Guidance on securely configuring network protocols (version 2).: D97-3/40-062-2020E-PDF
"This document identifies and describes acceptable security protocols, and their appropriate methods of use, that organizations can implement to protect sensitive information. For GC departments and agencies, the guidance in this document applies to UNCLASSIFIED, PROTECTED A, and PROTECTED B information. An organization’s ability to securely transmit sensitive data and information is fundamental to the delivery of its programs and services. Using cryptographic security protocols ensures the confidentiality, integrity, and availability of information and helps provide protection against certain cyber intrusion threats. Data confidentiality, integrity, availability, stakeholder authentication and accountability, and non-repudiation are all benefits of properly configured security protocols"--Overview, page 3.
Permanent link to this Catalogue record:
publications.gc.ca/pub?id=9.893484&sl=0
| Department/Agency |
|
|---|---|
| Title | Guidance on securely configuring network protocols (version 2). |
| Series title |
|
| Publication type | Monograph - View Master Record |
| Language | [English] |
| Other language editions | [French] |
| Later edition | Guidance on securely configuring network protocols (version 3). |
| Format | Digital text |
| Electronic document | |
| Note(s) |
|
| Publishing information |
|
| Description | 1 online resource (35 pages). |
| Catalogue number |
|
| Subject terms |
Request alternate formats
To request an alternate format of a publication, complete the Government of Canada Publications email form. Use the form’s “question or comment” field to specify the requested publication.Page details
- Date modified: