The safety and security of Canadians is, and always has been, our top priority. Canadians rely on the Government of Canada to deliver programs and services, many of which are becoming increasingly more digital in this modern era. Like many public institutions around the world, the government has been a target of cyber-attacks, which can have a significant effect on government operations and the security of Canadians. We are constantly adapting safety measures and establishing tools to help safeguard our systems and protect Canadians’ personal information.
Tools such as the Government of Canada’s Cyber Security Event Management Plan, tabletop exercises, and government website security monitoring are proactive measures that help the us anticipate and effectively respond to cyber events.
Now, we are taking additional steps to strengthen our approach and get a clearer picture of current cyber defenses across government. This first-ever Government of Canada Enterprise Cyber Security Strategy, developed by the Treasury Board of Canada Secretariat, Communications Security Establishment Canada, and Shared Services Canada, is a risk-based, whole-of-government approach that will improve collaboration among departments and improve cyber security as a whole.
This Cyber Security Strategy is the first of its kind and is a testament to our commitment to keeping Canadians safe in the digital age. It will reduce redundancies, identify gaps, and include year-round testing and reviews.
It will also improve how the government prepares for, responds to, and recovers from cyber attacks, while fostering a diverse workforce with the right skills, knowledge, and culture to support cyber security. Canada’s public service is one of the best in the world, and this Strategy will help ensure we have a workforce with the right tools to respond to complex cyber attacks.
Cyber security is an ongoing effort, and this strategy will be regularly reviewed and updated to ensure it keeps up with evolving threats.
Canadians can rest assured that the government is continuously implementing strong measures to safeguard their information and address cyber events when they do occur.
I invite you to read the Strategy to learn more about how the Government of Canada is strengthening cyber security across government.
The Honourable Anita Anand, P.C. M.P.
President of the Treasury Board
Canadians rely on public institutions like the Government of Canada (GC) to deliver programs and services. As a critical infrastructure sector, government services are essential to the health, safety, security and economic well-being of Canadians. The increasing digital nature of the GC and reliance on information technologies means that the GC is an attractive target due to its holdings of personal information, valuable research data and other sensitive information.
As a result, cyber security events can have a significant effect on government operations, either through disruption of critical and essential services or through exposure of classified or personal information. This significant effect can put people at risk of identity theft or other types of fraud, all of which can potentially erode trust in government institutions and negatively impact the overall Canadian economy and society. The National Cyber Threat Assessment 2023–24 highlights the significant rise in the number and sophistication of cyber threat actors who take advantage of the dependency on Internet-connected technologies in order to conduct malicious activities. The increasingly complex threat landscape coupled with the rapid pace of technological innovation and adoption will make it even harder for GC departments and agencies to understand the risks they face and how they can and should protect themselves.
To that end, given the increasing sophistication and frequency of cyber attacks, the GC must remain vigilant and continue to strengthen its defences to improve resilience. Ensuring the confidentiality, integrity, and availability of the GC’s information and networks is essential to the delivery of secure, reliable and trusted digital services. Enabling and maintaining a resilient digital GC will require a better understanding of the nature of the cyber risks along with action to modernize and secure systems to prevent and resist cyber attacks. When cyber events occur, the GC needs to be able to detect these events quickly to minimize their impact. Establishing a resilient cyber security posture will enable the GC to effectively respond to and recoverfrom cyber events in a timely manner to maintain the continuous delivery of government programs and services.
The purpose of the GC Enterprise Cyber Security Strategy (Strategy) is to:
The Strategy applies to departments and agencies under Treasury Board authorities, specifically under the Policy on Service and Digital and the Policy on Government Security. In addition, the scope of the Strategy is targeted for up to and including Designated (Protected B) information systems, along with Classified (Secret) information systems that focus on supporting government operations, while respecting the unique needs of the broader ecosystem of classified systems.
