Protocol version 4">IPv4</abbr> networks. The <abbr title="Internet Engineering Task Force">IETF</abbr> designed “6to4” to provide automatic <abbr title="Internet Protocol version 6">IPv6</abbr>-over-<abbr title="Internet Protocol version 4">IPv4</abbr> tunneling to interconnect <abbr title="Internet Protocol version 6">IPv6</abbr> networks, while ISATAP is used to transmit <abbr title="Internet Protocol version 6">IPv6</abbr> packets between dual-stack nodes on an <abbr title="Internet Protocol version 4">IPv4</abbr> network. While these techniques and protocols may offer benefits, particularly during the transition phase, transporting <abbr title="Internet Protocol version 6">IPv6</abbr> packets over <abbr title="Internet Protocol version 4">IPv4</abbr> infrastructure can have security implications. These tunneling applications can be used to bypass network filtering policies. Organizations should implement mechanisms to block the use of default, automatic tunnels on end-user and perimeter devices (firewalls and edge routers). The Cyber Centre recommends using tunnel-aware security solutions. On network edge devices such as firewalls, organizations should deny by default all <abbr title="User Datagram Protocol">UDP</abbr> outbound traffic and implement exceptions for authorized services only<sup id="fn11-rf"><a class="fn-lnk" href="#fn11"><span class="wb-inv">Footnote </span>11</a></sup>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.6">2.6 Default configurations</h3>

<p>Modern operating systems (OS) and network devices will most likely support <abbr title="Internet Protocol version 6">IPv6</abbr> and, due to the standard’s requirements, this may be enabled by default. In addition, critical system functions may also require <abbr title="Internet Protocol version 6">IPv6</abbr> to be enabled. For example, Microsoft does not recommend disabling <abbr title="Internet Protocol version 6">IPv6</abbr> support on Windows <abbr title="Operating System">OS</abbr> devices, even when not in use <span class="nowrap"><sup id="fn5a-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup></span>. To understand and assess related risks, organizations should proactively review the default status of <abbr title="Internet Protocol version 6">IPv6</abbr> on their devices. Stay aware of risks associated with default configurations and design monitoring and preventative controls to mitigate those risks. For example, the 6to4 tunneling protocol is enabled by default on Windows servers when an interface is assigned a public <abbr title="Internet Protocol version 4">IPv4</abbr> address. The tunnel assigns and dynamically registers an <abbr title="Internet Protocol version 6">IPv6</abbr> address on the network<span class="nowrap"><sup id="fn12-rf"><a class="fn-lnk" href="#fn12"><span class="wb-inv">Footnote </span>12</a></sup></span>. If not monitored, this exposes the network to considerable risks. Organizations should implement mechanisms to drop unauthorized <abbr title="Internet Protocol version 6">IPv6</abbr> traffic flows. To mitigate threats associated with <abbr title="Internet Protocol version 6">IPv6</abbr> traffic transiting the network undetected, the Cyber Centre recommends proactive host-based monitoring for <abbr title="Internet Protocol version 6">IPv6</abbr> network communications, even when the network interface is disabled. Detection of unauthorized network traffic should be investigated.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.7">2.7 Unauthorized Internet Protocol version 6 traffic flows</h3>

<p>Lack of visibility into <abbr title="Internet Protocol version 6">IPv6</abbr> traffic flows represents a considerable risk on the network. Organizations with no approved use for <abbr title="Internet Protocol version 6">IPv6</abbr> traffic should ensure <abbr title="Internet Protocol version 6">IPv6</abbr> traffic flows are filtered on network edge routers and firewalls according to their network policies. A network that has deployed <abbr title="Internet Protocol version 6">IPv6</abbr> should only allow <abbr title="Internet Protocol version 6">IPv6</abbr> traffic that is permitted by policy, with access control lists (ACL) allowing only authorized flows and protocols and blocking all others by default. When IPv6 is being deployed, depending on the business case, a threat and risk assessment (TRA) may be required to identify and mitigate associated risks. In some cases, it may be infeasible to fully disable IPv6 functionality even with no business use case. For example, Microsoft does not recommend disabling <abbr title="Internet Protocol version 6">IPv6</abbr> on Windows as some components require it to function properly. The Cyber Centre recommends a risk assessment to identify operational and security protections that could mitigate associated risks. In general, we recommend disabling <abbr title="Internet Protocol version 6">IPv6</abbr> except where there is an approved operational need for its use on the enterprise network <sup id="fn5b-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.8">2.8 Monitoring and management tools</h3>

<p>Network management and monitoring tools require substantial updates to manage and support <abbr title="Internet Protocol version 6">IPv6</abbr> network traffic. Network security monitoring and reporting tools, such as an intrusion detection and prevention system (IDPS), log aggregation (via a security information and event management (SIEM) system), vulnerability scanners, and patch management tools, must support <abbr title="Internet Protocol version 6">IPv6</abbr> protocols to ensure ongoing compliance with organizational security policies. The Cyber Centre recommends that organizations prioritize testing for different network monitoring scenarios (dual-stack and <abbr title="Internet Protocol version 6">IPv6</abbr>-only) as part of their <abbr title="Internet Protocol version 6">IPv6</abbr> transition strategy. In addition, tailored test cases should be developed to validate support for <abbr title="Internet Protocol version 6">IPv6</abbr> for software and business service development-related activities.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.9">2.9 Addressing scheme</h3>

<p>A robust <abbr title="Internet Protocol version 6">IPv6</abbr> addressing scheme increases the security of the network, while providing the flexibility to support business services and mitigate information leakage threats. Organizations should consider their network’s current state architecture as well as future needs when selecting an <abbr title="Internet Protocol version 6">IPv6</abbr> addressing plan. Considering the sophistication and interdependencies of modern networks and applications, an addressing plan which supports a phased and incremental approach to <abbr title="Internet Protocol version 6">IPv6</abbr> is recommended. An IP address management (IPAM) system is essential for effectively managing the addressing plan. Organizations should consider supported business applications and security policies when selecting an addressing scheme. The addressing plan can also be used to enhance an organization’s security posture, as a foundational means for separating networks, while enforcing the zero-trust principles of network segmentation and segregation. If considering Unique Local Addresses (ULAs), they must be generated following approved pseudorandom algorithms and should be filtered at the network boundaries and not exposed beyond the internal network. While <abbr title="Unique Local Addresses">ULA</abbr>s offer some benefits in <abbr title="Internet Protocol version 6">IPv6</abbr> deployments, we would not recommend their use in dual-stack environments. For <abbr title="Unique Local Addresses">ULA</abbr>s to be effective in dual-stack deployments, the address selection policy table precedence and label values may need to be updated on all devices on the network, introducing additional operational complexities and complicating network management and security processes.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.10">2.10 Multi-addressing support</h3>

<p>A single <abbr title="Internet Protocol version 6">IPv6</abbr> interface can hold multiple addresses<sup id="fn13-rf"><a class="fn-lnk" href="#fn13"><span class="wb-inv">Footnote </span>13</a></sup>. For example, an interface loopback address, a link local address, a unique local address, or a globally routable address. By default, a network interface with <abbr title="Internet Protocol version 6">IPv6</abbr> is assigned a link local address. Multiple addresses offer both security and operational benefits; however, this can make it difficult to enforce network monitoring and filtering policies, particularly if filtering policies are not robust enough. This represents an increased threat surface and may allow threat actors to evade network traffic detection rules. The Cyber Centre recommends that system administrators implement restrictions on unauthorized changes to <abbr title="Internet Protocol version 6">IPv6</abbr> addresses and ensure that monitoring controls are in place to prevent and detect changes. To mitigate the threat of malicious actors evading network security policies, implement deny-by-default policies to ensure traffic to and from an interface is blocked on network boundaries except for traffic that is explicitly allowed by the organization’s network security policies.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.11">2.11 Dynamic Host Configuration Protocol for Internet Protocol version 6</h3>

<p>Most enterprise networks rely on Dynamic Host Configuration Protocol (DHCP) for distributing <abbr title="Internet Protocol">IP</abbr> addressing information across the network. For <abbr title="Internet Protocol version 6">IPv6</abbr>, DHCP version 6 (DHCPv6)<sup id="fn14-rf"><a class="fn-lnk" href="#fn14"><span class="wb-inv">Footnote </span>14</a></sup> supports both stateless and stateful addressing for network devices. Like the traditional <abbr title="Dynamic Host Configuration Protocol">DHCP</abbr> protocol, <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr> is susceptible to a variety of attacks such as malicious intercept, spoofing, and <abbr title="Distributed Denial-of-Service">DDoS</abbr> attacks. For enterprise networks deploying <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr>, the Cyber Centre recommends protecting DHCP network messages by using <abbr title="Internet Protocol Security">IPsec</abbr> with encryption <sup id="fn6a-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup>. The Cyber Centre further recommends enabling authentication mechanisms between the <abbr title="Dynamic Host Configuration Protocol">DHCP</abbr> servers, relay hosts, and client endpoints. Organizations should also implement additional protections such as <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr> Guard<sup id="fn15-rf"><a class="fn-lnk" href="#fn15"><span class="wb-inv">Footnote </span>15</a></sup> to block malicious <abbr title="Dynamic Host Configuration Protocol">DHCP</abbr> reply and advertisement messages from unauthorized network devices. Organizations should consider <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr> failover<sup id="fn16-rf"><a class="fn-lnk" href="#fn16"><span class="wb-inv">Footnote </span>16</a></sup> capabilities to provide high-availability and protect against denial-of-service (DoS) attacks.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.12">2.12 Address autoconfiguration protections</h3>

<p>The <abbr title="Internet Protocol version 6">IPv6</abbr> protocol specification allows devices to self-assign network addresses (i.e., interface identifiers (IIDs)) using the Stateless Address Autoconfiguration (SLAAC) protocol. As outlined in <a href="https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-119.pdf">NIST SP 800-119 Guidelines for the secure deployment of IPv6 (PDF)</a>, <abbr title="Stateless Address Autoconfiguration">SLAAC</abbr> relies on network information received from the router and the device <abbr title="Media Access Control">MAC</abbr> address and can allow threat actors to track <abbr title="Internet Protocol version 6">IPv6</abbr> endpoints. The Cyber Centre recommends disabling the use of <abbr title="Stateless Address Autoconfiguration">SLAAC</abbr>, particularly if a public addressing model is implemented. However, if an approved use case exists for <abbr title="Stateless Address Autoconfiguration">SLAAC</abbr>, the Cyber Centre recommends enabling <abbr title="Stateless Address Autoconfiguration">SLAAC</abbr> privacy extensions (which generate temporary <abbr title="Internet Protocol version 6">IPv6</abbr> addresses) for external communications outside the enterprise network (for example, with the Internet or third-party networks). Enabling <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr> temporary addressing can also provide the same protections as <abbr title="Stateless Address Autoconfiguration">SLAAC</abbr> privacy extensions. Please note that certain endpoints may not support <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr>, such as devices running on the Android OS, and may require self-configured <abbr title="Stateless Address Autoconfiguration">SLAAC</abbr> addressing as their only autoconfiguration option. In those scenarios, organizations should enable <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr> Address Registration as a mechanism for <abbr title="Stateless Address Autoconfiguration">SLAAC</abbr> devices to inform the <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr> server<sup id="fn17-rf"><a class="fn-lnk" href="#fn17"><span class="wb-inv">Footnote </span>17</a></sup> of the address they self-generated. However, note that this may not provide visibility into auto-configured devices that don’t support address registration or maliciously choose not to inform the <abbr title="Dynamic Host Configuration Protocol version 6">DHCPv6</abbr> server. Organizations should implement network security controls to identify, manage and authorize network links with autoconfigured addresses.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.13">2.13 Dual-stack environments</h3>

<p>Dual stacking is a cost-attractive proposition for organizations, allowing the use of existing <abbr title="Internet Protocol version 4">IPv4</abbr> infrastructure alongside <abbr title="Internet Protocol version 6">IPv6</abbr>. However, the need to maintain the <abbr title="Internet Protocol version 4">IPv4</abbr> infrastructure while onboarding new <abbr title="Internet Protocol version 6">IPv6</abbr> networks can increase the management burden and the attack surface. Dual-stack networks pose additional security concerns due to the use of multiple <abbr title="Internet Protocol">IP</abbr> stacks, which increases the attack surface and requires additional security controls to mitigate associated risks. Dual-stacked host endpoints in particular present higher security challenges. Endpoint controls must have addressing controls for both <abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr> addressing schemes, which introduces additional complexity. The Cyber Centre recommends that organizations consider restricting host endpoints to single <abbr title="Internet Protocol">IP</abbr> stack solutions (<abbr title="Internet Protocol version 4">IPv4</abbr>-only or <abbr title="Internet Protocol version 6">IPv6</abbr>-only). Limiting dual-stack architectures to transition mechanisms, switches, routers, or network gateways will help reduce the attack surface. Organizations should ensure that network or application firewalls are aware of and capable of filtering both <abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr> network packets.</p>

<p>The <abbr title="Internet Protocol version 6">IPv6</abbr> specification standard establishes precedence rules which govern dual-stack interfaces. According to the <abbr title="Internet Engineering Task Force">IETF</abbr>’s request for comments (RFC) 6724 publication, <a href="https://www.rfc-editor.org/rfc/rfc6724">default address selection for Internet Protocol Version 6</a>, configured default policies may prioritize specific address groups over others, thereby leading to network operational complexities. This can have operational and security implications within dual-stack networks. Network and security administrators should be aware of address-selection precedence values deployed within their network environment. Administrators should also review and approve address-selection policies and ensure they are aligned with their network security objectives. Network security devices, including firewalls, edge routers, and gateways, should implement filtering policies to prevent unauthorized inbound or outbound <abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr> traffic.</p>

<p>In dual-stack <abbr title="Domain Name System">DNS</abbr> environments, A records (used to map domain names to <abbr title="Internet Protocol version 4">IPv4</abbr> addresses) and AAAA records (used to map domain names to <abbr title="Internet Protocol version 6">IPv6</abbr> addresses) are crucial for maintaining services. For Internet-exposed networks, the Cyber Centre recommends that organizations use separate <abbr title="Domain Name System">DNS</abbr> infrastructure for internal and external <abbr title="Internet Protocol version 4">IPv4</abbr> and <abbr title="Internet Protocol version 6">IPv6</abbr> networks (also known as split <abbr title="Domain Name System">DNS</abbr> architecture). This is to ensure the stability of system applications, increase security, and preserve the privacy of enterprise network data. For more information on split DNS architecture, read the <abbr title="National Security Agency">NSA</abbr>’s <a href="https://www.nsa.gov/press-room/news-highlights/article/article/3270451/nsa-publishes-internet-protocol-version-6-ipv6-security-guidance/">Internet Protocol Version 6 Security Guidance</a>.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.14">2.14 Protection of data and management planes</h3>

<p>Network administrative communications for <abbr title="Internet Protocol version 6">IPv6</abbr> environments should be protected against eavesdropping, sniffing, and similar threats. The Cyber Centre recommends separating the management plane from the data plane using mechanisms such as virtual local area network (VLAN) separation or firewall filtering. <abbr title="access control lists">ACL</abbr>s, Intrusion Prevention Systems (IPS), and layer-2 filtering should also be used to protect the network management plane devices. For higher sensitivity networks, physical and cryptographic separation is highly recommended, for example, separation of management and data planes. The Cyber Centre further recommends that organizations use <abbr title="Internet Protocol Security">IPsec</abbr> to protect <abbr title="Internet Protocol version 6">IPv6</abbr> communications. Only CSE-approved cryptographic algorithms should be used, as indicated in the Cyber Centre’s publication <a href="https://www.cyber.gc.ca/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111">Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information (ITSP.40.111)</a>. Control plane protocols for <abbr title="Internet Protocol version 6">IPv6</abbr> networks include <abbr title="Neighbor Discovery">ND</abbr>, <abbr title="Dynamic Host Configuration Protocol">DHCP</abbr>, Border Gateway Protocol (BGP), Network Time Protocol (NTP), and others. Organizations should consider implementing network filtering security controls. These controls will prevent control plane messages from inadvertently leaking information and disable or block unauthorized control plane protocols.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.15">2.15 Neighbor discovery messages</h3>

<p>Neighbor discovery (ND)<sup id="fn18-rf"><a class="fn-lnk" href="#fn18"><span class="wb-inv">Footnote </span>18</a></sup> in the <abbr title="Internet Protocol version 6">IPv6</abbr> specification is similar to the Address Resolution Protocol (ARP) used by <abbr title="Internet Protocol version 4">IPv4</abbr>. <abbr title="Neighbor Discovery">ND</abbr> is used to manage crucial <abbr title="Internet Protocol version 6">IPv6</abbr> capabilities such as address autoconfiguration, address resolution, duplicate address detection and others. However, the <abbr title="Neighbor Discovery">ND</abbr> protocol is susceptible to several attacks<sup id="fn19-rf"><a class="fn-lnk" href="#fn19"><span class="wb-inv">Footnote </span>19</a></sup> and can also be used by threat actors to perform address spoofing or poisoning attacks. The Cyber Centre recommends implementing network products which support cryptographic protections for <abbr title="Neighbor Discovery">ND</abbr> such as Secure Neighbor Discovery (SEND)<sup>Q</sup>. Cryptographic signatures generated through <abbr title="Secure Neighbor Discovery">SEND</abbr> are used to validate and verify <abbr title="Neighbor Discovery">ND</abbr> messages, protecting against address spoofing attacks. Enabling <abbr title="Internet Protocol Security">IPsec</abbr> can help secure <abbr title="Neighbor Discovery">ND</abbr> messages. It is also advisable to filter <abbr title="Neighbor Discovery">ND</abbr> messages (i.e., Internet Control Message Protocol version 6 (ICMPv6)) on external network boundary gateways except those required for <abbr title="Internet Protocol version 6">IPv6</abbr> network connectivity. Please refer to RFC 4890<sup id="fn20-rf"><a class="fn-lnk" href="#fn20"><span class="wb-inv">Footnote </span>20</a></sup> for guidance on filtering <abbr title="Internet Control Message Protocol version 6">ICMPv6</abbr> messages in firewalls.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.16">2.16 Address translation risks</h3>

<p>Address translation and tunneling of <abbr title="Internet Protocol version 4">IPv4</abbr> over <abbr title="Internet Protocol version 6">IPv6</abbr> and vice versa can introduce additional risk concerns. Translation devices can be a single point of failure and therefore high-availability and redundancy protections should be included as part of their architecture whenever they are deployed. Translation interfaces also force the termination of security mechanisms such as IPsec and Domain Name System Security Extensions (DNSSEC).</p>

<p>Network Address Translation-Protocol Translation (NAT-PT)<sup id="fn21-rf"><a class="fn-lnk" href="#fn21"><span class="wb-inv">Footnote </span>21</a></sup> is a common translation mechanism that allows <abbr title="Internet Protocol version 4">IPv4</abbr>-only devices to communicate with <abbr title="Internet Protocol version 6">IPv6</abbr>-only devices. The Cyber Centre does not recommend using NAT-PT to communicate between <abbr title="Internet Protocol version 6">IPv6</abbr>-only networks via an <abbr title="Internet Protocol version 4">IPv4</abbr> backbone or vice versa because of availability and end-to-end security concerns. Organizations can consider NAT64 (Stateful<sup id="fn22-rf"><a class="fn-lnk" href="#fn22"><span class="wb-inv">Footnote </span>22</a></sup> Network Address Translation for <abbr title="Internet Protocol version 6">IPv6</abbr>-only clients to reach <abbr title="Internet Protocol version 4">IPv4</abbr> servers) alongside DNS64 (a mechanism for synthesizing <abbr title="Domain Name System">DNS</abbr> AAAA records from A records)<sup id="fn23-rf"><a class="fn-lnk" href="#fn23"><span class="wb-inv">Footnote </span>23</a></sup> or 464XLAT (combination of stateful<sup>T</sup> and stateless<sup id="fn24-rf"><a class="fn-lnk" href="#fn24"><span class="wb-inv">Footnote </span>24</a></sup> translation for <abbr title="Internet Protocol version 4">IPv4</abbr> connectivity across <abbr title="Internet Protocol version 6">IPv6</abbr>-only networks.)<sup id="fn25-rf"><a class="fn-lnk" href="#fn25"><span class="wb-inv">Footnote </span>25</a></sup></p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.17">2.17 Zero trust architecture</h3>

<p>Zero trust architecture (ZTA) is built on the foundational security principle of eliminating implicit trusts within the enterprise network. Zero trust assumes no inherent trust for resources and thus requires each resource (application, device, user, and network interface) to be uniquely identified, authenticated, and authorized.</p>

<p>The <abbr title="Internet Protocol version 6">IPv6</abbr> standard provides foundational capabilities for the implementation of zero trust. These capabilities include an expanded address space, multiple addresses per interface, and IPsec header extensions for source authentication, data integrity and data confidentiality.</p>

<p>A multiple addressing strategy can be used to identify devices, interfaces or applications on the network, providing foundational support for micro-segmentation. This makes micro-segmentation easier, allowing traffic flows to be managed through fine-grain network access control lists.</p>

<p>Additionally, organizations can leverage <abbr title="Internet Protocol version 6">IPv6</abbr> extension headers by enabling IPsec to achieve secure end-to-end <abbr title="Internet Protocol">IP</abbr> communications. Enabling IPsec provides interface authentication and end-to-end confidentiality and integrity protections for data and control messages on the network.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h3 class="mrgn-tp-xl" id="2.18">2.18 Technical and operational depth</h3>

<p>The lack of technical understanding and operational expertise in <abbr title="Internet Protocol version 6">IPv6</abbr> represents a significant challenge for many organizations. Few network engineers possess detailed knowledge of the <abbr title="Internet Protocol version 6">IPv6</abbr> specification standards. To build the technical competencies required for the future, organizations should invest in training networking and security professionals on <abbr title="Internet Protocol version 6">IPv6</abbr> and its capabilities. Organizations should also develop expertise by exploring <abbr title="Internet Protocol version 6">IPv6</abbr> capabilities within dedicated network labs and/or limited pilot deployments. Organizations are encouraged to strengthen technical competencies and capabilities required to ensure network performance, address network design and operational issues, and architect security requirements.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h2 class="text-info mrgn-tp-xl" id="3">3 Conclusion</h2>

<p>The challenges associated with limited <abbr title="Internet Protocol version 4">IPv4</abbr> addresses are likely to increase. <abbr title="Internet Protocol version 6">IPv6</abbr> is designed to address these issues and offer additional security benefits. Modern networking stacks prioritize <abbr title="Internet Protocol version 6">IPv6</abbr>, conforming with the <abbr title="Internet Engineering Task Force">IETF</abbr> specification standard, and organizational network enterprise strategies must be updated to manage associated risks. Traditional security controls that were built around <abbr title="Internet Protocol version 4">IPv4</abbr> addressing, such as monitoring capabilities for example, will require updates and re-alignment. The Cyber Centre strongly recommends that GC organizations undertake proactive and informed actions to securely design and scope their <abbr title="Internet Protocol version 4">IPv4</abbr> to <abbr title="Internet Protocol version 6">IPv6</abbr> transition plans in line with Cyber Centre recommendations.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><!--***************************************** END PUBLICATION ***********************************************--><!--***************************************** REFERENCES ***************************************************--><!--FOOTNOTE SECTION EN--><aside class="wb-fnote" role="note"><h3 class="mrgn-tp-xl" id="reference">Reference</h3>

<dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p><a href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-ipv6-in-windows">Guidance for configuring IPv6 in Windows for advanced users</a></p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc8504">IPv6 Node Requirements</a></p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p><a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026">National Cyber Threat Assessment 2025-2026</a></p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p><a href="https://www.rfc-editor.org/rfc/rfc9099.html">RFC 9099: Operational Security Considerations for IPv6 Networks</a></p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc6762">Multicast DNS</a></p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p><a href="https://www.rfc-editor.org/rfc/rfc4795.html">Link-Local Multicast Name Resolution (LLMNR)</a></p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p><a href="https://www.nist.gov/programs-projects/usgv6-program/usgv6-revision-1">United States Government (USGv6-r1) Profile</a></p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 8</dt>
	<dd id="fn8">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc8305">Happy Eyeballs Version 2: Better Connectivity Using Concurrency</a></p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote</span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 9</dt>
	<dd id="fn9">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc6343">RFC 6343 Advisory Guidelines for 6to4 Deployment</a></p>

	<p class="fn-rtn"><a href="#fn9-rf"><span class="wb-inv">Return to footnote</span>9<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 10</dt>
	<dd id="fn10">
	<p><a href="https://en.wikipedia.org/wiki/ISATAP">Wikipedia: RFC 5214 Intra-site Automatic Tunnel Addressing Protocol (ISATAP)</a></p>

	<p class="fn-rtn"><a href="#fn10-rf"><span class="wb-inv">Return to footnote</span>10<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 11</dt>
	<dd id="fn11">
	<p><a href="https://www.rfc-editor.org/rfc/rfc9099.html">RFC 9099: Operational Security Considerations for IPv6 Networks</a></p>

	<p class="fn-rtn"><a href="#fn11-rf"><span class="wb-inv">Return to footnote</span>11<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 12</dt>
	<dd id="fn12">
	<p><a href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-ipv6-in-windows">Guidance for configuring IPv6 in Windows for advanced users</a></p>

	<p class="fn-rtn"><a href="#fn12-rf"><span class="wb-inv">Return to footnote</span>12<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 13</dt>
	<dd id="fn13">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc7934.txt">RFC 7934 Host Address Availability Recommendations</a></p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>13<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 14</dt>
	<dd id="fn14">
	<p><a href="https://www.rfc-editor.org/rfc/rfc8415">RFC 8415: Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</a></p>

	<p class="fn-rtn"><a href="#fn14-rf"><span class="wb-inv">Return to footnote</span>14<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 15</dt>
	<dd id="fn15">
	<p><a href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/15-sy/dhcp-15-sy-book/ip6-dhcpv6-guard.pdf">Cisco: DHCP – DHCPv6 Guard</a></p>

	<p class="fn-rtn"><a href="#fn15-rf"><span class="wb-inv">Return to footnote</span>15<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 16</dt>
	<dd id="fn16">
	<p><a href="https://www.rfc-editor.org/rfc/rfc8156">RFC 8156: DHCPv6 Failover Protocol</a></p>

	<p class="fn-rtn"><a href="#fn16-rf"><span class="wb-inv">Return to footnote</span>16<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 17</dt>
	<dd id="fn17">
	<p><a href="https://datatracker.ietf.org/doc/rfc9686/">Registering Self-Generated IPv6 Addresses Using DHCPv6</a></p>

	<p class="fn-rtn"><a href="#fn17-rf"><span class="wb-inv">Return to footnote</span>17<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 18</dt>
	<dd id="fn18">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc4861">RFC 4861 Neighbor Discovery for IP version 6 (IPv6)</a></p>

	<p class="fn-rtn"><a href="#fn18-rf"><span class="wb-inv">Return to footnote</span>18<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 19</dt>
	<dd id="fn19">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc3971">RFC 3971 SEcure Neighbor Discovery (SEND)</a></p>

	<p class="fn-rtn"><a href="#fn19-rf"><span class="wb-inv">Return to footnote</span>19<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 20</dt>
	<dd id="fn20">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc4890">RFC 4890 Recommendations for Filtering ICMPv6 Messages in Firewalls</a></p>

	<p class="fn-rtn"><a href="#fn20-rf"><span class="wb-inv">Return to footnote</span>20<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 21</dt>
	<dd id="fn21">
	<p><a href="https://datatracker.ietf.org/doc/rfc4966/">RFC 4966 Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status</a></p>

	<p class="fn-rtn"><a href="#fn21-rf"><span class="wb-inv">Return to footnote</span>21<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 22</dt>
	<dd id="fn22">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc6146">RFC 6146 Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</a></p>

	<p class="fn-rtn"><a href="#fn22-rf"><span class="wb-inv">Return to footnote</span>22<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 23</dt>
	<dd id="fn23">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc6147">DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</a></p>

	<p class="fn-rtn"><a href="#fn23-rf"><span class="wb-inv">Return to footnote</span>23<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 24</dt>
	<dd id="fn24">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc7915">RFC 7915 Stateless IP/ICMP Translation Algorithm</a></p>

	<p class="fn-rtn"><a href="#fn24-rf"><span class="wb-inv">Return to footnote</span>24<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 25</dt>
	<dd id="fn25">
	<p><a href="https://datatracker.ietf.org/doc/html/rfc6877">464XLAT: Combination of Stateful and Stateless Translation</a></p>

	<p class="fn-rtn"><a href="#fn25-rf"><span class="wb-inv">Return to footnote</span>25<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/joint-guidance-creating-maintaining-definitive-view-your-operational-technology-architecture</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/joint-guidance-creating-maintaining-definitive-view-your-operational-technology-architecture"/><title><![CDATA[Joint guidance on creating and maintaining a definitive view of your operational technology architecture]]></title><updated>2025-09-29T12:06:35Z</updated><summary><![CDATA[This joint guidance has been developed with contributions from partnering agencies and is part of a series of publications aiming to draw attention to the importance of cyber security in operational technology.]]></summary><content><![CDATA[<article data-history-node-id="6832" about="/en/news-events/joint-guidance-creating-maintaining-definitive-view-your-operational-technology-architecture" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre) has joined the United Kingdom’s National Cyber Security Centre (NCSC-UK) and the following international partners in releasing guidance on creating and maintaining a definitive view of operational technology (OT) architecture:</p>

<ul><li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li>
	<li>Germany’s Federal Office for Information Security (BSI)</li>
	<li>Netherlands’ National Cyber Security Centre (NCSC-NL)</li>
	<li>New Zealand’s National Cyber Security Centre (NCSC-NZ)</li>
	<li>United States’ Cybersecurity and Infrastructure Security Agency (CISA)</li>
	<li>United States’ Federal Bureau of Investigation (FBI)</li>
</ul><p>This joint guidance defines a principles-based approach that <abbr title="Operational Technology">OT</abbr> organizations can use to build, maintain and store their system’s understanding. It is intended for cyber security professionals working in <abbr title="Operational Technology">OT</abbr> organizations across greenfield and brownfield deployments and includes the following principles:</p>

<ul><li>Principle 1: Defining processes for establishing and maintaining the definitive record</li>
	<li>Principle 2: Establishing an <abbr title="Operational Technology">OT</abbr> information security management program</li>
	<li>Principle 3: Identifying and categorizing assets to support informed risk-based decisions</li>
	<li>Principle 4: Identifying and documenting connectivity within your <abbr title="Operational Technology">OT</abbr> system</li>
	<li>Principle 5: Understanding and documenting third-party risks to your <abbr title="Operational Technology">OT</abbr> system</li>
</ul><p>Cyber security professionals can use these principles as a framework to develop a comprehensive record of their systems.</p>

<p>This joint guidance has been developed with contributions from partnering agencies and is part of a series of publications aiming to draw attention to the importance of cyber security in operational technology.</p>

<p>Read the full joint publication: <a href="https://www.ncsc.gov.uk/collection/operational-technology/definitive-architecture-view ">Creating and maintaining a definitive view of your operational technology (OT) architecture</a></p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/statement-canadian-centre-cyber-security-malware-targeting-global-organizations-through-cisco-systems</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/statement-canadian-centre-cyber-security-malware-targeting-global-organizations-through-cisco-systems"/><title><![CDATA[Statement from the Canadian Centre for Cyber Security on malware targeting global organizations through Cisco Systems]]></title><updated>2025-09-25T16:04:29Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6835" about="/en/news-events/statement-canadian-centre-cyber-security-malware-targeting-global-organizations-through-cisco-systems" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Canadian Centre for Cyber Security (Cyber Centre), a part of the Communications Security Establishment Canada (CSE), is urging Canadian organizations to take immediate action to protect themselves in response to a serious new cyber security threat identified today by Cisco: <a href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks">Cisco Event Response: Continued Attacks Against Cisco Firewalls</a>. This threat affects end-of-life Cisco <abbr title="Adaptive Security Appliance">ASA</abbr> devices.</p>

<p>Timing is crucial when vulnerabilities like these are identified. We strongly recommend network defenders bolster their defences based on our latest alert and advisory, and apply appropriate patches immediately.</p>

<ul><li>Read the Cyber Centre's alert on this threat: <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="0594ba8c-7337-46bf-b42f-e2761f463f06" href="/en/alerts-advisories/al25-012-vulnerabilities-impacting-cisco-asa-ftd-devices-cve-2025-20333-cve-2025-20362-cve-2025-20363">AL25-012 - Vulnerabilities impacting Cisco ASA and FTD devices – CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363</a></li>
	<li>Read the Cyber Center's advisory on this threat: <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="cd17a5c1-7289-4cfd-b5eb-d434993b77d2" href="/en/alerts-advisories/cisco-security-advisory-av25-619">Cisco security advisory (AV25-619)</a></li>
</ul><p>This threat activity uses advanced techniques to avoid detection, making it difficult to identify through conventional means. If you believe your organization may be affected, please call us <a href="tel:+18332923788">1-833-CYBER-88</a> or email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> as soon as possible.</p>

<h2>Quotes</h2>

<blockquote>
<p>"This is a critical moment for Canadian organizations. Threat actors are targeting legacy systems with increasing sophistication. I urge all critical infrastructure sectors to act swiftly. The Cyber Centre stands ready to assist. Early action is the best defence to protect your systems and safeguard your information."</p>

<p>- Rajiv Gupta, Head of the Canadian Centre for Cyber Security</p>
</blockquote>

<h2>Background</h2>

<p>The Cyber Centre is aware of cyber threat activity against Cisco <abbr title="Adaptive Security Appliance">ASA</abbr> 5500-X Series devices involving the deployment of highly sophisticated malware, targeting global organizations. These types of devices are commonly used by organizations across Canada.</p>

<p>Expert teams at the Cyber Centre are actively investigating the vulnerability’s scope and have initiated outreach to support stakeholders and coordinate a unified response.</p>

<p>Together, through vigilance and collective action, we can continue to strengthen Canada’s cyber resilience from coast to coast to coast.</p>

<p>For more information on vulnerabilities, please visit the Cyber Centre’s <a href="/en/alerts-advisories">Alerts and advisories page</a>.</p>

<p>For best practices, please visit the Cyber Centre’s <a href="/en/guidance">Guidance page</a>.</p>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/recommended-contract-clauses-cryptography-itsm00501</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/recommended-contract-clauses-cryptography-itsm00501"/><title><![CDATA[Recommended Contract Clauses for Cryptography (ITSM.00.501)]]></title><updated>2025-09-22T19:38:33Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6705" about="/en/guidance/recommended-contract-clauses-cryptography-itsm00501" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>September 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Management series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSM.00.501</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>September 2025 | Management series</strong></p>
</div>

<div class="col-md-12 mrgn-tp-lg">
<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 col-xs-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/itsm.00.501-recommended-contract-clauses-cryptography.pdf">Recommended Contract Clauses for Cryptography – ITSM.00.501 (PDF, 462 KB)</a></p>
</div>

<h2 class="text-info mrgn-tp-0">Foreword</h2>

<p>This is an <span class="text-uppercase">unclassfied</span>, publication, issued under the authority of the Head of the Canadian Centre for Cyber Security (Cyber Centre). For more information, contact the Cyber Centre:</p>

<p><span class="glyphicon glyphicon-envelope"></span><span class="wb-inv">email</span> <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a> |<span class="glyphicon glyphicon-phone"></span><span class="wb-inv">Mobile</span> <a href="tel:613-949-7048">613-949-7048</a> or <a href="tel:+1-833-292-3788">1<span>‑</span>833<span>‑</span>CYBER<span>‑</span>88</a></p>

<h2 class="text-info">Effective date</h2>

<p>This publication takes effect on September 2025.</p>

<h2 class="text-info">Revision history</h2>

<ol><li>First release: September 1, 2025</li>
</ol></div>
</div>

<section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#overview">Overview</a></li>
	<li><a href="#introduction">1 Introduction</a>
	<ul><li><a href="#scope">1.1 Scope</a></li>
	</ul></li>
	<li><a href="#cryptographic-considerations">2 Cryptographic considerations</a>
	<ul><li><a href="#product">2.1 Product considerations</a>
		<ul><li><a href="#recommended">2.1.1 Recommended cryptographic algorithms</a></li>
			<li><a href="#cryptographic-agility">2.1.2 Cryptographic agility</a></li>
			<li><a href="#certification">2.1.3 Cryptographic certification</a></li>
		</ul></li>
	</ul><ul><li><a href="#considerations">2.2 Considerations for service providers and cloud services</a>

		<ul><li><a href="#post-quantum">2.2.1 Post-quantum cryptography</a></li>
			<li><a href="#configuration">2.2.2 Configuration</a></li>
			<li><a href="#validated">2.2.3 Using validated cryptographic modules and algorithms</a></li>
		</ul></li>
	</ul></li>
	<li><a href="#terms">3 Terms and conditions</a></li>
	<li><a href="#conclusion">4 Conclusion</a></li>
</ul></details></section><section><h2 class="text-info" id="overview">Overview</h2>

<p>As your organization increases the use of cryptography to protect your infrastructure and data, there is a growing need to ensure that your organization purchases products and services that provide effective protection. Whether procuring a single-use product or contracting with a service provider such as a cloud service provider (CSP), your organization must consider certain elements to ensure that the product or service will meet your needs. This publication provides advice and guidance on what to consider when procuring products and services that use cryptography, including example clauses.</p>
</section><section><h2 class="text-info" id="introduction">1 Introduction</h2>

<p>The guidance in this publication highlights important security considerations for your organization when purchasing products and services that use cryptography. This includes but is not limited to service providers and cloud service providers (CSPs).</p>

<p>While vendors may present initial foundational terms and conditions, your organization’s management team is responsible for demonstrating and validating that the terms and conditions and the contract’s supporting security clauses address your organization’s business security needs.</p>

<p>The terms and conditions should be adaptable for future modifications to safeguard the interests of your organization. The terms and conditions in the service contract should also provide your organization with the best possible business outcomes. Your organization must initiate proactive measures to ensure service provisions include cyber security mechanisms for identifying, communicating, mitigating and preventing risks.</p>

<p>This publication outlines cryptographic considerations that should be factored in alongside the primary functional and legal contracting aspects when working with a vendor.</p>

<p>The clauses outlined in this publication should not be considered legal advice. Rather, they offer context for your organization and can help your organization determine considerations and questions to ask when procuring cryptographic products and services.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div>
<h2 class="text-info" id="scope">1.1 Scope</h2>

<p>The Cyber Centre provides advice and guidance on selecting and using cryptographic algorithms to protect the authenticity, confidentiality and integrity of sensitive information. This publication provides advice and guidance on what to consider when engaging with a vendor to purchase products or services that use cryptography for the protection of <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span> and <span class="text-uppercase">protected B</span> information.</p>

<p><strong>Disclaimer:</strong> The Communications Security Establishment Canada (CSE) and its Cyber Centre do not recommend or endorse the use of any particular contracting clause listed in this publication. The example clauses provided are only intended to be a source of examples of contract clauses that may be useful for procuring products and service that use cryptography and are provided for informational purposes only. We recommend seeking legal and procurement advice when using these clauses to ensure that they meet your organization’s requirements.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
</section><section><h2 class="text-info" id="cryptographic-considerations">2 Cryptographic considerations</h2>

<p>To protect the confidentiality, integrity and authenticity of your organization’s data, you must ensure that all infrastructure effectively uses strong cryptography for both on-premises environments and service provider environments. This includes cloud environments.</p>

<p>The following sections present items that should be considered when engaging with vendors. The considerations discuss cryptographic algorithms, modules and parameters to support organizations in following Cyber Centre guidance.</p>

<p><a href="#product">Section 2.1 Product considerations</a> outlines considerations to be taken when purchasing products and focuses on the requirements of the products being purchased. <a href="#considerations">Section 2.2 Considerations for service providers and cloud services</a> provides advice and guidance for engaging with service and cloud providers and focuses on how the vendor selects, configures and uses cryptography.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div>
<h3 id="product">2.1 Product considerations</h3>

<p>This section provides product considerations and example contract clauses to use when purchasing products that support cryptography. The clauses have been developed for products that have built-in cryptographic modules, such as virtual private networks (VPN) and other network appliances that support cryptography natively. These considerations can also be used to develop requirements for generic computing devices that will have software installed after purchase (for example, servers).</p>

<p><strong>Note:</strong> The Cyber Centre publication <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="8ca102c3-b06e-4fe3-89b1-65f2a6866bd3" href="/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111">Cryptographic algorithms for <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span>, and <span class="text-uppercase">protected B</span> information (ITSP.40.111)</a> is updated regularly as advice and guidance changes. Any clauses that are used to procure products and that reference ITSP.40.111 should specify the publication version.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
<!-- Sub-sub section start -->

<div>
<h4 id="recommended">2.1.1 Recommended cryptographic algorithms</h4>

<p>Contractual clauses should ensure that cryptographic modules use algorithms recommended in ITSP.40.111 that meet your system requirements. Additionally, to avoid extra costs during the migration to post-quantum cryptography (PQC), we recommend that all newly procured cryptographic modules support appropriate PQC algorithms.</p>

<p>The following clauses recognize that some vendors do not currently support PQC and that some standards that will use the algorithms may still be under development. By specifying a date by which the vendor must provide PQC capabilities, your organization can purchase from the vendor when needed without waiting for the vendor to have PQC capable products. The vendor will be required to provide upgrades to the cryptographic modules on or before the date specified.</p>

<p><strong>Example clause structure and language</strong></p>

<ul><li>Cryptographic modules must use only CSE-approved cryptographic algorithms with cryptographic parameter sizes and key lengths as specified in <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="8ca102c3-b06e-4fe3-89b1-65f2a6866bd3" href="/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111">Cryptographic algorithms for <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span>, and <span class="text-uppercase">protected B</span> information (ITSP.40.111)</a>.</li>
	<li>By the end of 2026, cryptographic modules implementing key establishment schemes must support appropriate post-quantum cryptography compliant with Cryptographic algorithms for <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span>, and <span class="text-uppercase">protected B</span> information (ITSP.40.111).</li>
	<li>By the end of 2026, cryptographic modules implementing digital signature schemes must support appropriate post-quantum cryptography compliant with Cryptographic algorithms for <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span>, and <span class="text-uppercase">protected B</span> information (ITSP.40.111).</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>

<div>
<h4 id="cryptographic-agility">2.1.2 Cryptographic agility</h4>

<p>Using systems that support cryptographic agility enables organizations to reconfigure or upgrade cryptographic technologies as needed. This is important because progress in cryptographic research, vulnerability research and computing can lead to cryptographic deployments with less strength than when they were initially deployed. Products should have the capability to modify parameters, such as key lengths, parameter sizes and key lifetimes, and to select cryptographic algorithms without replacing software or hardware components. This will reduce both the expense and time needed for purchasing new infrastructure. Products must also have the critical ability to securely patch systems that use cryptography to ensure that vulnerabilities are mitigated as they are discovered.</p>

<p>For more information on cryptographic agility, read our publication <a href="https://www.cyber.gc.ca/en/guidance/guidance-becoming-cryptographically-agile-itsap40018">Guidance on becoming cryptographically agile (ITSAP.40.018)</a>.</p>

<p><strong>Example clause structure and language</strong></p>

<ul><li>Cryptographic modules must support cryptographic agility by providing cryptographic algorithms, parameter sizes, key lengths and crypto periods that are configurable.</li>
	<li>Cryptographic modules must support vendor-signed patches and updates.</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>

<div>
<h4 id="certification">2.1.3 Cryptographic certification</h4>

<p>We recommend that all cryptographic modules be validated through the <a href="https://www.cyber.gc.ca/en/tools-services/cryptographic-module-validation-program-cmvp">Cryptographic Module Validation Program (CMVP)</a>. The CMVP is jointly managed by the Cyber Centre and the National Institute of Standards and Technology (NIST). It ensures that vendors implement cryptography correctly in their products and that they follow Cyber Centre–recommended security best practices. To find validated modules, organizations can search the database of CMVP-validated modules, which is hosted by NIST. Cryptographic algorithms used in the modules should be validated by the <a href="https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program">Cryptographic Algorithm Validation Program (CAVP)</a>.</p>

<p>CMVP certification is specific to the details provided in the security policy available on the product certificate webpage. It is important that products use the cryptographic module according to that security policy. This ensures with a high degree of certainty that the module will provide the expected security services in the expected manner.</p>

<p><strong>Example clause structure and language</strong></p>

<ul><li>Cryptographic algorithms must be validated by the Cryptographic Algorithm Validation Program (CAVP) with a certificate listed on the <a href="https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation-search">CAVP validation list</a>.</li>
	<li>Cryptographic modules must be validated by the Cryptographic Module Validation Program (CMVP) with an active CMVP certification and a certificate number listed on the <a href="https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules">CMVP-validated modules list</a>.</li>
	<li>Cryptographic modules must be applied in accordance with the cryptographic module security policy listed on the CMVP-validated modules list, in either an approved or an allowed mode.</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
</div>

<div>
<h3 id="considerations">2.2 Considerations for service providers and cloud services</h3>

<p>Organizations that outsource IT infrastructure or software solution management to cloud vendors or service providers must consider the cryptography used to protect the information. This section provides additional cryptographic considerations when contracting a service or cloud provider.</p>

<p>Your organization should ensure that contracting requirements obligate the contractor to maintain IT systems that are aligned with current cryptographic guidance. In addition to this publication, the Cyber Centre publication <a href="https://www.cyber.gc.ca/en/guidance/recommended-cyber-security-contract-clauses-cloud-services-itsm50104">Recommended cyber security contract clauses for cloud services (ITSM.50.104)</a> provides general procurement clauses and considerations when acquiring cloud-based solutions or services.</p>

<p><strong>Note:</strong> We recommend that contracts with service providers ensure contractors remain current with the latest versions of ITSP.40.111 and our <a href="https://www.cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062">Guidance on securely configuring network protocols (ITSP.40.062)</a>. As such, clauses that reference either ITSP.40.111 or ITSP.40.062 should not reference a specific version or publication date and should require contractors to remain aligned with current Cyber Centre recommendations.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div>
<h4 id="post-quantum">2.2.1 Post-quantum cryptography</h4>

<p>We recommend that all cryptographic modules support CSE-approved PQC algorithms as soon as they are available. The following clauses allow organizations to procure from service providers as needed, with the understanding that the cryptographic modules must be migrated to support PQC no later than the date specified. This approach provides flexibility to both the purchaser and the vendor while ensuring that the PQC migration is not delayed or more costly than necessary.</p>

<p><strong>Example clause structure and language</strong></p>

<ul><li>By the end of 2026, cryptographic modules implementing key establishment schemes must support appropriate post-quantum cryptography compliant with <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="8ca102c3-b06e-4fe3-89b1-65f2a6866bd3" href="/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111">Cryptographic algorithms for <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span>, and <span class="text-uppercase">protected B</span> information (ITSP.40.111</a><a href="https://www.cyber.gc.ca/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111">)</a>.</li>
	<li>By the end of 2026, cryptographic modules implementing digital signature schemes must support appropriate post-quantum cryptography compliant with Cryptographic algorithms for <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span>, and <span class="text-uppercase">protected B</span> information (ITSP.40.111).</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>

<div>
<h4 id="configuration">2.2.2 Configuration</h4>

<p>Cryptography should be configured to operate according to the advice and guidance provided in the Cyber Centre’s publications ITSP.40.111 and ITSP.40.062. Following the most recent versions of these publications will help to keep your environment secure as cryptographic guidance evolves. Additionally, we recommend that cryptography is configured and operated in an approved or allowed mode found in the CMVP security policy.</p>

<p><strong>Example clause structure and language</strong></p>

<p>The Contractor must:</p>

<ul><li>configure systems to only permit use of cryptography in accordance with CSE-approved cryptographic algorithms and cryptographic parameter sizes, key lengths and key lifetimes, as specified in <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="8ca102c3-b06e-4fe3-89b1-65f2a6866bd3" href="/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111">Cryptographic algorithms for <span class="text-uppercase">unclassified</span>, <span class="text-uppercase">protected A</span>, and <span class="text-uppercase">protected B</span> information (ITSP.40.111)</a> and <a href="https://www.cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062">Guidance on securely configuring network protocols (ITSP.40.062)</a></li>
	<li>ensure these policies remain consistent with any subsequent published versions</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>

<div>
<h4 id="validated">2.2.3 Using validated cryptographic modules and algorithms</h4>

<p>Similar to <a href="#certification">Section 2.1.3 Cryptographic certification</a> on procuring products, we recommend that only algorithms and modules that have been validated by CAVP and CMVP be used in cloud and service provider environments, respectively.</p>

<p><strong>Example clause structure and language</strong></p>

<ul><li>Cryptographic algorithms permitted to operate must be validated by the Cryptographic Algorithm Validation Program (CAVP) with a certificate listed on the <a href="https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation-search">CAVP validation list</a>.</li>
	<li>Cryptographic modules must be validated by the Cryptographic Module Validation Program (CMVP) with an active CMVP certification and a certificate number listed on the <a href="https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules">CMVP-validated modules list</a>.</li>
	<li>Cryptographic modules must be applied and operated in accordance with the cryptographic module security policy listed on the CMVP-validated modules list, in either an approved or an allowed mode.</li>
</ul><div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</div>
</div>
</section><section><h2 class="text-info" id="terms">3 Terms and conditions</h2>

<p>A vendor or contractor may already have terms and conditions they use when selling their products and services. Many of the clauses recommended in this publication may be covered using different contractual language (for example, referencing NIST publications rather than Cyber Centre publications).</p>

<p>In these situations, we recommend that organizations carefully compare the recommended clauses with the ones presented by the vendor, as well as any documents that the vendor references. This will help to ensure that the product or service that your organization purchases will meet your cryptographic requirements. As with all situations, when dealing with legally binding contracts, we recommend seeking legal advice.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section><section><h2 class="text-info" id="conclusion">4 Conclusion</h2>

<p>Cryptography provides an important means to protect your organization’s IT environments, whether in the cloud or managed on premises. However, it is important to ensure that the cryptographic products that these systems use to protect your data are sufficiently strong and secure. Using products that meet the Cyber Centre’s recommendations on cryptography, including validations by CAVP and CMVP, will help provide effective data confidentiality and integrity.</p>

<p>This guidance has been provided for general knowledge and guidance for any organization purchasing cryptographic products or using them in their environments. As indicated, this is not legal advice.</p>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
</section></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/news-events/threat-detection-sharepoint-vulnerabilities</id><link rel="alternate" href="https://cyber.gc.ca/en/news-events/threat-detection-sharepoint-vulnerabilities"/><title><![CDATA[Threat detection for SharePoint vulnerabilities]]></title><updated>2025-09-05T14:11:58Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6744" about="/en/news-events/threat-detection-sharepoint-vulnerabilities" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-12">
<p>The Canadian Centre for Cyber Security (Cyber Centre) is <strong>actively tracking multiple campaigns exploiting recently disclosed critical vulnerabilities in on-premises Microsoft SharePoint servers</strong>, including CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771. These widespread campaigns leverage an exploit chain known as <strong>ToolShell</strong>.</p>

<p>To help defenders combat attacks leveraging these vulnerabilities, the Cyber Centre has compiled a detailed analysis derived from recent investigations. This analysis outlines the <strong>full attack path</strong>, examines the <strong>evolution and use of the ToolShell exploit chain</strong>, and provides an <strong>in-depth characterization of the threat actor’s techniques</strong>, along with critical mitigation and detection guidance.</p>
</div>
</div>

<section><details class="mrgn-tp-md"><summary><h2 class="h3">Table of contents</h2>
</summary><ul class="list-unstyled"><li><a href="#summary">Executive summary</a></li>
	<li><a href="#overview">An incident overview</a></li>
	<li><a href="#analysis">Analysis of the incident</a></li>
	<li><a href="#indicators">Indicators of compromise and recommendations</a></li>
	<li><a href="#tools-services">Cyber Centre tools and services</a></li>
	<li><a href="#acknowledgements">Acknowledgements</a></li>
</ul></details></section><section><h2 class="text-info" id="summary">Executive summary</h2>

<p>This technical article aims to raise awareness and describe some of the tactics, techniques, and procedures (TTPs) associated with a threat actor seen exploiting the vulnerabilities in on-premises Microsoft SharePoint servers. The Canadian Centre for Cyber Security’s (Cyber Centre) preliminary findings highlight that this threat actor initially exploited a server then used a novel technique with custom .NET payloads to gain and maintain code execution. Subsequent analysis of dozens of custom in-memory payloads provided valuable insight into the extent of the compromise and the threat actor’s intentions and activities.</p>
</section><section><h2 class="text-info" id="overview">An incident overview</h2>

<p>The events in the timeline below highlight the type of post-exploitation behaviour observed by the Cyber Centre. This incident demonstrates how even well-prepared teams can be affected by issues outside of their control: although the victims in this use case upheld strong security practices and took appropriate precautions, they were impacted by an unforeseeable software defect.</p>
<!-- Figure 1 -->

<section class="panel panel-default col-md-12"><div class="panel-body">
<h3 class="text-center h5" id="fig1"><strong>Figure 1: Timeline of events associated with SharePoint vulnerabilities</strong></h3>

<figure><img alt="Figure 1 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig1-e.png" /></figure><details><summary>Long description - Timeline of events associated with SharePoint vulnerabilities</summary><ul class="list-unstyled"><li><strong>Day -12:</strong> Initial access using SharePoint CVE, script execution and data exfiltration (until Day -8)</li>
	<li><strong>Day -8:</strong> SMB lateral movement and lateral movement to IIS servers</li>
	<li><strong>Day -10:</strong> SMB lateral movement (until Day -2), lateral movement to IIS servers (until Day -2), script executions (until Day -1), and data exfiltration (until Day -1)</li>
	<li><strong>Day 0:</strong> CVEs published (CVE-2025-53770 and CVE-2025-53771)</li>
	<li><strong>Day 2:</strong> Patches released</li>
	<li><strong>Day 9:</strong> Last known actor activity on network</li>
</ul></details></div>
</section><p>The Cyber Centre confirmed that activities exploiting the SharePoint vulnerabilities were observed as early as Day -12, consistent with the following recent reports:</p>

<ul><li><a href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/">Disrupting active exploitation of on-premises SharePoint vulnerabilities (Microsoft)</a></li>
	<li><a href="https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/">Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Palo Alto’s Unit42)</a></li>
</ul><p>However, a key indicator of compromise (IoC) shared by Microsoft in its July 19 <a href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/">customer guidance for SharePoint vulnerability CVE-2025-53770</a>—the presence of a file called spinstall0.aspx—was not found during the incident in question. This demonstrates that the threat actor initially exploited the server and then used a novel technique with custom .NET payloads to gain and maintain code execution. Therefore, the spinstall0.aspx file (or variations on it) was not observed as part of the attack path, nor was a PowerShell process spawned by Internet Information Services (IIS).</p>

<p>Having established an initial foothold in the network, the threat actor moved to an additional server to perform reconnaissance, solidify their access and establish persistence through discovery and lateral movement. To achieve this, they uploaded several different custom .NET payloads directly into the IIS process memory over a period of several hours. These payloads included:</p>

<ul><li>a module to intercept requests for legitimate files on the web server based on certain criteria</li>
	<li>a module to extract cryptographic configuration values to facilitate subsequent exploitation on the web server</li>
	<li>a module to read and exfiltrate the host’s Security Account Manager (SAM) password database for offline cracking</li>
	<li>a Server Message Block (SMB) client to perform reconnaissance on the network</li>
	<li>a filesystem crawler</li>
	<li>a Lightweight Directory Access Protocol (LDAP) querying tool</li>
</ul><p>These payloads were frequently combined with a privilege escalation exploit and an encryption module.</p>
<!-- Figure 2 -->

<section class="panel panel-default col-md-8 col-md-offset-1"><div class="panel-body">
<h3 class="text-center h5" id="fig2"><strong>Figure 2: Attack path depicting how the threat actor gained access and moved through the environment</strong></h3>

<figure><img alt="Figure 2 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig2-e.png" /></figure><details><summary>Long description - Attack path depicting how the threat actor gained access and moved through the environment</summary><p>The image illustrates an attack flow starting with an external threat actor exploiting a SharePoint server in the DMZ (Step 1). From the SharePoint server, the attacker collects information and performs privilege escalation (Step 2). The attacker performs account discovery from the domain controller (Step 3). The attacker moves laterally to an IIS server (Step 4). The attacker shows interest in the internal exchange server (Step 5). The attacker moves laterally into the internal network (Step 6).</p>
</details></div>
</section><div class="clearfix"> </div>

<p>The threat actor used Hypertext Transfer Protocol Secure (HTTPS) externally to access compromised servers and exfiltrate data. They used SMB internally to perform reconnaissance and stage a new web shell on a separate IIS web server that was not running SharePoint. The threat actor leveraged compromised network devices to obfuscate their true origin and access the victims’ network from unpredictable IP addresses. This allowed them to blend in with normal traffic and reduced the usefulness of IP-based IoCs for tracking and discovery.</p>

<p>From both beachheads, the threat actor proceeded to connect to multiple devices on the internal network and scrape the domain controller and LDAP servers for information.</p>

<p>The last known activity on the network by the threat actor occurred on Day 9, with some subsequent reconnaissance activity touching cloud resources using previously compromised credentials. As of this writing, we continue to observe persistent malicious efforts to access both on-prem and cloud infrastructure using these credentials, which have since been rotated.</p>
</section><div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>
<!-- Section: Analysis of the incident -->

<section><h2 class="text-info" id="analysis">Analysis of the incident</h2>

<section class="alert alert-info"><p><strong>Disclaimer:</strong> Comments in source code were added as part of reverse-engineering efforts and are not present in the original samples.</p>
</section><p>The Cyber Centre analyzed host and network activity by leveraging telemetry from its sensors. The victims also provided snapshots in time of firewall and Hypertext Transfer Protocol (HTTP) access logs, which were crucial in tracing the compromise back to its very beginning. Ultimately, it was the analysis of dozens of custom in-memory payloads that provided the full story.</p>

<p>These payloads consisted of dynamic-link libraries (DLL) loaded into memory over a period of several weeks. The Cyber Centre extracted these payloads from running processes on compromised hosts after the common vulnerabilities and exposures (CVEs) were made public and reverse engineered. This provided valuable insight into the extent of the SharePoint compromise and the threat actor’s intent and activities.</p>

<h3>MITRE ATT&amp;CK techniques observed during analysis</h3>

<p>The information below is based on the attack path outlined in <a href="#fig2">figure 2</a>.</p>

<h4 class="text-info">Observation 1</h4>

<ul><li>Main techniques
	<ul><li>Exploit public-facing application (<a href="https://attack.mitre.org/techniques/T1190/">T1190</a>)</li>
		<li>Server software component: web shell (<a href="https://attack.mitre.org/techniques/T1505/003/">T1505.003</a>)</li>
	</ul></li>
	<li>Additional techniques
	<ul><li>Exfiltration over alternative protocol: exfiltration over symmetric encrypted non-C2 protocol (<a href="https://attack.mitre.org/techniques/T1048/001/">T1048.001</a>)</li>
		<li>Compromise infrastructure: network devices (<a href="https://attack.mitre.org/techniques/T1584/008/">T1584.008</a>)</li>
	</ul></li>
</ul><h4 class="text-info">Observation 2</h4>

<ul><li>Main techniques
	<ul><li>System information discovery (<a href="https://attack.mitre.org/techniques/T1082/">T1082</a>)</li>
		<li>Exploitation for privilege escalation (<a href="https://attack.mitre.org/techniques/T1068/">T1068</a>)</li>
		<li>OS credential dumping: security account manager (<a href="https://attack.mitre.org/techniques/T1003/002/">T1003.002</a>)</li>
	</ul></li>
	<li>Additional techniques
	<ul><li>Data from local system (<a href="https://attack.mitre.org/techniques/T1005/">T1005</a>)</li>
		<li>Unsecured credentials: credentials in files (<a href="https://attack.mitre.org/techniques/T1552/001/">T1552.001</a>)</li>
	</ul></li>
</ul><h4 class="text-info">Observation 3</h4>

<ul><li>Main techniques
	<ul><li>Account discovery: local account (<a href="https://attack.mitre.org/techniques/T1087/001/">T1087.001</a>)</li>
	</ul></li>
	<li>Additional techniques
	<ul><li>Account discovery: domain account (<a href="https://attack.mitre.org/techniques/T1087/002/">T1087.002</a>)</li>
	</ul></li>
</ul><h4 class="text-info">Observation 4</h4>

<ul><li>Main techniques
	<ul><li>Remote services: SMB/Windows admin shares (<a href="https://attack.mitre.org/techniques/T1021/002/">T1021.002</a>)</li>
		<li>Server software component: web shell (<a href="https://attack.mitre.org/techniques/T1505/003/">T1505.003</a>)</li>
	</ul></li>
	<li>Additional techniques
	<ul><li>Exfiltration over alternative protocol: exfiltration over symmetric encrypted non-C2 protocol (<a href="https://attack.mitre.org/techniques/T1048/001/">T1048.001</a>)</li>
		<li>Compromise infrastructure: network devices (<a href="https://attack.mitre.org/techniques/T1584/008/">T1584.008</a>)</li>
	</ul></li>
</ul><h4 class="text-info">Observation 5</h4>

<ul><li>Main techniques
	<ul><li>Email collection (<a href="https://attack.mitre.org/techniques/T1114/">T1114</a>)</li>
	</ul></li>
</ul><h4 class="text-info">Observation 6</h4>

<ul><li>Main techniques
	<ul><li>Remote services: SMB/Windows admin shares (<a href="https://attack.mitre.org/techniques/T1021/002/">T1021.002</a>)</li>
	</ul></li>
	<li>Additional techniques
	<ul><li>Valid accounts: domain accounts (<a href="https://attack.mitre.org/techniques/T1078/002/">T1078.002</a>)</li>
		<li>Remote services: remote desktop protocol (<a href="https://attack.mitre.org/techniques/T1021/001/">T1021.001</a>)</li>
	</ul></li>
</ul><p>Further analysis revealed that:</p>

<ul><li>the initial exploitation dated back to Day -12, almost 2 weeks earlier than the CVEs’ public disclosure on July 19</li>
	<li>a significant number of malicious activities followed the preliminary compromise, leveraging more than 50 distinct payloads over a period of several weeks</li>
	<li>the threat actor had a keen interest in acquiring and exfiltrating documents on accessible file shares and used SMB protocol to access them</li>
	<li>many payloads were dynamically generated and contained hard-coded values such as server names and paths; some of these included occasional typos, which were fixed in subsequent uploads. These dynamically generated payloads limited the usefulness of hash-based IoCs</li>
</ul><div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!--Observed technique 1 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 1: Initial access (TA0001)</h4>

<p><strong>Observed technique:</strong> <span class="label label-info">Exploit public-facing application (<a href="https://attack.mitre.org/techniques/T1190/">T1190</a>)</span></p>

<p>The threat actor leveraged vulnerabilities to gain remote code execution (RCE) on an Internet-exposed SharePoint server (<a href="https://attack.mitre.org/techniques/T1190/">T1190</a>). Initial access occurred on Day -12, 2 weeks before the public disclosure of vulnerabilities, and was achieved through the exploitation of CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771, an exploit chain also known as ToolShell. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-53770 to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a> on July 20, followed by CVE-2025-49704 and CVE-2025-49706 on July 22.</p>
</div>
</div>
<!--Observed technique 2 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 2: Persistence (TA0003)</h4>

<p><strong>Observed technique:</strong> <span class="label label-info">Server software component: web shell (<a href="https://attack.mitre.org/techniques/T1505/003/">T1505.003</a>)</span></p>

<p>The threat actor implemented custom-developed code designed to intercept and manipulate web server requests to legitimate files for tailored processing (<a href="https://attack.mitre.org/techniques/T1505/003/">T1505.003</a>). This code allowed interactions that facilitated the collection of internal system and network information and enabled the exfiltration of sensitive data from the compromised environment. Meanwhile, the chosen endpoint to stage subsequent activity allowed the threat actor to blend their traffic with normal application traffic. In the figure below, ows.js is a legitimate SharePoint file that the threat actor chose to use in an attempt to blend in and should not be considered an IoC.</p>
<!-- Figure 3 coding -->

<h5 class="text-center" id="fig3"><strong>Figure 3: Sample of web shell request handler</strong></h5>

<figure><img alt="Figure 3 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig3-e.png" /></figure><details><summary>Long description - Sample of web shell request handler</summary><p>The image contains a snippet of C# code that defines a method named OnPostAuthenticateRequestCurrent, which acts as a custom HTTP request handler. The method intercepts requests to a specific SharePoint JavaScript file (/_layouts/15/ows.js) and processes a custom header (WWW-Authorization) to potentially execute encrypted commands on the server. The code includes a conditional check to ensure the request is a GET method and that the WWW-Authorization header exists and has a length of at least 5 characters.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!--Observed technique 3 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 3: Credential access (TA0006)</h4>

<p><strong>Observed techniques:</strong> <span class="label label-info">OS credential dumping: security account manager (<a href="https://attack.mitre.org/techniques/T1003/002/">T1003.002</a>); Unsecured credentials: credentials in files (<a href="https://attack.mitre.org/techniques/T1552/001/">T1552.001</a>)</span></p>

<p>The threat actor deployed custom code to gather credentials from the operating system (<a href="https://attack.mitre.org/techniques/T1003/002/">T1003.002</a>) and secure access to sensitive information located in configuration files available on the web server (<a href="https://attack.mitre.org/techniques/T1552/001/">T1552.001</a>). Validation and decryption keys for the server were obtained early on, which allowed for subsequent forging of ViewState requests. As per Microsoft guidance, once the keys are compromised, patching alone is not sufficient; attackers can continue to achieve code execution through ViewState deserialization until the keys themselves are rotated and the server is restarted.</p>
<!-- Figure 4 coding -->

<h5 class="text-center" id="fig4"><strong>Figure 4: Sample of exfiltration of cryptographic configuration settings</strong></h5>

<figure><img alt="Figure 4 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig4-e.png" /></figure><details><summary>Long description - Sample of exfiltration of cryptographic configuration settings</summary><p>The image shows a C# code snippet that dynamically loads the System.Web assembly and uses reflection to access the MachineKeySection class. It retrieves sensitive configuration details such as validation and decryption keys, as well as compatibility mode, and concatenates them into a string. This information is then added to the HTTP response header under the key "X-TXT-NET," potentially exposing critical security data.</p>
</details><div class="clearfix"> </div>

<p>The threat actor had also gathered 4 files from the compromised server within a few days of the initial breach (listed in order of occurrence):</p>

<ul><li>C:\Windows\System32\config\SAM</li>
	<li>C:\Windows\System32\config\SYSTEM</li>
	<li>C:\Windows\System32\config\SECURITY</li>
	<li>C:\Windows\System32\inetsrv\Config\applicationHost.config</li>
</ul><p>This code snippet includes a privilege escalation exploit and a New Technology File System (NTFS) parsing library (NTFSLib) to bypass file locking by leveraging raw disk access. Access to the 4 system resources listed above allows for offline cracking of credentials.</p>
<!-- Figure 5 -->

<h5 class="text-center" id="fig5"><strong>Figure 5: Code snippet used to collect the SYSTEM hive from disk</strong></h5>

<figure><img alt="Figure 5 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig5-e.png" /></figure><details><summary>Long description - Code snippet used to collect the SYSTEM hive from disk</summary><p>The image shows a C# code snippet that processes an HTTP request if its content length is not zero. It decodes a Base64-encoded string, splits it into an array using directory separator characters, and extracts a file path. The code then interacts with a custom NTFSWrapper class to access raw disk data and retrieve the parent directory entry of the specified path, potentially indicating malicious or unauthorized file system access.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!--Observed technique 4 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 4: Discovery (TA0007)</h4>

<p><strong>Observed techniques:</strong> <span class="label label-info">Account discovery: local account (<a href="https://attack.mitre.org/techniques/T1087/001/">T1087.001</a>); Account discovery: domain account (<a href="https://attack.mitre.org/techniques/T1087/002/">T1087.002</a>)</span></p>

<p>Over a 2-week period, the domain controller hosting the LDAP service was queried by the threat actor 19 times to collect information on users, service accounts, groups, administrators and user mailboxes.</p>
<!-- Figure 6 -->

<h5 class="text-center" id="fig6"><strong>Figure 6: Sample of LDAP scraping</strong></h5>

<figure><img alt="Figure 6 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig6-e.png" /></figure><details><summary>Long description - Sample of LDAP scraping</summary><p>The image shows a C# code snippet that performs an LDAP query on a specified domain to search for directory entries matching a given filter. The results are serialized into JSON format, encrypted using AES with predefined keys, and then encoded in Base64 before being written to the HTTP response. This code appears to facilitate unauthorized access or exfiltration of directory information.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!--Observed technique 5 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 5: Collection (TA0009)</h4>

<p><strong>Observed techniques:</strong> <span class="label label-info">Data from local system (<a href="https://attack.mitre.org/techniques/T1005/">T1005</a>); Email collection (<a href="https://attack.mitre.org/techniques/T1114/">T1114</a>)</span></p>

<p>The threat actor leveraged their access to gather information related to the local system (<a href="https://attack.mitre.org/techniques/T1005/">T1005</a>) and unsuccessfully attempted to pivot to the internal mail server (<a href="https://attack.mitre.org/techniques/T1114/">T1114</a>). The following data collection techniques targeted the filesystem and local storage.</p>
<!-- Figure 7 -->

<h5 class="text-center" id="fig7"><strong>Figure 7: Sample of file collection from the local system</strong></h5>

<figure><img alt="Figure 7 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig7-e.png" /></figure><details><summary>Long description - Sample of file collection from the local system</summary><p>The image shows a C# code snippet that appears to enumerate directories and files within a specified path (C:\\users\\) and collects metadata such as last write time, creation time, and file size. The gathered information is processed into a string, encrypted using AES with predefined keys, and potentially sent as part of an HTTP response. This code suggests functionality for unauthorized data collection and exfiltration.</p>
</details><div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<p>Of note, the actor attempted to pivot to an internal webmail server proxied through the compromised SharePoint server.</p>
<!-- Figure 8 -->

<h5 class="text-center" id="fig8"><strong>Figure 8: Sample of email collection</strong></h5>

<figure><img alt="Figure 8 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig8-e.png" /></figure><details><summary>Long description - Sample of email collection</summary><p>The image shows a C# code snippet configuring an HttpClient to send an HTTP POST request to a specified URL with custom headers and form-encoded data, including placeholders for sensitive credentials (REDACTED_USERNAME and REDACTED_PASSWORD). It sets the security protocol to support SSL3 and TLS12, bypasses SSL certificate validation, and includes a user-agent string mimicking a browser.</p>
</details></div>
</div>

<div class="clearfix"> </div>
<!--Observed technique 6 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 6: Privilege escalation (TA0004)</h4>

<p><strong>Observed technique:</strong> <span class="label label-info">Exploitation for privilege escalation (<a href="https://attack.mitre.org/techniques/T1068/">T1068</a>)</span></p>

<p>The threat actor leveraged open-source tools to escalate their privileges and gain access to files and data beyond the reach of the initial compromise (<a href="https://attack.mitre.org/techniques/T1068/">T1068</a>). Artifacts of the <strong>PrintNotifyPotato</strong> privilege escalation tool were observed in several payloads. These allowed the threat actor access to otherwise restricted files. This technique was leveraged in multiple samples, with portions of code and strings directly matching the GitHub project source code.</p>
<!-- Figure 9 -->

<h5 class="text-center" id="fig9"><strong>Figure 9: Sample of PrintNotifyPotato privilege escalation</strong></h5>

<figure><img alt="Figure 9 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig9-e.png" /></figure><details><summary>Long description - Sample of PrintNotifyPotato privilege escalation</summary><p>The image shows a C# code snippet that performs token duplication and thread impersonation using native methods to elevate privileges. It duplicates a SYSTEM token, impersonates it on the current thread, and calls a function (F()) that appears to access sensitive data, such as the Security Account Manager (SAM) file. The code includes error handling and writes diagnostic messages to the HTTP response, indicating potential misuse for privilege escalation and data exfiltration.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!--Observed technique 7 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 7: Lateral movement (TA0008)</h4>

<p><strong>Observed techniques:</strong> <span class="label label-info">Remote services: SMB/Windows admin shares (<a href="https://attack.mitre.org/techniques/T1021/002/">T1021.002</a>); Remote services: remote desktop protocol (<a href="https://attack.mitre.org/techniques/T1021/001/">T1021.001</a>)</span></p>

<p>The threat actor performed reconnaissance and moved laterally in the environment by leveraging SMB connectivity (<a href="https://attack.mitre.org/techniques/T1021/002/">T1021.002</a>). Interestingly, they leveraged both a custom SMB client loaded inside a .NET module as well as the system’s own SMB client while they were active on the network. In addition, unsuccessful attempts to perform Remote Desktop Protocol (RDP) connections further into the network were observed from compromised servers.</p>
<!-- Figure 10 -->

