Google Cloud’s Protected B Compliance
The Canadian Center for Cyber Security (Cyber Centre) has developed a framework for assessing the security of cloud services called the Government of Canada: Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Program. The primary goal of the ITS Assessment Program is to provide assurance to Government of Canada (GC) departments and agencies that cloud services meet the GC public cloud security requirements for information and services up to Protected B. The ITS Assessment Program assesses the security posture, controls, and operational practices of specific cloud services offered by CSPs. It doesn’t certify the entire company, but rather evaluates particular services against defined GC security control profiles.
There are three components to a CSPs ITS assessment which are conducted by different groups within the GC: 1) the Cyber Centre’s Supply Chain Integrity (SCI) team assesses risks related to a company’s ownership, geolocation and product/service; 2) physical and personnel security assessment by the Public Services and Procurement Canada - Contract Security Program (PSPC CSP); and 3) the Cyber Centre assesses cloud services against GC Cloud Control Profiles: Protected B Medium (formerly referred to as PBMM) and the Protected B High Value Asset overlay (PBHVA).
Google Cloud has completed all three components of the ITS assessment, including the Cyber Center’s Supply Chain Integrity and IT cloud security assessment processes, as well as required physical and personnel security assessments. Canadian federal government customers that procure cloud services in accordance with the Contract Security Program must use the Data Boundary for Canada Protected B capability package.
Introduction
The Government of Canada (GC) classifies data using various security categorization levels (e.g., Protected A, Protected B, Confidential, Secret, and Top Secret) depending on the sensitivity of the information, and the potential harm that would occur if the information suffered a compromise of its confidentiality, integrity and/or availability. While cloud services can be used by GC departments and agencies, GC departments must first identify and categorize information to understand the security controls that should be applied.
What is Protected B?
"Protected" information can be categorized as either Protected A, Protected B, or Protected C, and applies to personal information, commercial confidential information, or any other information or assets that, if compromised, could reasonably be expected to cause injury to a non-national interest. More specifically, Protected B can include sensitive personal information such as: medical records, performance evaluation reports, detailed financial information, etc. The unauthorized disclosure of this type of information could cause serious injury to a person or organization like distress, financial loss, or damage to their reputation.
The GC has published policy instruments such as the Policy on Government Security Policy, Directive, and Guideline on Service and Digital, Contract Security Manual, and Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) that describe the physical, personnel, and IT security requirements, and controls that departments, agencies, and private sector organizations should consider for safeguarding sensitive government information.
What are the cloud-related security control requirements for Protected B?
For cloud, the security control requirements are described in Annex 3 of Information Technology Security Guidance (ITSG-33) – IT Security Risk Management: A Lifecycle Approach. The Cyber Center’s Medium Cloud Security Control Profile is used as the baseline of IT security requirements. Additionally, the GC has developed a Protected B High Value Assets (PBHVA) Cloud Security Control Profile which defines additional integrity and availability controls that can be applied as an enhancement to support Protected B workloads that have been identified to be high value asset systems.
Public Services and Procurement Canada (PSPC) Contract Security Program (CSP)
The PSPC CSP verifies personnel and physical security for cloud service contracts. This involves ensuring Google Cloud is registered in the PSPC CSP and holds the requisite organizational security clearance, and facilitates personnel security clearances for employees who have a business need to access Protected information or operation zones. PSPC also conducts physical security inspections at Google Cloud’s Canadian data centre locations to confirm secure operation zones, proper data safeguarding, controlled access, and contract security requirements are met.
Canadian Centre for Cyber Security (CCCS) Supply Chain Integrity (SCI)
The Cyber Center SCI team assesses company-related risk factors like ownership, location, and business practices, alongside technical risks of the product or service itself. The SCI team uses various sources to generate a risk rating, which contributes to the final cloud security assessment determination. Further information on the SCI process can be found in ITSAP.10.070, Cyber supply chain: An approach to assessing risk.