While federal departments and agencies not under Treasury Board authorities are not mandated at this time to apply and adopt Treasury Board policy requirements and direction, they are encouraged to adopt the objectives and goals outlined under the Strategy to the greatest extent possible to improve cyber security posture across all government institutions.
Canada’s Digital Ambition Statement
To enable delivery of government in the digital age for all Canadians. This will be done by providing modernized and accessible tools to support service delivery that expresses the best of Canada in the digital space.
As outlined in Canada’s Digital Ambition 2022, today’s digital landscape is marked by change of unprecedented pace and scope. Rapid technological, digital and data transformation is now part of Canadians’ daily lives, revolutionizing the way they access information and services, and the way they live, socialize and work. Canadians expect to have faith in their government and to be able to access any government service, at any time and on any device, in a secure and accessible manner. However, meeting this expectation presents a variety of challenges and security considerations that must be reflected on as part of the ever-evolving cyber landscape, including:
Building and maintaining government cyber defences is therefore vital for the protection of the functions and services on which Canadian society depends. In the last decade, there has been progress made in improving the government’s cyber security posture with centralized security capabilities having been implemented within the GC to some degree. Examples include:
Despite this progress, gaps remain between the current state of government cyber resilience and where it needs to be. These gaps include:
Cyber simulation exercises Performing cyber simulation exercises (also referred to as tabletop exercises) helps to improve preparedness, enhance communication and decision-making, and provide cost-effective training that increases confidence in handling cyber security events. In 2021–22, only 25% of departments performed cyber simulation exercises.
Addressing this ever-evolving cyber security risk landscape will require the GC to harness its collective strength to build secure and resilient information systems. This strength will be supported by action-oriented policies, increased agility, and strategic investment-planning focused on addressing gaps to ensure that Canadians remain confident that their data is protected and that the provision of critical services will be uninterrupted.
Enabling a whole-of-government approach for the cyber security of government operations that will support the delivery of government services in the digital age for all Canadians requires the GC to provide modernized and accessible tools that support service delivery. Cyber security is a foundational component that enables simple, secure, and efficient delivery of government services and benefits. Therefore, the GC must prioritize efforts in meeting its overall vision of:
Building a world-class, sustainable and resilient GC to reduce cyber security risks so that federal departments and agencies can enable secure and reliable digital service delivery.
To realize this vision, the GC must prioritize efforts toward reducing cyber security risks so that GC departments and agencies can maximize the benefits of digital technology. This also means a concerted effort to optimize the use of its resources, leveraging common solutions where feasible to improve consistency and reduce the likelihood of misconfiguration. To do so, the GC will require the right policy, people, process, and technology to identify and manage known and unknown or emerging risks, while maintaining a proportionate and effective level of cyber security across all federal departments and agencies.
This approach will also enable the GC to shift from a reactive posture to a proactive approach in identifying and addressing security vulnerabilities and capability gaps, while keeping pace with the rapidly evolving threat landscape. In addition, the GC must focus on safeguarding sensitive government data and ensuring that it protects and secures its information systems, regardless of their environments. Building in privacy and security from the outset and using an information-centric approach will enable the delivery of reliable services and support information systems that grant access to protected assets to trusted and verified users, devices, and services on a need-to-know basis.
Cyber security management and coordination within the federal government is critical to ensure that the GC can stay ahead of cyber threats and provide the central leadership and support needed for Canada. Strengthened governance and oversight will be necessary to ensure collaboration and alignment with departments and agencies that fulfill a key role in managing cyber security. Every part of government has a role in achieving the vision.
To be successful, key stakeholders must work closely together. The key stakeholders include:
Centrally, the Information Technology Security Tripartite (Tripartite), which consists of the Treasury Board of Canada Secretariat (TBS), Shared Services Canada (SSC), and the Canadian Centre for Cyber Security (Cyber Centre), plays an important role in providing advice, guidance, oversight, and direction to address GC-wide security initiatives, and supports departments and agencies under Treasury Board authorities. The Tripartite will continue its efforts to coordinate operational cyber security activities, transforming how cyber security data and threat intelligence is shared, consumed and actioned across government.
Departments and agencies are accountable for managing cyber security risks in their program areas; however, as the whole-of-government adopts an enterprise approach to cyber security and as programs and services become more integrated, it will be imperative that cyber security risks be effectively and holistically managed at the enterprise level in accordance with accountabilities outlined under the Treasury Board policy instruments.
Building on the expectations and authorities outlined under the Policy on Government Security and the Policy on Service and Digital, roles and responsibilities will be clarified as part of the target security operating model and its technology variations. Strong, collaborative relationships between Departmental Chief Information Officers (CIOs), Departmental Chief Security Officers (CSOs), and the Designated Official for Cyber Security (DOCS) will be needed to:
To realize the vision, four strategic objectives have been established along with supporting key actions. The objectives are:
These strategic objectives are further described in the section below. In addition, Appendix A: includes an initial set of key performance indicators to assess the progress of identified actions.
As the cyber threat landscape is complex, evolving and extremely sophisticated, the GC needs to increase its understanding of the cyber threat landscape in order to develop more comprehensive and layered security defences. In order to manage cyber security risk, federal departments and agencies will have risk management processes, governance, and accountability in place to enable the proactive and effective identification, assessment, and management of their cyber security risks. Multi-year departmental cyber security strategies will be submitted to the TBS Office of the Chief Information Officer (OCIO) for approval on an annual basis. Through this risk-based approach, there will be sufficient overarching visibility with access to data to drive analytics, enabling the GC to effectively manage and measure cyber security risk holistically and align mitigation strategies with GC-wide goals. Further, the GC will have the mechanisms in place to enable the rapid identification, assessment and management of vulnerabilities across the enterprise.
Key actions and goals include:
The GC relies on a range of technologies to operate its functions and deliver digital services, which fundamentally requires a security-by-design approach to ensure that the functions and services consistently and continuously follow best practices and meet robust standards. Moreover, federal departments and agencies will increase the use of shared capabilities, tools, and services to address common cyber security issues, improving cyber security across the whole of government, as well as driving efficiency and value for money.
Key actions and goals include:
Even with robust protection and detection measures in place, the GC will be impacted by cyber security incidents. It is therefore essential that the GC be able to rapidly respond to cyber security incidents when they do happen to minimize impacts and ensure the continuity of essential functions and services. Testing and exercising incident response plans, both organizationally and across government, as well as establishing the ability to identify and communicate lessons learned from incidents, is a key part of the approach. A holistic monitoring approach with proportionate security monitoring capabilities based on organizational size, business context and maturity will help to facilitate the proactive detection of cyber threats. Further, central oversight and support of recovery from the most severe cyber security incidents will ensure that systemic risks are identified and mitigated.
Key actions and goals include:
To achieve the Strategy’s vision and strategic objectives, the GC must cultivate a cyber security culture that empowers its people to learn, question and challenge in order to drive continuous improvement. Fostering a cultural shift in cyber security across the whole of government requires improving cyber security awareness and knowledge across all of the GC workforce in order to proactively engage organizational cyber security risks. According to the Government of Canada Digital Standards: Playbook, security measures should be frictionless so that they do not place a burden on users. Leveraging a robust cyber security culture across the GC will mature the cyber profession within the GC and enable the GC to attract, develop, and retain those skills, and to provide sustainable career pathways more effectively. Doing so will also ensure increased awareness and vigilance among all GC employees.
Key actions and goals include:
The following logic model has been created to illustrate the expected outcomes along key inputs and activities as well as the resulting outputs.