<h5 class="text-center" id="fig10"><strong>Figure 10: Sample of SMB client</strong></h5>

<figure><img alt="Figure 10 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig10-e.png" /></figure><details><summary>Long description - Sample of SMB client</summary><p>The image shows a C# code snippet that processes HTTP input to extract user credentials (user, address, and password) and attempts to establish an SMB connection using these details. If the connection succeeds, it serializes and encodes the list of shared resources; otherwise, it encodes a "connection failed" message. The SMB client instance is stored in the application context, suggesting potential misuse for unauthorized access or credential harvesting.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h4>SMB commands implemented by the sample</h4>

<p>In the sample above, we observed the following SMB commands and associated behaviours:</p>

<ul><li><strong>cn:</strong> establishes an SMB connection using a username, password, and IP address specified in the request. It saves the SMB connection to HttpApplication.Application["817FE0AC534D44E49"]</li>
	<li><strong>li:</strong> lists files in the connected SMB resource</li>
	<li><strong>re:</strong> reads a file from the connected SMB resource</li>
	<li><strong>we:</strong> writes, appends or creates a file on the connected SMB resource</li>
	<li><strong>de:</strong> deletes a file on the connected SMB resource</li>
	<li><strong>di:</strong> disconnects and cleans up the SMB client</li>
</ul><p>The use of a bespoke SMB client inside .NET payloads enabled further detection opportunities by looking for outgoing connections over port 445 from the IIS server process, as opposed to the normal pattern of SMB connections originating from the Windows kernel.</p>
<!--Observed technique 8 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 8: Persistence (TA0003)</h4>

<p><strong>Observed technique:</strong> <span class="label label-info">Server software component: web shell (<a href="https://attack.mitre.org/techniques/T1505/003/">T1505.003</a>)</span></p>

<p>After gaining a foothold in the network, the threat actor pivoted to an additional Internet-exposed IIS server (not SharePoint) within a matter of days, using the lateral movement techniques previously mentioned. This helped them establish a back-up persistent access point into the network (<a href="https://attack.mitre.org/techniques/T1505/003/">T1505.003</a>), solidifying their presence, after which they remained dormant for almost 2 weeks.</p>

<p>The compromise of a non-SharePoint server emphasizes the need to look beyond initial <abbr and="" procedures="" techniques="" title="tactics,">TTPs</abbr> for signs of lateral movement once an initial compromise is detected.</p>

<p>The threat actor returned briefly on Day 9 by leveraging the above-mentioned access. However, because of the Cyber Centre’s improved understanding of the actor’s <abbr and="" procedures="" techniques="" title="tactics,">TTPs</abbr>, alongside newly deployed capabilities, this new activity was quickly detected and stopped.</p>
<!-- Figure 11 -->

<h5 class="text-center" id="fig11"><strong>Figure 11: Sample of additional web shell path</strong></h5>

<figure><img alt="Figure 11 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig11-v2-e.png" /></figure><details><summary>Long description - Sample of additional web shell path</summary><p>The image shows a C# code snippet implementing an HTTP request handler that intercepts POST requests to a specific SharePoint path (/_layouts/15/start.aspx). It processes a Base64-encoded __EVENTVALIDATION parameter, decrypts it using DES, and parses the resulting data to handle specific modes, such as "Get." The code includes functionality for compressing and encoding data, suggesting potential misuse for unauthorized data manipulation or exfiltration.</p>
</details></div>
</div>

<div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!--Observed technique 9 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 9: Resource development (TA0042)</h4>

<p><strong>Observed technique:</strong> <span class="label label-info">Compromise infrastructure: network devices (<a href="https://attack.mitre.org/techniques/T1584/008/">T1584.008</a>)</span></p>

<p>Indicators suggest that exploitation and exfiltration activities originated from several compromised network devices, including some with close geographical proximity to the target network. For example, the IP address used for the initial exploitation was not the same one subsequently used for ongoing collection and access development. This flexible choice of source IPs allowed the threat actor to blend in with normal traffic and reduced the usefulness of typical IP-based IoCs for tracking, discovery and blocking.</p>
</div>
</div>
<!--Observed technique 10 -->

<div class="panel panel-default">
<div class="panel-body">
<h4 class="mrgn-tp-sm">Observed tactic 10: Exfiltration (TA0010)</h4>

<p><strong>Observed technique:</strong> <span class="label label-info">Exfiltration over alternative protocol: exfiltration over symmetric encrypted non-C2 protocol (<a href="https://attack.mitre.org/techniques/T1048/001/">T1048.001</a>)</span></p>

<p>The Cyber Centre observed several obfuscation techniques in use during the exfiltration phase related to executing payloads embedded in web server requests. The most commonly observed technique was encrypting the result using a symmetric key (<a href="https://attack.mitre.org/techniques/T1048/001/">T1048.001</a>), encoding that result using Base64, and then returning the Base64-encoded buffer as part of the HTTP response from the web server. This encryption is encapsulated inside the regular Transport Layer Security (TLS) connections observed on normal port 443 traffic for the application.</p>
</div>
</div>
</section><div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!-- Indicators of compromise and recommendations -->

<section><h2 class="text-info" id="indicators">Indicators of compromise and recommendations</h2>

<p>IoCs were distributed via the Cyber Centre’s automated threat intelligence sharing platform (AVENTAIL) and through alerts and communications by the Canadian Cyber Security Incident Response Team (CSIRT). This ensured that partners across all sectors had the information they needed to act decisively.</p>

<p>For up-to-date information on alerts, advisories and guidance relating to the SharePoint vulnerabilities, please refer to the Cyber Centre alert <a href="https://www.cyber.gc.ca/en/alerts-advisories/al25-009-vulnerability-impacting-microsoft-sharepoint-server-cve-2025-53770">Vulnerability Impacting Microsoft SharePoint Server (CVE-2025-53770)</a>.</p>
</section><!-- Cyber Centre tools and services --><section><h2 class="text-info" id="tools-services">Cyber Centre tools and services</h2>

<p>No single tool, service or turnkey solution can reconstruct an incident, trace an attacker’s path or validate a threat on its own. A holistic approach using multiple perspectives is required to conduct a thorough investigation. As such, the Cyber Centre relies on multiple layered telemetry sources to detect threats and protect monitored assets.</p>

<p>Active scanning tools helped identify Internet-exposed high-priority servers. <a href="https://www.cyber.gc.ca/en/tools-services/assemblyline">AssemblyLine</a> was used to enable triage at scale, processing hundreds of thousands of files per day. The Cyber Centre made enhancements to its <a href="https://github.com/cybercentrecanada/assemblyline-service-dotnet-decompiler">DotnetDecompiler Service</a> to automate the decompilation of .NET executables. This is now available in the Cyber Centre’s open-source repository, allowing the broader cyber security community the benefit of the same advanced capabilities.</p>

<p>In response to this incident, the Cyber Centre also created YARA rules to help with the detection of malicious files related to the threat actor’s activity. Additional YARA rules will be released periodically after an evaluation period to ensure accuracy.</p>

<p>The sample YARA rule below implements a detection for the LDAP scraping activity found in payloads extracted from the compromised server.</p>
<!-- Figure 12 -->

<section class="panel panel-default col-md-12"><div class="panel-body">
<h3 class="text-center" id="fig12"><strong>Figure 12: YARA rule for LDAP data collection detection</strong></h3>

<figure><img alt="Figure 12 - Long description immediately follows" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/cyber-threat-detection-sharepoint-vulnerabilities-fig12-e.png" /></figure><details><summary>Long description - YARA rule for LDAP data collection detection</summary><p>The image shows a YARA rule named WIN_LDAPQuery designed to detect DLL files performing LDAP queries. It includes metadata such as the rule's purpose, category, and reference to a SharePoint vulnerability advisory. The rule identifies suspicious behaviour by matching specific strings related to LDAP operations, encryption, and token handling, combined with conditions targeting file size and string occurrences.</p>

<pre class="prettyprint">
<span class="wb-inv">Code</span>
rule win_ldapquery
{
    meta:
        id = "1vOyulv5H6pIcnCKCQJxyB"
        fingerprint = "69d05a0633335c9c8c739d33e2af3b9f4be01369d4ccefb83e55d2fe094b0a87"
        version = "1.0"
        modified = "2025-08-27"
        status = "RELEASED"
        sharing = "TLP:CLEAR"
        source = "CCCS"
        author = "reveng@CCCS"
        description = "Detect a DLL that is performing a LDAP query."
        category = "MALWARE"
        malware = "ldapquery"
        malware_type = "INFOSTEALER"
        malware_type = "HACKTOOL"
        report = "TA25-0056"
        report = "TA25-0057"
        reference = "https://www.cyber.gc.ca/en/alerts-advisories/al25-009-vulnerability-impacting-microsoft-sharepoint-server-cve-2025-53770"

    strings:
        // Detection of classes and function names (latest version).
        $a1 = "LDir" ascii
        $a2 = "Explore" ascii
        $a3 = "Internals" ascii
        $a4 = "EncryptAes" ascii
        $a5 = "DecryptAes" ascii
        $a6 = "Set Token Error" wide
        $a7 = "AdsDateValue" ascii
        $a8 = "FindHandle" ascii

        // Detection of function names (oldest version).
        $x1 = "JavaScriptSerializer" ascii
        $x2 = "Serialize" ascii
        $x3 = "EncryptAes" ascii
        $x4 = "DecryptAes" ascii
        $x5 = "DirectorySearcher" ascii

        // Product and assembly version.
        $b1 = "0.0.0.0" wide

        // Guid for Internet Explorer (IE) COM object and strings for writing the HTTP response.
        $c1 = "9068270B-0939-11D1-8BE1-00C04FD8D503" ascii
        $c2 = "HttpResponse" ascii
        $c3 = "HttpContext" ascii
        $c4 = "ToBase64String" ascii
        $c5 = "GZipStream" ascii
        $c6 = "CreateEncryptor" ascii

        // Dynamic libraries with extern functions for security token escalation.
        $d1 = "advapi32.dll" ascii
        $d2 = "ntdll.dll" ascii
        $d3 = "kernel32.dll" ascii
        $d4 = "NtQuerySystemInformation" ascii
        $d5 = "OpenProcessToken" ascii
        $d6 = "GetTokenInformation" ascii
        $d7 = "SetThreadToken" ascii
        $d8 = "GetCurrentThreadToken" ascii
        $d9 = "Administrator" wide
        $d10 = "IUSR" wide

        // LDAP related strings.
        $e1 = "LDAP://" wide
        $e2 = "samaccountname=" wide nocase
        $e3 = "cn=" wide nocase
        $e4 = "msexchrecipienttypedetails=" wide
        $e5 = "userprincipalname=" wide
        $e6 = "mail=" wide

    condition:
        uint16(0) == 0x5A4D and
        (
            (5 of ($a*) and 4 of ($d*)) or
            all of ($x*)
        ) and
        $b1 and
        4 of ($c*) and
        2 of ($e*) and
        filesize &lt; 2MB
}
</pre>
</details></div>
</section></section><div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
<!-- Cyber Centre tools and services -->

<section><h2 class="text-info" id="acknowledgements">Acknowledgments</h2>

<p>As a part of the Communications Security Establishment Canada (CSE), the Cyber Centre is a proud member of the Five Eyes, the world’s longest-standing and closest intelligence-sharing alliance. Sharing IoCs and <abbr and="" procedures="" techniques="" title="tactics,">TTPs</abbr> with the cyber community and Five Eyes partners has been instrumental since the SharePoint vulnerabilities were first discovered, and ongoing analytical exchanges have maximized the value of collected data.</p>

<p>Further collaboration with organizations such as the Microsoft Threat Intelligence Center (MSTIC) and Palo Alto’s Unit42 has enabled the exchange of detailed malware analysis and technical findings, strengthening collective defences.</p>
</section><section class="alert alert-info"><p><strong>Disclaimer:</strong> The Cyber Centre disclaims all liability for any loss, damage, or costs arising from the use of or reliance on the information within this article. Readers are solely responsible for verifying the accuracy and applicability of any information before acting on it.</p>
</section><div class="clearfix"> </div>

<div class="pull-right small text-muted"><a href="#wb-tphp">Top of page</a> <span aria-hidden="true" class="text-primary  glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/cyber-security-hygiene-best-practices-your-organization-itsap10102</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/cyber-security-hygiene-best-practices-your-organization-itsap10102"/><title><![CDATA[Cyber security hygiene best practices for your organization - ITSAP.10.102]]></title><updated>2025-09-04T12:56:09Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="3435" about="/en/guidance/cyber-security-hygiene-best-practices-your-organization-itsap10102" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row"><!--Info across the top under the image-->
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>September 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.10.102</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>September 2025 | Awareness series</strong></p>
</div>
</div>

<p>Cyber security hygiene refers to the best practices your organization can take to maintain the overall health and security of your <abbr title="information technology">IT</abbr> environment. Your cyber security hygiene helps you better defend your networks, systems and data from threat actors.</p>

<p>Threat actors, even in more sophisticated attacks, leverage common vulnerabilities and weaknesses to attack systems and gain initial access. By building a solid cyber security foundation, your organization is better positioned to protect, defend and recover from cyber incidents.</p>

<h2 class="text-info">On this page</h2>

<ul><li><a href="#checklist">Cyber security hygiene checklist</a>

	<ul><li><a href="#network">Network and endpoint protection</a></li>
		<li><a href="#system">System protection</a></li>
		<li><a href="#education">User education and additional protective measures</a></li>
	</ul></li>
</ul><h2 class="text-info" id="checklist">Cyber security hygiene checklist</h2>

<p>The following checklist provides actions your organization can take to strengthen your cyber security.</p>

<p>While not all actions may be feasible, you should prioritize implementing those that are most impactful and sustainable for your organization. Doing so will enhance your cyber security posture.</p>

<h3 id="network">Network and endpoint protection</h3>

<ul><li>Protect your network and endpoints with the following tools
	<ul><li>anti-virus and anti-malware software</li>
		<li>network protocol inspection tools</li>
		<li>endpoint detection and response</li>
		<li>firewalls</li>
		<li>wireless intrusion detection and prevention systems</li>
		<li>mobile endpoint threat management solutions and mobile threat defence products</li>
	</ul></li>
	<li>Segment your networks to stop traffic from flowing to sensitive or restricted zones</li>
	<li>Implement a security information and event management system to enable real-time, continuous monitoring to identify anomalies in your
	<ul><li>network traffic</li>
		<li>wireless access points</li>
		<li>mobile device gateways</li>
	</ul></li>
	<li>Monitor your security critical components, including the
	<ul><li>Domain Name System (DNS) server</li>
		<li>authentication server</li>
		<li>public key infrastructure</li>
	</ul></li>
	<li>Implement protective <abbr title="Domain Name System">DNS</abbr> to prevent users from inadvertently visiting potentially malicious domains on the Internet</li>
	<li>Regularly renew cryptographic keys to maintain secure communications</li>
	<li>Document secure baseline configurations for all your <abbr title="information technology">IT</abbr>, operational technology components and cloud infrastructure</li>
	<li>Establish and maintain a configuration management database</li>
	<li>Conduct and maintain an inventory of your <abbr title="information technology">IT</abbr> assets</li>
	<li>Manage and detect unauthorized assets by developing and maintaining <abbr title="information technology">IT</abbr> asset management procedures that ensure proper tagging and labelling of hardware and software assets</li>
</ul><h4>Read more</h4>

