这是indexloc提供的服务,不要输入任何密码

Protected B (Canada)

Google Cloud’s Protected B Compliance

The Canadian Center for Cyber Security (Cyber Centre) has developed a framework for assessing the security of cloud services called the Government of Canada: Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Program. The primary goal of the ITS Assessment Program is to provide assurance to Government of Canada (GC) departments and agencies that cloud services meet the GC public cloud security requirements for information and services up to Protected B. The ITS Assessment Program assesses the security posture, controls, and operational practices of specific cloud services offered by CSPs. It doesn’t certify the entire company, but rather evaluates particular services against defined GC security control profiles.

There are three components to a CSPs ITS assessment which are conducted by different groups within the GC: 1) the Cyber Centre’s Supply Chain Integrity (SCI) team assesses risks related to a company’s ownership, geolocation and product/service; 2) physical and personnel security assessment by the Public Services and Procurement Canada - Contract Security Program (PSPC CSP); and 3) the Cyber Centre assesses cloud services against GC Cloud Control Profiles: Protected B Medium (formerly referred to as PBMM) and the Protected B High Value Asset overlay (PBHVA).

Google Cloud has completed all three components of the ITS assessment, including the Cyber Center’s Supply Chain Integrity and IT cloud security assessment processes, as well as required physical and personnel security assessments. Canadian federal government customers that procure cloud services in accordance with the Contract Security Program must use the Data Boundary for Canada Protected B capability package.

Introduction

The Government of Canada (GC) classifies data using various security categorization levels (e.g., Protected A, Protected B, Confidential, Secret, and Top Secret) depending on the sensitivity of the information, and the potential harm that would occur if the information suffered a compromise of its confidentiality, integrity and/or availability. While cloud services can be used by GC departments and agencies, GC departments must first identify and categorize information to understand the security controls that should be applied.

What is Protected B?

"Protected" information can be categorized as either Protected A, Protected B, or Protected C, and applies to personal information, commercial confidential information, or any other information or assets that, if compromised, could reasonably be expected to cause injury to a non-national interest. More specifically, Protected B can include sensitive personal information such as: medical records, performance evaluation reports, detailed financial information, etc. The unauthorized disclosure of this type of information could cause serious injury to a person or organization like distress, financial loss, or damage to their reputation.

The GC has published policy instruments such as the Policy on Government Security PolicyDirective, and Guideline on Service and Digital, Contract Security Manual, and Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) that describe the physical, personnel, and IT security requirements, and controls that departments, agencies, and private sector organizations should consider for safeguarding sensitive government information.

What are the cloud-related security control requirements for Protected B?

For cloud, the security control requirements are described in Annex 3 of Information Technology Security Guidance (ITSG-33) – IT Security Risk Management: A Lifecycle Approach. The Cyber Center’s Medium Cloud Security Control Profile is used as the baseline of IT security requirements. Additionally, the GC has developed a Protected B High Value Assets (PBHVA) Cloud Security Control Profile which defines additional integrity and availability controls that can be applied as an enhancement to support Protected B workloads that have been identified to be high value asset systems.

Public Services and Procurement Canada (PSPC) Contract Security Program (CSP)

The PSPC CSP verifies personnel and physical security for cloud service contracts. This involves ensuring Google Cloud is registered in the PSPC CSP and holds the requisite organizational security clearance, and facilitates personnel security clearances for employees who have a business need to access Protected information or operation zones. PSPC also conducts physical security inspections at Google Cloud’s Canadian data centre locations to confirm secure operation zones, proper data safeguarding, controlled access, and contract security requirements are met.

Canadian Centre for Cyber Security (CCCS) Supply Chain Integrity (SCI)

The Cyber Center SCI team assesses company-related risk factors like ownership, location, and business practices, alongside technical risks of the product or service itself. The SCI team uses various sources to generate a risk rating, which contributes to the final cloud security assessment determination. Further information on the SCI process can be found in ITSAP.10.070, Cyber supply chain: An approach to assessing risk.

Canadian Centre for Cyber Security (CCCS) CSP IT Security Assessment Process

The Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Process (ITSM.50.100) consists of a detailed assessment of the cloud solution against the security controls, such as the Medium Cloud Profile and/or Protected B High Value Asset Overlay Profile. Google Cloud is responsible for providing evidence to demonstrate adherence to each of the security controls in the relevant control profile. The CCCS then issues a security assessment report summarizing their findings.