Departments and agencies use data-driven insights to articulate cyber risks and their business impacts to enable effective and accountable decision-making
Departments and agencies increase overall cyber maturity, leading to improved effectiveness in preventing and resisting cyber attacks
Departments and agencies put in place the capabilities required to proactively prepare for, respond to and recover from cyber security events
The GC workforce is composed of digital talent that represents who we serve, and cyber security awareness is at the core of all positions
Cyber security is a whole-of-government endeavour, where risks within GC information systems are continuously monitored, communicated, and remediated in an effective and timely manner
Standardized and modern tools and devices, and enterprise-wide cyber security services are deployed and leveraged across the GC
A secure-by-design approach is applied to ensure that the security of digital services and the protection of digital assets are continually assured throughout their life cycle
GC networks, systems, applications, and endpoints are monitored to provide proportionate and end-to-end detection capability while respecting privacy
GC information systems and critical services affected by cyber security incidents are quickly restored and resume operations with minimal disruption
A cyber security culture that empowers behaviors that support continuous learning and improvement with a pool of cyber talent shared strategically across government
A robust screening regime that balances evidence-based decision-making and continuous assurance to mitigate insider threat risks and improve time to hire
Integrated risk management platform
GC Enterprise Vulnerability Management Program
Standard security clauses in contracts to manage third-party risks
GC enterprise security architecture artifacts, tools and templates
GC Identity, Credential, and Access Management (ICAM) strategy and roadmap
Implementation of enterprise cyber security services
Target security operating model (TSOM) implementation artifacts
Secure systems engineering and threat modelling practices
Development, security and operations (DevSecOps) framework
Modern security categorization model
Digital data protection policies
Federated security operations centre (SOC) architecture
Continuous monitoring framework
Security monitoring use cases
Government of Canada Cyber Security Event Management Plan (GC CSEMP) playbooks
Security incident response platform
Facilitated cyber simulations (tabletop exercises)
Incident recovery surge team
Life-cycle framework for departmental business continuity management
Digital talent recruitment and development strategy
Cyber Talent Centre of Expertise
Cross-functional training programs
Improved security screening policies and practices
Enhanced personnel security screening platform
Streamline governance, clarify accountabilities, develop functional capacity and tools, and measure cyber performance and maturity
Establish building blocks, develop guidance and deliver agile projects
Implement secure systems and development life cycles, and develop secure operating model processes
Develop requirements and use cases, clarify roles and responsibilities
Manage incidents, foster community collaboration, and establish and test business continuity and disaster recovery plans
Create, engage, and consult with networks and partnerships
Update policies, and secure the information-sharing environment or platform
Human and financial resources information from partners and stakeholders
To achieve the vision and meet the strategic objectives, a target security operating model (TSOM) is crucial in achieving an effective and efficient approach to conducting cyber security operations that enable the delivery of digital services. This model must consider the dimensions of policy, people, process, and technology, along with the GC’s cyber security management approach. This approach includes the security functions of identify, protect, detect, respond and recover that represent the primary pillars of a holistic cyber security program. The approach also provides guidance to departments and agencies to better understand, manage, reduce, and communicate cyber security risks, and complements existing practices outlined under the Framework for the Management of Risk and the Cyber Centre’s IT Security Risk Management: A Lifecycle Approach (ITSG-33).
Therefore, the TSOM is an enabling tool to support the operationalization of the Strategy and provides a blueprint for successful cyber security operations. The TSOM illustrates the range of security processes and activities that are needed to have a comprehensive security capability, and provides a breakdown of stakeholders that are either accountable for or supporting each process and activity. Further, the TSOM provides a framework to clarify accountabilities and the extent to which additional authorities may be required to meet the target state for the cyber security of government operations.
Moreover, TBS, SSC, CSE, and departments and agencies will use the TSOM to guide the development of respective departmental plans that are aligned with this Strategy. These plans are expected to include an integrated investment-planning approach that incorporates cyber security and prioritizes the use of common solutions and enterprise services to the greatest extent possible where and when available. Departmental plans also support the establishment of departmental roadmaps. Such roadmaps include technology roadmaps that are developed by internal enterprise service organizations such as SSC as a key stakeholder in delivering secure, common solutions.