<ul><li><a href="/en/guidance/preventative-security-tools-itsap00058">Preventative security tools (ITSAP.00.058)</a></li>
	<li><a href="/en/guidance/using-security-information-event-management-tools-manage-cyber-security-risks-itsm80024">Using security information and event management tools to manage cyber security risks (ITSM.80.024)</a></li>
	<li><a href="/en/guidance/network-security-logging-monitoring-itsap80085">Network security logging and monitoring (ITSAP.80.085) </a></li>
	<li><a href="/en/guidance/domain-name-system-dns-tampering-itsap40021">Domain Name System (DNS) tampering (ITSAP.40.021)</a></li>
	<li><a href="/en/guidance/protective-domain-name-system-itsap40019">Protective Domain Name System (ITSAP.40.019)</a></li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h3 id="system">System protection</h3>

<ul><li>Enable automatic updates and patches for your firmware, hardware, software and operating systems, especially for Internet-exposed services and systems</li>
	<li>Patch operating systems and applications promptly after assessing organizational risk and confirming compatibility with your environment</li>
	<li>Enforce phishing-resistant multi-factor authentication (MFA) for all accounts and systems, especially those with administrative privileges</li>
	<li>Encourage the use of strong, unique, and confidential passphrases or passwords where <abbr title="multi-factor authentication">MFA</abbr> is not technically feasible</li>
	<li>Ensure administrators use dedicated workstations that do not allow web browsing or email access</li>
	<li>Regularly review and update user privileges, such as
	<ul><li>remove users no longer in your organization</li>
		<li>edit user privileges if users no longer require access to certain data or systems</li>
		<li>limit administrative privileges to a small number of users</li>
		<li>require two-person integrity for administrative privileges</li>
		<li>conduct administrative functions from a dedicated administrative workstation</li>
	</ul></li>
	<li>Apply the principle of least privilege, ensuring users only have the set of privileges that are essential to performing authorized tasks</li>
	<li>Consider role-based access control</li>
	<li>Manage mobile devices with unified endpoint management software</li>
	<li>Implement application allow lists to control what applications and components are allowed on your networks and systems</li>
	<li>Assess third-party applications to identify and disable unnecessary components or functions or require human intervention before activation (for example, macros)</li>
	<li>Disable autorun or autoplay on all your operating systems and web browsers to avoid automatic installations of unauthorized software</li>
	<li>Establish an incident response plan and conduct annual tests to ensure timely restoration of critical functions and effective recovery</li>
	<li>Categorize your assets to identify those that are most critical to your organization's operations</li>
	<li>Regularly backup critical data and systems to offline storage, ensuring backups are isolated from network connections</li>
	<li>Test your backups periodically to ensure data and systems can be recovered quickly and successfully</li>
	<li>Proactively manage device lifecycles to address vulnerabilities in end-of-life or end-of-service-life devices, which often remain unpatched and increase security risks</li>
</ul><h4>Read more </h4>

<ul><li><a href="/en/guidance/top-10-it-security-action-items-no2-patch-operating-systems-and-applications-itsm10096">Top 10 <abbr title="information technology">IT</abbr> security action items: No. 2 patch operating systems and applications (ITSM.10.096) </a></li>
	<li><a href="/en/guidance/secure-your-accounts-and-devices-multi-factor-authentication-itsap30030">Secure your accounts and devices with multi-factor authentication (ITSAP.30.030) </a></li>
	<li><a href="/en/guidance/top-10-it-security-actions-no3-managing-controlling-administrative-privileges-itsm10094">Top 10 <abbr title="information technology">IT</abbr> security actions: No. 3 managing and controlling administrative privileges (ITSM.10.094)</a></li>
	<li><a href="/en/guidance/security-considerations-mobile-device-deployments-itsap70002">Security considerations for mobile device deployments (ITSAP.70.002) </a></li>
	<li><a href="/en/guidance/application-allow-list-itsap10095">Application allow list (ITSAP.10.095) </a></li>
	<li><a href="/en/guidance/developing-your-incident-response-plan-itsap40003">Developing your incident response plan (ITSAP.40.003) </a></li>
	<li><a href="/en/guidance/tips-backing-your-information-itsap40002">Tips for backing up your information (ITSAP.40.002) </a></li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>

<h3 id="education">User education and additional protective measures</h3>

<ul><li>Provide ongoing, tailored cyber security training to ensure your employees know how to respond to suspicious links or emails</li>
	<li>Provide privacy awareness training to your employees to reduce the risk of privacy breaches</li>
	<li>Identify and subscribe to relevant security information sources or alert services to stay informed about threats that could impact your organization</li>
	<li>Develop an internal and external contact list of key stakeholders to alert during cyber threat events</li>
</ul><h4>Read more</h4>

<ul><li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Offer tailored cyber security training to your employees (ITSAP.10.093)</a></li>
	<li><a href="/en/guidance/top-measures-enhance-cyber-security-small-and-medium-organizations-itsap10035">Top measures to enhance cyber security for small and medium organizations (ITSAP.10.035) </a></li>
	<li><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 <abbr title="information technology">IT</abbr> security actions to protect Internet-connected networks and information (ITSM.10.089) </a></li>
	<li><a href="/en/cyber-security-readiness/cyber-security-readiness-goals-securing-our-most-critical-systems">Cyber Security Readiness Goals: Securing Our Most Critical Systems</a></li>
</ul><div class="pull-right small text-muted mrgn-bttm-0"><a href="#wb-tphp" title="Return to Top of page">Top of page</a> <span aria-hidden="true" class="text-primary glyphicon glyphicon-circle-arrow-up"> </span></div>

<div class="clearfix"> </div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/virtualizing-your-infrastructure-itsap70011</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/virtualizing-your-infrastructure-itsap70011"/><title><![CDATA[Virtualizing your infrastructure (ITSAP.70.011)]]></title><updated>2025-09-04T11:54:22Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="682" about="/en/guidance/virtualizing-your-infrastructure-itsap70011" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row"><!--Info across the top under the image-->
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>September 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.70.011</strong></p>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>August 2025 | Awareness series</strong></p>
</div>
<!--pdf download-->

<div class="col-md-12"><!--<div class="mrgn-bttm-md well well-sm col-md-4 col-sm-12 pull-right mrgn-lft-md">
<p class="mrgn-tp-sm"><strong>Alternate format</strong>: <a href="/sites/default/files/cyber/publications/itsap70011.pdf">Virtualizing your infrastructure (ITSAP.70.011) (PDF,&nbsp;807&nbsp;KB)</a></p>
</div>-->
<p>Virtualization is a method of hardware abstraction that allows the creation of software versions of <abbr title="information technology">IT</abbr> systems and services which are traditionally implemented on separate physical hardware. These software versions, or virtual instances, can dramatically increase efficiency and decrease costs. Virtualization uses hardware to its full capacity by distributing its capabilities among many different services.</p>

<p>Before implementing virtualization within your organization, you should understand the associated risks and ensure you protect your network, systems and information. This guidance covers the basics virtualization, how your organization can benefit from it and the potential risks involved.</p>

<h2 class="text-info">On this page</h2>

<ul><li><a href="#virtualization">How virtualization works</a></li>
	<li><a href="#what-can-virtualization">What virtualization can do for your organization</a></li>
	<li><a href="#types-of-virtualization">Types of virtualization</a></li>
	<li><a href="#benefits-of-virtualization">Benefits of virtualization</a></li>
	<li><a href="#risks-virtualization">Risks of virtualization</a></li>
	<li><a href="#hypervisor-vendor">What to consider when selecting a hypervisor vendor</a></li>
	<li><a href="#mitigate-risks-virtualization">How to mitigate the risks of implementing virtual technology</a></li>
	<li><a href="#learn-more">Learn more</a></li>
</ul><h2 class="text-primary text-info" id="virtualization">How virtualization works</h2>

<p>To run your systems and services virtually there are 3 main components.</p>

<h3>Virtual machine</h3>

<p>With virtualization, you can run your applications on fewer physical servers. Applications and software run virtually on a simulated computer system called a virtual machine (VM). The <abbr title="virtual machine">VM</abbr> has all the features of a computer server, without needing the physical hardware attached. A hypervisor supports the <abbr title="virtual machine">VM</abbr>.</p>

<h3>Hypervisor</h3>

<p>The hypervisor provides the layer of abstraction between the underlying hardware and hosted virtual machines. An abstraction layer can hide or show as much detail about your system as you want. The hypervisor allocates resources, such as centralized processing unit access, storage and memory, to multiple <abbr title="virtual machine">VM</abbr>s. This allows them to run concurrently on the same underlying hardware as though they each had their own dedicated hardware.</p>

<p>The use of hypervisor technology may allow for quicker builds and snapshots of <abbr title="virtual machine">VM</abbr> images. The administration of the hypervisor should be done using a dedicated administrator workstation (DAW). <abbr title="dedicated administrator workstation">DAW</abbr>s are limited-use workstations that can only be used by those who have privileged access to perform administrative tasks. They are meant to increase the security of your network.</p>

<p>There are 2 types of hypervisors:</p>

<ul><li>bare-metal hypervisor (also known as Type 1), which runs directly on physical hardware</li>
	<li>hosted (also known as Type 2), which runs as an application on a host operating system</li>
</ul><p>Hypervisor technologies may also provide additional functionality or features such as the use of <abbr title="virtual machine">VM</abbr> snapshots and backups, virtual networking capabilities between <abbr title="virtual machine">VM</abbr>s, <abbr title="virtual machine">VM</abbr> monitoring and more. Note, that the use of a hypervisor may incur additional overhead.</p>

<h3>Hardware servers</h3>

<p>A single hardware server may support multiple <abbr title="virtual machine">VM</abbr>s. Without virtualization, idle applications have resources that are unused, for example:</p>

<ul><li>processing power</li>
	<li>RAM</li>
	<li>storage</li>
</ul><p>With virtualization, hardware servers can be used at full capacity to offer the hypervisor all the resources necessary to support the <abbr title="virtual machine">VM</abbr>s.</p>

<div class="panel panel-default mrgn-tp-lg">
<div class="panel-body">
<figure><figcaption class="mrgn-bttm-md"><strong>Figure 1: Hardware server supporting a virtual machine</strong></figcaption><img alt="Hardware server supporting a virtual machine" class="img-responsive center-block mrgn-bttm-lg" src="/sites/default/files/images/itsap-70011-virtualizing-your-infrastructure-v2-e.png" /><details class="brdr-tp brdr-rght brdr-bttm brdr-lft mrgn-bttm-sm"><summary>Long description – Figure 1: Hardware server supporting a virtual machine </summary><p>The figure 1, shows how the hardware server supports the hypervisor and the virtual machine. The image shows 3 components, from left to right, the hardware server connects to the hypervisor and then to the virtual machine(s).</p>
</details></figure></div>
</div>

<h2 class="text-primary text-info" id="what-can-virtualization">What virtualization can do for your organization</h2>

<p>Using virtualization, your organization can advance the performance of its infrastructure in the following ways:</p>

<ul><li>run multiple operating systems on one physical machine</li>
	<li>divide system resources between <abbr title="virtual machine">VM</abbr>s, also known as load balancing</li>
	<li>gain advanced resource controls</li>
	<li>create virtualized security appliances, such as a firewall</li>
	<li>easily move, copy and save <abbr title="virtual machine">VM</abbr>s to other files and systems</li>
	<li>run virtual desktop infrastructure in-office and remotely</li>
</ul><h2 class="text-primary text-info" id="types-of-virtualization">Types of virtualization</h2>

<p>Virtualization can be used to perform several different functions for different needs. Your organization may choose to use all or some of the following types of virtualization.</p>

<h3>Server</h3>

<p>A physical server is divided up into multiple virtual servers. Each virtual server can run its own operating system. This is effective for deploying <abbr title="information technology">IT</abbr> services within an organization.</p>

<h3>Desktop</h3>

<p>A workstation is virtualized so that users can access it from anywhere. This includes accessing your organization’s network from a smart device and working remotely. To learn more about workstation virtualization, read our guidance on <a href="https://www.cyber.gc.ca/en/guidance/using-virtual-desktop-home-and-office-itsap70111">using virtual desktop at-home and in-office (ITSAP.70.111)</a>.</p>

<h3>Storage</h3>

<p>All your physical data storage units are combined to create a large, virtualized unit. This streamlines storage capabilities and creates a central storage console.</p>

<h3>Network</h3>

<p>A hardware-based network is transformed into a software-based network. This consolidates all the network resources and simplifies administrative control.</p>

<h3>Application</h3>

<p>Computer programs can run on various operating systems (OS). An application is installed on an underlying <abbr title="Operating System">OS</abbr>, but through virtualization can be accessed and executed on others, such as running a Microsoft application on a Linux <abbr title="Operating System">OS</abbr>. This requires a virtualization layer to be inserted between the <abbr title="Operating System">OS</abbr> and the app.</p>

<h3>Cloud computing</h3>

<p>While virtualization is closely related to cloud computing, they are not the same concept. However, cloud computing utilizes virtualization to support many of its functions. To learn more about cloud computing, read our guidance <a href="https://www.cyber.gc.ca/en/guidance/thinking-moving-cloud-heres-how-do-it-securely">Thinking of moving to the cloud? Here’s how to do it securely</a>.</p>

<h2 class="text-primary text-info" id="benefits-of-virtualization">Benefits of virtualization</h2>

<p>Virtualization and the use of <abbr title="virtual machine">VM</abbr>s have several benefits. These examples are not inherent capabilities of virtualization but may be achieved depending on how you use it:</p>

<ul><li>lowers costs for high performance <abbr title="information technology">IT</abbr> services</li>
	<li>increases <abbr title="information technology">IT</abbr> productivity, efficiency and responsiveness</li>
	<li>accelerates the installation of applications and implementations of resources</li>
	<li>minimizes network downtime</li>
	<li>decreases disaster recovery time</li>
	<li>simplifies data centre management</li>
	<li>segregates applications and data to enhance security and reliability</li>
	<li>creates environments to safely test applications</li>
</ul><h2 class="text-primary text-info" id="risks-virtualization">Risks of virtualization</h2>