Canadian Centre for Cyber Security (CCCS) CSP IT Security Assessment Process
The Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Process (ITSM.50.100) consists of a detailed assessment of the cloud solution against the security controls, such as the Medium Cloud Profile and/or Protected B High Value Asset Overlay Profile. Google Cloud is responsible for providing evidence to demonstrate adherence to each of the security controls in the relevant control profile. The CCCS then issues a security assessment report summarizing their findings.
Google Cloud has undergone assessment by the PSPC CSP’s organizational, physical, and personnel security requirements. Google Cloud has also completed the Canadian Centre for Cyber Security (CCCS) Cloud Service Provider (CSP) IT Security Assessment and Supply Chain Integrity (SCI) processes, and has been approved to support both Protected B Medium and Protected B High Value Asset workloads. You can access the CCCS summary report on-demand, at no additional cost, via Compliance Reports Manager.
Google Cloud’s investment in our security-by-default infrastructure ensures that security controls are built-in and pre-configured to enable customers to achieve various compliance levels without a traditional isolated government cloud infrastructure.
Assured Workloads is a Google Cloud compliance offering designed to support customers in meeting various regulatory frameworks such as CJIS, FedRAMP (Moderate and High), Department of Defense IL2 / IL4 / IL5, Protected B and many others.
Canadian federal government customers interested in using Google Cloud services to process Protected workloads in alignment with the Contract Security Program requirements must use the Data Boundary for Canada Protected B capability package. Protected B-authorized services made available through Assured Workloads for Canada Protected B simplifies security and compliance for GC departments and agencies by implementing controls such as: guardrails to restrict Protected B customer data location to Canada, and technical support only provided only by adjudicated personnel security screened to Reliability Status (or above). The list of products and services that are supported by Assured Workloads for Canada Protected B can be found here.
The following Google Cloud Services have undergone Protected B IT security assessment by the Canadian Centre for Cyber Security:
Protected B Medium
Admin Console (incl. Admin SDK,Directory Sync)
AI Platform Neural Architecture Search
AI Platform Training and Prediction
Anthos Config Management (ACM)
BeyondCorp Enterprise (note: split from Cloud Console)
BigQuery Data Transfer Service
Care Studio (formerly Cloud Healthcare Search)
Cloud Console (without BeyondCorp Enterprise)
Cloud External Key Manager (Cloud EKM)
Cloud Life Sciences (formerly Google Genomics)
Cloud NAT (Network address Translation)
GCP Marketplace (formerly Cloud Launcher)
Key Access Justification (Access Sovereignty)
Looker Studio (including Pro, formerly Google Data Studio)
Notebooks (formerly Vertex AI Workbench/AI Platform Notebooks)
Security Command Center - Including Web Security Scanner (formerly Cloud Security Scanner)
Vertex AI Search (includes Agentspace)
Vertex Online and Batch Prediction
Workforce Identity Federation (BYOID)
Protected B High Value Asset (PBHVA)
Admin Console (incl. Admin SDK,Directory Sync)
AI Platform Neural Architecture Search
AI Platform Training and Prediction
Anthos Config Management (ACM)
BeyondCorp Enterprise (note: split from Cloud Console)
BigQuery Data Transfer Service
Care Studio (formerly Cloud Healthcare Search)
Cloud Console (without BeyondCorp Enterprise)
Cloud External Key Manager (Cloud EKM)
Cloud Life Sciences (formerly Google Genomics)
Cloud NAT (Network address Translation)
GCP Marketplace (formerly Cloud Launcher)
Key Access Justification (Access Sovereignty)
Looker Studio (including Pro, formerly Google Data Studio)
Notebooks (formerly Vertex AI Workbench/AI Platform Notebooks)
Security Command Center - Including Web Security Scanner (formerly Cloud Security Scanner)
Protected B Medium
Start building on Google Cloud with $300 in free credits and 20+ always free products.