Monitoring and evaluation of the overall Strategy will be required to ensure that the vision and objectives of the Strategy are met. While the Tripartite will continue to play a key role in the governance and oversight of strategic initiatives, broader governance will also be necessary to oversee and obtain enhanced assurances as they relate to cyber investments. This broader governance, which will be built on TBS authorities that relate to spending oversight, will include early reviews of spending proposals to ensure alignment with the Strategy and government priorities. By establishing improved digital and technology assurances, the government will be enabled to operate in a holistic manner to promote the reuse of common solutions and technology, as well as to improve interoperability and efficient and collaborative asset utilization. Doing so benefits the government as a whole by helping to deliver savings and efficiencies, increase delivery confidence, reduce risk, support capability improvements and ensure improved outcomes for the GC.
While the GC has made progress in improving cyber security in recent years, the ever-evolving threat environment and evolution in technology has advanced even faster. A renewed commitment is required across departments and agencies to serve Canadians credibly and transparently in a manner that maintains and improves trust in the delivery of secure and reliable digital services. An appropriate balance between security, the associated cost and the end user experience is required. While security is of paramount concern, the GC must embrace a strong cyber risk culture to ensure that the necessary security controls commensurate with the sensitivity and value of the information are implemented in a cost-effective manner with minimal impact on the end user.
The following table provides a proposed set of key performance indicators to monitor the progress of achieving the vision and strategic objectives outlined in the Strategy. These indicators will be further reviewed as part of the development of the supporting performance management framework for the Strategy.
Plan and govern for the sustainable and integrated management of cyber security
Improve the understanding of GC-wide exposure and strengthen vulnerability management
Enhance third-party cyber security risk management
Accelerate the implementation of modern cyber security and application architectures
Deploy secure, modern, and accessible workplace tools and devices
Strengthen data protection measures
Improve security monitoring and detection capabilities to facilitate effective, tailorable options for departments and agencies
Enhance cyber security event management practices to prepare for, respond to and recover from cyber-attacks
Improve the resilience of GC critical services with strengthened business continuity management practices
Develop skills for cyber security
Attract and retain diverse talent for cyber security
Accelerate the hiring of public servants by transforming personnel security screening and enabling continuous assurance
A service or activity whose disruption would result in a high or very high degree of injury to the health, safety, security or economic well-being of Canadians or to the effective functioning of the Government of Canada.
cyber security
Cyber security refers to the security of the transmission of electronic data and information across cyberspace. It covers the technology, processes, practices, and response and mitigation measures designed to protect electronic information, data and information infrastructure from mischief, unauthorized use or disruption in cyberspace. Cyber security complements IT security. Cyber security operationalizes the IT security controls set out in subsection B.2.3 of Appendix B of the Directive on Security Management.
cyber security event
Any event, act, omission or situation that may be detrimental to government security, including threats, vulnerabilities and incidents.
Examples of cyber security events:
cyber security incident
Any event (or collection of events), act, omission or situation that has resulted in a compromise. Examples of cyber security incidents include:
cyber threat
An activity intended to compromise the security of an information system by altering the confidentiality, integrity, or availability of a system or the information it contains.
information technology
Any equipment or system that is used in the acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of information or data. It includes all matters concerned with the design, development, installation and implementation of information systems and applications.
insider threat
A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems.
(Source: National Cyber Security Strategy, Workbook Glossary)
internal enterprise services
A service provided by a Government of Canada department to other Government of Canada departments intended on a government-wide basis.
IT security
IT security is the discipline of applying security controls, security solutions, tools and techniques to protect IT assets against threats from compromises throughout their lifecycle. IT security focuses on the security of both electronic data assets and physical IT assets. In other words, it covers, for example, the security of files that are stored on devices, the security of the systems used to store them and the security of the devices themselves.
vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
zero-day exploit
An attack directed against a zero-day vulnerability.
zero-day vulnerability
A software vulnerability that is not yet known by the vendor, and therefore has not been mitigated.