<p>Your organization can introduce security vulnerabilities if you do not properly configure or secure virtualization technology. Risks may include the following:</p>

<ul><li>vulnerabilities can be introduced by obsolete and unpatched servers (known as <abbr title="virtual machine">VM</abbr> sprawl)</li>
	<li>sensitive data can be compromised by moving <abbr title="virtual machine">VM</abbr>s</li>
	<li>entry points, like external access to the device, can be exploited when a <abbr title="virtual machine">VM</abbr> is offline and dormant</li>
	<li>hardware can be compromised by malware that spreads from <abbr title="virtual machine">VM</abbr>s or hypervisors, such as <abbr title="virtual machine">VM</abbr> escape</li>
	<li>unauthorized access may be permitted due to virtual separation not offering the required isolation for security baselines, such as privileged access</li>
	<li>control and visibility can be lost within the virtual environments or networks if traditional security devices are used</li>
	<li>resources can be exhausted if a hypervisor is compromised or if unauthorized changes are made to configurations</li>
	<li>protection for each <abbr title="virtual machine">VM</abbr> is more time consuming as each <abbr title="virtual machine">VM</abbr> as
	<ul><li>each <abbr title="virtual machine">VM</abbr> requires unique considerations and configurations</li>
		<li>each <abbr title="virtual machine">VM</abbr> runs individually from the core structure</li>
	</ul></li>
	<li>denial of service attack that affects one <abbr title="virtual machine">VM</abbr> can affect all connected <abbr title="virtual machine">VM</abbr>s unless quickly isolated</li>
</ul><h2 class="text-primary text-info" id="hypervisor-vendor">What to consider when selecting a hypervisor vendor</h2>

<p>You should choose a hypervisor vendor that can support your organization’s security requirements. Before selecting a vendor, consider the following factors to help support your decision:</p>

<ul><li>whether the data is encrypted when it is in transit and at rest</li>
	<li>the security controls that the vendor has in place to protect sensitive data</li>
	<li>whether the vendor uses bare-metal or hosted hypervisors</li>
	<li>whether the vendor has monitoring and auditing capabilities</li>
	<li>who has access to the data on the server</li>
	<li>how administrative privileges are controlled</li>
	<li>whether the vendor gives advice and guidance on configuring, deploying, and hardening the virtualized environment</li>
</ul><h2 class="text-primary text-info" id="mitigate-risks-virtualization">How to mitigate the risks of implementing virtual technology</h2>

<p>Your organization can mitigate some of the risks associated with implementing virtual technology by taking the following 15 actions:</p>

<ul><li>Select a trustworthy and reliable vendor</li>
	<li>Update and patch servers frequently</li>
	<li>Have your <abbr title="information technology">IT</abbr> team separate the different areas of your virtualized environment (e.g. public, storage, management) into network zones for better control</li>
	<li>Store highly sensitive data on separate physical servers</li>
	<li>Test high-risk applications in isolated environments</li>
	<li>Apply the principle of least privilege to ensure users only have enough privilege to carry out their job functions</li>
	<li>Use separation of duties to break down processes or tasks into a series of steps to reduce the likelihood of mistakes or malicious activity</li>
	<li>Implement multi-factor authentication for all accounts</li>
	<li>Train employees on cyber security best practices and provide role-based training</li>
	<li>Back up your data regularly</li>
	<li>Use a security information and even management approach to business operations to streamline the security of assets</li>
	<li>Install antivirus and intrusion detection or prevention systems on your infrastructure to keep all <abbr title="virtual machine">VM</abbr>s secure</li>
	<li>Manage your assets take stock of all infrastructure being used and regularly audit and remove unused <abbr title="virtual machine">VM</abbr>s</li>
	<li>Encrypt network traffic and hard drives anywhere sensitive data is stored to protect data in transit and at rest</li>
	<li>Develop and test an incident response plan</li>
</ul><p>We strongly recommend using bare-metal hypervisors where possible for your organization’s virtualized environments. Bare-metal hypervisors have fewer layers and typically allow for more efficient use of hardware and additional functionality and capabilities compared to hosted hypervisors.</p>

<h2 class="text-primary text-info" id="learn-more">Learn more</h2>

<ul><li><a href="https://www.cyber.gc.ca/en/guidance/cyber-centre-data-centre-virtualization-report-best-practices-data-centre-virtualization">Cyber Centre data centre virtualization report: Best practices for data centre virtualization (ITSP.70.010)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/cyber-security-considerations-consumers-managed-services-itsm50030">Cyber security considerations for consumers of managed services (ITSM.50.030)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/isolating-web-facing-applications-itsap10099">Isolating web-facing applications (ITSAP.10.099)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/top-10-it-security-action-items-no2-patch-operating-systems-and-applications-itsm10096">Top 10 IT security actions items: No.2 patch operating systems and applications (ITSM.10.096)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/protect-information-enterprise-level-itsap10097">Protect information at the enterprise level (ITSAP.10.097)</a></li>
	<li><a href="https://www.cyber.gc.ca/en/guidance/using-encryption-keep-your-sensitive-data-secure-itsap40016">Using encryption to keep your sensitive data secure (ITSAP.40.016)</a></li>
</ul></div>
</div>
</div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/guidance/universal-plug-play-itsap00008</id><link rel="alternate" href="https://cyber.gc.ca/en/guidance/universal-plug-play-itsap00008"/><title><![CDATA[Universal plug and play (ITSAP.00.008)]]></title><updated>2025-09-03T18:32:08Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6751" about="/en/guidance/universal-plug-play-itsap00008" class="cccs-basic-page full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_basic_page:links" class="block block-layout-builder block-extra-field-blocknodecccs-basic-pagelinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_basic_page:body" class="block block-layout-builder block-field-blocknodecccs-basic-pagebody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><div class="row">
<div class="col-md-4 pull-left hidden-xs hidden-sm">
<p class="text-left"><strong>September 2025</strong></p>
</div>

<div class="col-md-4 hidden-xs hidden-sm">
<p class="text-center"><strong>Awareness series</strong></p>
</div>

<div class="col-md-4 pull-right hidden-xs hidden-sm">
<p class="text-right"><strong>ITSAP.00.008</strong></p>
</div>
</div>
<!--MOBILE STARTS HERE-->

<div class="hidden-lg hidden-md text-center">
<p><strong>September 2025 | Awareness series</strong></p>
</div>

<p>Universal plug and play (UPnP) is a protocol that allows devices on the same network to automatically discover, connect to and interact with one another. Common examples of devices that use <abbr title="universal plug and play">UPnP</abbr> include:</p>

<ul><li>mobile devices</li>
	<li>smart devices (for example, speakers, televisions and cameras)</li>
	<li>computers</li>
	<li>gaming systems</li>
	<li>printers</li>
	<li>Wi-Fi devices</li>
	<li>routers</li>
</ul><p>While <abbr title="universal plug and play">UPnP</abbr> services can be convenient for automating device connectivity, it can expose you to several security risks. We therefore recommend disabling <abbr title="universal plug and play">UPnP</abbr>, especially on perimeter devices such as home routers that manage firewalls, switches and Wi-Fi access points for other connected devices. Before you disable <abbr title="universal plug and play">UPnP</abbr>, check what level of security your devices need, since some require the service to work properly.</p>

<h2 class="text-info">On this page</h2>

<ul><li><a href="#use">How universal plug and play is used</a></li>
	<li><a href="#risks">Related risks</a></li>
	<li><a href="#secure">How to secure your devices</a></li>
	<li><a href="#disable">How to disable <abbr title="universal plug and play">UPnP</abbr> on a home router</a></li>
	<li><a href="#learn">Learn more</a></li>
</ul><h2 class="text-info" id="use">How universal plug and play is used</h2>

<p><abbr title="universal plug and play">UPnP</abbr> is used to connect devices seamlessly within a local network. It allows you to automatically connect smart devices, gaming consoles and computers, media streaming devices and remote device control. <abbr title="universal plug and play">UPnP</abbr> allows compatible devices to interact and work together within a related network for versatility and convenience. Here are some examples of how <abbr title="universal plug and play">UPnP</abbr> is commonly used.</p>

<h3>Smart devices</h3>

<p>Smart devices use <abbr title="universal plug and play">UPnP</abbr> to communicate with each other, allowing them to automatically adjust settings or change their environment based on the actions of other devices. For example, smart lighting that changes colour or brightness in response to temperature changes detected by a connected smart thermostat.</p>

<h3>Gaming consoles and computers</h3>

<p>Gaming consoles can discover and connect with each other to join multiplayer sessions and share game content in real time.</p>

<h3>Media streaming</h3>

<p>Devices that support media streaming can share and stream videos, music and photos among other <abbr title="universal plug and play">UPnP</abbr>-enabled devices.</p>

<h3>Remote access</h3>

<p>You can use remote device control from a smartphone or computer to control actions or settings on <abbr title="universal plug and play">UPnP</abbr>-supported devices. For example, <abbr title="universal plug and play">UPnP</abbr> can be used to remotely lock or unlock a smart lock to your house.</p>

<h2 class="text-info" id="risks">Related risks</h2>

<p>While <abbr title="universal plug and play">UPnP</abbr>-enabled devices are convenient, they also introduce potential security risks because they often operate with minimal authentication or access controls. As a result, devices and networks using <abbr title="universal plug and play">UPnP</abbr> may be exposed to several common threats that can compromise security and privacy.</p>

<h3>Malware</h3>

<p>Threat actors can compromise <abbr title="universal plug and play">UPnP</abbr>-enabled devices with malware. For example, they may use distributed denial-of-service (DDoS) attacks to configure <abbr title="universal plug and play">UPnP</abbr> devices to be accessible and ready to receive and send data.</p>

<h3>Unauthorized access</h3>

<p>Any <abbr title="universal plug and play">UPnP</abbr> devices connected to a common network can be compromised by someone who gains access to that network. This could be a threat actor exploiting a device connected to the network or a local user accessing a connected device (for example, an insider threat).</p>

<p>The two main ways devices using <abbr title="universal plug and play">UPnP</abbr> on a network can be compromised include:</p>

<ul><li>external threats: attackers who gain unauthorized access to your network (for example, by exploiting a vulnerable device) can target <abbr title="universal plug and play">UPnP</abbr>-enabled devices to manipulate device settings, intercept communications, or install malware</li>
	<li>insider threats: individuals with legitimate access to the local network that tamper with or misuse <abbr title="universal plug and play">UPnP</abbr>-connected devices, including reconfiguring devices, accessing sensitive data or intentionally weakening network security</li>
</ul><h3>Network configuration</h3>

<p><abbr title="universal plug and play">UPnP</abbr> offers control of network configuration settings, such as port forwarding, which threat actors can leverage to bypass firewalls, change access lists, or modify security measures. This makes it difficult to detect and block malicious traffic. Threat actors can also use a <abbr title="universal plug and play">UPnP</abbr>-connected device to manipulate network configuration to expose router web administration details, redirect traffic to malicious external servers, modify credentials and control internal connections and device activities.</p>

<h3>Data sharing</h3>

<p>Connected <abbr title="universal plug and play">UPnP</abbr> devices share data that allows them to interact with each other and to action certain activities. This can pose a privacy risk if devices that handle sensitive information connect and share data with other devices on the network.</p>

<h2 class="text-info" id="secure">How to secure your devices</h2>

<p>The most effective way to protect against <abbr title="universal plug and play">UPnP</abbr>-related attacks is to disable the service entirely. If disabling <abbr title="universal plug and play">UPnP</abbr> is not an option, you can reduce vulnerabilities to your network by:</p>

<ul><li>restricting <abbr title="universal plug and play">UPnP</abbr> access by creating a virtual local area network (VLAN) or a separate network zone to isolate <abbr title="universal plug and play">UPnP</abbr>-enabled devices from other devices on your network</li>
	<li>updating devices regularly and enabling automatic updates where available to further mitigate the risk of threat actors taking control of your devices and leveraging <abbr title="universal plug and play">UPnP</abbr> protocols maliciously</li>
	<li>logging and regularly monitoring device activity for any irregularities and potential threats</li>
	<li>regularly reviewing security settings and port-forwarding rules on your router and any other networking devices you own</li>
	<li>keeping up to date with new and emerging technologies and threats by reading Cyber Centre resources and publications</li>
	<li>training employees on and spreading awareness of cyber security best practices to identify, understand and manage potential threats to your systems</li>
	<li>using Canadian Internet Registry Authority (CIRA) tools and services to strengthen security if your router needs to be <abbr title="universal plug and play">UPnP</abbr>-enabled</li>
</ul><h2 class="text-info" id="disable">How to disable universal plug and play on a home router</h2>

<p>The steps to disable <abbr title="universal plug and play">UPnP</abbr> on your home router will vary depending on the make and model of the router, but generally, you should follow these 3 steps:</p>

<ol><li>Log into your router's administrative or configuration webpage</li>
	<li>Select the <abbr title="universal plug and play">UPnP</abbr> settings that are often found under the "advanced" or the "<abbr title="Network Address Translation">NAT</abbr> forwarding" configuration options</li>
	<li>Choose the option to "disable <abbr title="universal plug and play">UPnP</abbr>"</li>
</ol><p>If you choose not to disable <abbr title="universal plug and play">UPnP</abbr> on your home router, you can block ports associated with <abbr title="universal plug and play">UPnP</abbr> at the Internet gateway. This helps prevent unauthorized external devices from accessing internal devices using <abbr title="universal plug and play">UPnP</abbr>.</p>

<h2 class="text-info" id="learn">Learn more</h2>

<ul><li><a href="/en/guidance/how-your-smart-device-listening-you-itsap70013">Security considerations for voice-activated digital assistants (ITSAP.70.013</a>)</li>
	<li><a href="/en/guidance/protect-your-organization-malware-itsap00057">Protect your organization from malware (ITSAP.00.057)</a></li>
	<li><a href="/en/guidance/how-updates-secure-your-device-itsap10096">How updates secure your device (ITSAP.10.096)</a></li>
	<li><a href="/en/guidance/network-security-logging-monitoring-itsap80085">Network security logging and monitoring (ITSAP.80.085)</a></li>
	<li><a href="/en/guidance/internet-things-iot-security-itsap00012">Internet of Things (IoT) security (ITSAP.00.012)</a></li>
	<li><a href="/en/guidance/distributed-denial-service-attacks-prevention-and-preparation-itsap80110">Distributed denial of service attacks – prevention and preparation (ITSAP.80.110)</a></li>
	<li><a href="/en/guidance/cyber-security-home-and-office-secure-your-devices-computers-and-networks-itsap00007">Cyber security at home and in the office: Secure your devices, computers, and networks (ITSAP.00.007)</a></li>
	<li><a href="/en/guidance/offer-tailored-cyber-security-training-your-employees-itsap10093">Offer tailored cyber security training to your employees (ITSAP.10.093)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry></feed>