Google Cloud’s Protected B Compliance

Google Cloud has undergone assessment by the PSPC CSP’s organizational, physical, and personnel security requirements. Google Cloud has also completed the Canadian Centre for Cyber Security (CCCS) Cloud Service Provider (CSP) IT Security Assessment and Supply Chain Integrity (SCI) processes, and has been approved to support both Protected B Medium and Protected B High Value Asset workloads. You can access the CCCS summary report on-demand, at no additional cost, via Compliance Reports Manager.

Hosting Protected B Workloads on Google Cloud

Google Cloud’s investment in our security-by-default infrastructure ensures that security controls are built-in and pre-configured to enable customers to achieve various compliance levels without a traditional isolated government cloud infrastructure. 

Assured Workloads is a Google Cloud compliance offering designed to support customers in meeting various regulatory frameworks such as CJIS, FedRAMP (Moderate and High), Department of Defense IL2 / IL4 / IL5, Protected B and many others.

Canadian federal government customers interested in using Google Cloud services to process Protected workloads in alignment with the Contract Security Program requirements must use the Data Boundary for Canada Protected B capability package. Protected B-authorized services made available through Assured Workloads for Canada Protected B simplifies security and compliance for GC departments and agencies by implementing controls such as: guardrails to restrict Protected B customer data location to Canada, and technical support only provided only by adjudicated personnel security screened to Reliability Status (or above). The list of products and services that are supported by Assured Workloads for Canada Protected B can be found here.

Services in Scope

The following Google Cloud Services have undergone Protected B IT security assessment by the Canadian Centre for Cyber Security:

Protected B Medium

Access Approval

Access Context Manager

Access Transparency

Admin Console (incl. Admin SDK,Directory Sync)

AI Platform Data Labeling

AI Platform Neural Architecture Search

AI Platform Training and Prediction

Anthos Config Management (ACM)

Anthos Identity Service (AIS)

Anthos Service Mesh

Apigee

App Engine

Artifact Registry

Assured Workloads

AutoML Natural Language

AutoML Tables

AutoML Translation

AutoML Video

AutoML Vision

BeyondCorp Enterprise (note: split from Cloud Console)

BigQuery

BigQuery Data Transfer Service

Binary Authorization

Care Studio (formerly Cloud Healthcare Search)

Certificate Authority Service

Chronicle (Security Product)

Chronicle SOAR

Cloud Asset Inventory

Cloud Bigtable

Cloud Billing

Cloud Build

Cloud CDN

Cloud Composer

Cloud Console (without BeyondCorp Enterprise)

Cloud Console App

Cloud Data Fusion

Cloud Data Loss Prevention

Cloud Deployment Manager

Cloud DNS

Cloud Endpoints

Cloud External Key Manager (Cloud EKM)

Cloud Filestore

Cloud Functions

Cloud Functions for Firebase

Cloud Healthcare

Cloud Healthcare API

Cloud HSM

Cloud Identity

Cloud Identity-Aware Proxy

Cloud IDS

Cloud Interconnect

Cloud Key Management Service

Cloud Life Sciences (formerly Google Genomics)

Cloud Load Balancing

Cloud Logging

Cloud Monitoring

Cloud NAT (Network address Translation)

Cloud Natural Language API

Cloud Profiler

Cloud Router

Cloud Run (fully managed)

Cloud Run for Anthos

Cloud Scheduler

Cloud SDK

Cloud Shell

Cloud Source Repositories

Cloud Spanner

Cloud SQL

Cloud Storage

Cloud Storage for Firebase

Cloud Tasks

Cloud Trace

Cloud Translation

Cloud Vision

Cloud VPN

Cloud Workstations

Compute Engine

Connect

Contact Center AI

Container Registry

Data Catalog

Database Migration Service

Dataflow

Dataproc

Datastore

DataStream

Dialogflow

Document AI

Earth Engine

Eventarc

Firebase Authentication

Firestore

GCP Marketplace (formerly Cloud Launcher)

Generative AI for Vertex AI

GKE Hub

Google Cloud Armor

Google Kubernetes Engine

Identity & Access Management

Identity Platform

Insights

Key Access Justification (Access Sovereignty)

Looker Studio (including Pro, formerly Google Data Studio)

Memorystore

Network Connectivity Center

Network Intelligence Center

Network Service Tiers

Notebooks (formerly Vertex AI Workbench/AI Platform Notebooks)

