Due to maintenance, the Publications.gc.ca website may operate intermittently between 5:00 am ET until 9:00 am ET on Sunday, October 22, 2017.
Guidance on securely configuring network protocols: D97-3/62-2016E-PDF
"The Government of Canada’s (GC) ability to securely transmit sensitive data and information is fundamental to the delivery of programs and services. Cryptographic security protocols provide security mechanisms which can be used to ensure the confidentiality, integrity, and authenticity of sensitive GC information. Data confidentiality, integrity, authenticity, stakeholder authentication and accountability, and non-repudiation are all benefits of properly configured security protocols. Various protocols may be required to satisfy security requirements, and each protocol should be selected and implemented to ensure all requirements are met. The information in this publication identifies and describes acceptable security protocols and their appropriate methods of use to ensure continued protection of UNCLASSIFIED, PROTECTED A, and PROTECTED B information"--Overview, p. 3.
|Department/Agency||Communications Security Establishment (Canada)|
|Title||Guidance on securely configuring network protocols|
|Series Title||Practitioner series, information technology security guidance ;|
|Publication Type||Series - View Master Record|
|Other Language Editions||[French]|
|Electronic Document|| |
Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject to the Government of Canada Web Standards and has not been altered or updated since it was archived. Please contact the authoring department to request a format other than those available.
We invite you to consult the Frequently Asked Questions page for additional information regarding the Archived Content notice.
Note: The URLs contained in this/these document(s) may no longer be functional
|Note||Issued also in French under title: Conseils sur la configuration sécurisée des protocoles réseau. Cover title. "Unclassified." "August 2016."|
|Number of Pages||22 p.|
|Subject Terms||Computer security, Cryptography, Federal government|
- Date modified: