Skip to content

COP Security Policy

John Bain edited this page Mar 1, 2023 · 2 revisions

Cloud Security Policy

The Public Health Data Center of Practice (PDCP) takes security seriously, but we also believe in making things easy and approachable. That's why we're providing this Cloud Security Policy to guide everyone who uses our cloud resources, whether you're a developer, researcher, or anything in between. By working together and being aware of security best practices, we can ensure that our cloud is secure, reliable, and always available.

Security is Everyone's Responsibility

At the PDCP, we believe that security is everyone's responsibility. While we have security measures in place to keep our cloud resources secure, we also need your help to ensure that our cloud is secure. That means being aware of security best practices and making sure that you're following them when you use our cloud resources.

Security COP-Incident-Management-Policy

Aligning with Government of Canada IT Security Standards

We take the security of our cloud resources seriously, and we want to ensure that we're always in compliance with the Government of Canada IT security standards. That means that our cloud resources will always be configured and maintained to align with these standards. We will also work with you to ensure that any cloud resources you use are also in compliance with these standards.

Encouraging Use of IT Security Tools and Modern Processes

To help ensure the security of our cloud resources, we encourage everyone to use modern IT security tools and processes. This includes things like two-factor authentication, password managers, and encryption. We also encourage the use of modern cloud resources, such as serverless computing, which can help improve security by reducing the attack surface.

Encouraging the Use of Let's Encrypt for SSL Certificates

SSL certificates are important for securing web traffic, but they can be expensive and difficult to manage. That's why we encourage everyone to use Let's Encrypt, which provides free SSL certificates that are easy to manage.

Encouraging Code Repositories

One of the best ways to improve security is to have code repositories that can be audited and reviewed. We encourage everyone to use code repositories to ensure that their code is secure and up to date. We also encourage the use of version control systems, which can help ensure that code is properly managed and tracked over time.

Encouraging Proper Incident and Event Management

Despite our best efforts, incidents and events can still occur. That's why we encourage everyone to follow proper incident and event management procedures. This includes things like reporting incidents and events in a timely manner, conducting post-incident reviews, and learning from incidents to improve our overall security posture.

We hope that this Cloud Security Policy helps you understand our approach to security and how we can all work together to keep our cloud resources secure. If you have any questions or concerns, please don't hesitate to reach out to us.

Clone this wiki locally