Persistent Disk

Pub/Sub

reCAPTCHA Enterprise

Resource Manager API

Secret Manager

Security Command Center - Including Web Security Scanner (formerly Cloud Security Scanner)

Service Directory

Service Infrastructure (formerly Service Control; includes Service Management API and Service Consumer Management API)

Speech-to-Text

Storage Transfer Service

Talent Solutions

Text-to-Speech

Traffic Director

Vertex AI Forecast

Vertex AI Model Registry

Vertex AI Search (includes Agentspace)

Vertex ML Metadata

Vertex Model Monitoring

Vertex Online and Batch Prediction

Vertex Pipelines

Vertex Training

Video Intelligence API

Virtual Private Cloud (VPC)

VM Manager

VPC Service Controls

Web Risk API

Workflows

Workforce Identity Federation (BYOID)


Protected B High Value Asset (PBHVA)

Access Approval

Access Context Manager

Access Transparency

Admin Console (incl. Admin SDK,Directory Sync)

AI Platform Data Labeling

AI Platform Neural Architecture Search

AI Platform Training and Prediction

Anthos Config Management (ACM)

Anthos Identity Service (AIS)

Anthos Service Mesh

Apigee

App Engine

Artifact Registry

Assured Workloads

AutoML Natural Language

AutoML Tables

AutoML Translation

AutoML Video

AutoML Vision

BeyondCorp Enterprise (note: split from Cloud Console)

BigQuery

BigQuery Data Transfer Service

Binary Authorization

Care Studio (formerly Cloud Healthcare Search)

Certificate Authority Service

Chronicle (Security Product)

Chronicle SOAR

Cloud Asset Inventory

Cloud Bigtable

Cloud Billing

Cloud Build

Cloud CDN

Cloud Composer

Cloud Console (without BeyondCorp Enterprise)

Cloud Console App

Cloud Data Fusion

Cloud Data Loss Prevention

Cloud Deployment Manager

Cloud DNS

Cloud Endpoints

Cloud External Key Manager (Cloud EKM)

Cloud Filestore

Cloud Functions

Cloud Functions for Firebase

Cloud Healthcare

Cloud Healthcare API

Cloud HSM

Cloud Identity

Cloud Identity-Aware Proxy

Cloud IDS

Cloud Interconnect

Cloud Key Management Service

Cloud Life Sciences (formerly Google Genomics)

Cloud Load Balancing

Cloud Logging

Cloud Monitoring

Cloud NAT (Network address Translation)

Cloud Natural Language API

Cloud Profiler

Cloud Router

Cloud Run (fully managed)

Cloud Run for Anthos

Cloud Scheduler

Cloud SDK

Cloud Shell

Cloud Source Repositories

Cloud Spanner

Cloud SQL

Cloud Storage

Cloud Storage for Firebase

Cloud Tasks

Cloud Trace

Cloud Translation

Cloud Vision

Cloud VPN

Cloud Workstations

Compute Engine

Connect

Contact Center AI

Container Registry

Data Catalog

Database Migration Service

Dataflow

Dataproc

Datastore

DataStream

Dialogflow

Document AI

Earth Engine

Eventarc

Firebase Authentication

Firestore

GCP Marketplace (formerly Cloud Launcher)

GKE Hub

Google Cloud Armor

Google Kubernetes Engine

Identity & Access Management

Identity Platform

Insights

Key Access Justification (Access Sovereignty)

Looker Studio (including Pro, formerly Google Data Studio)

Memorystore

Network Connectivity Center

Network Intelligence Center

Network Service Tiers

Notebooks (formerly Vertex AI Workbench/AI Platform Notebooks)

Persistent Disk

Pub/Sub

reCAPTCHA Enterprise

Resource Manager API

Secret Manager

Security Command Center - Including Web Security Scanner (formerly Cloud Security Scanner)

Service Directory

Service Infrastructure (formerly Service Control; includes Service Management API and Service Consumer Management API)

Speech-to-Text

Storage Transfer Service

Talent Solutions

Text-to-Speech

Traffic Director

Vertex AI Forecast

Vertex AI Model Registry

Vertex ML Metadata

Vertex Model Monitoring

Vertex Online and Batch Prediction

Vertex Pipelines

Vertex Training

Video Intelligence API

Virtual Private Cloud (VPC)

VM Manager

VPC Service Controls

Web Risk API

Workflows

Workforce Identity Federation (BYOID)

Take the next step

Start building on Google Cloud with $300 in free credits and 20+ always free products.

Google Cloud