<?xml version="1.0" encoding="UTF-8"?><marc:collection xmlns:marc="http://www.loc.gov/MARC21/slim">
  <marc:record>
    <marc:leader>00000nam  2200000zi 4500</marc:leader>
    <marc:controlfield tag="001">9.893876</marc:controlfield>
    <marc:controlfield tag="003">CaOODSP</marc:controlfield>
    <marc:controlfield tag="005">20250507143429</marc:controlfield>
    <marc:controlfield tag="006">m     o  d f      </marc:controlfield>
    <marc:controlfield tag="007">cr cn|||||||||</marc:controlfield>
    <marc:controlfield tag="008">201123e20201014onc     ob   f000 0 eng d</marc:controlfield>
    <marc:datafield tag="040" ind1=" " ind2=" ">
      <marc:subfield code="a">CaOODSP</marc:subfield>
      <marc:subfield code="b">eng</marc:subfield>
      <marc:subfield code="e">rda</marc:subfield>
      <marc:subfield code="c">CaOODSP</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="043" ind1=" " ind2=" ">
      <marc:subfield code="a">n-cn---</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="086" ind1="1" ind2=" ">
      <marc:subfield code="a">D97-4/50-030-2020E-PDF</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="245" ind1="0" ind2="0">
      <marc:subfield code="a">Cyber security considerations for consumers of managed services.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="264" ind1=" " ind2="1">
      <marc:subfield code="a">[Ottawa] : </marc:subfield>
      <marc:subfield code="b">Communications Security Establishment = Centre de la sécurité des telecommunications, </marc:subfield>
      <marc:subfield code="c">October 14, 2020.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="300" ind1=" " ind2=" ">
      <marc:subfield code="a">1 online resource (33 pages).</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="336" ind1=" " ind2=" ">
      <marc:subfield code="a">text</marc:subfield>
      <marc:subfield code="b">txt</marc:subfield>
      <marc:subfield code="2">rdacontent</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="337" ind1=" " ind2=" ">
      <marc:subfield code="a">computer</marc:subfield>
      <marc:subfield code="b">c</marc:subfield>
      <marc:subfield code="2">rdamedia</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="338" ind1=" " ind2=" ">
      <marc:subfield code="a">online resource</marc:subfield>
      <marc:subfield code="b">cr</marc:subfield>
      <marc:subfield code="2">rdacarrier</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="490" ind1="1" ind2=" ">
      <marc:subfield code="a">Management ; </marc:subfield>
      <marc:subfield code="v">ITSM.50.030</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">Issued also in French under title: Facteurs à considérer par les clients de services gérés en matière de cybersécurité.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">"Canadian Centre for Cyber Security."</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">Cover title.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">"Unclassified."</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">Issued also in HTML format.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="504" ind1=" " ind2=" ">
      <marc:subfield code="a">Includes bibliographical references (page 33).</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="520" ind1=" " ind2=" ">
      <marc:subfield code="a">"This document introduces different security topics that you should consider before and during the process of procuring managed services. Each section of this document includes a checklist of actions you should take and questions you should ask a service provider before signing up for the service. You can use this document as a starting point when discussing service security in your organization. We have included considerations that can help you articulate your business and security requirements and the service levels that you expect when using managed services"--Overview, page 3.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="650" ind1=" " ind2="0">
      <marc:subfield code="a">Computer security</marc:subfield>
      <marc:subfield code="z">Canada.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="650" ind1=" " ind2="0">
      <marc:subfield code="a">Business enterprises</marc:subfield>
      <marc:subfield code="x">Computer networks</marc:subfield>
      <marc:subfield code="x">Security measures</marc:subfield>
      <marc:subfield code="z">Canada.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="710" ind1="2" ind2=" ">
      <marc:subfield code="a">Canadian Centre for Cyber Security, </marc:subfield>
      <marc:subfield code="e">issuing body.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="775" ind1="0" ind2="8">
      <marc:subfield code="t">Facteurs à considérer par les clients de services gérés en matière de cybersécurité.</marc:subfield>
      <marc:subfield code="w">(CaOODSP)9.893878</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="830" ind1="#" ind2="0">
      <marc:subfield code="a">Management series (Communications Security Establishment (Canada))</marc:subfield>
      <marc:subfield code="v">ITSM.50.030.</marc:subfield>
      <marc:subfield code="w">(CaOODSP)9.842856</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="856" ind1="4" ind2="0">
      <marc:subfield code="q">PDF</marc:subfield>
      <marc:subfield code="s">719 KB</marc:subfield>
      <marc:subfield code="u">https://publications.gc.ca/collections/collection_2020/cstc-csec/D97-4-50-030-2020-eng.pdf</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="856" ind1="4" ind2=" ">
      <marc:subfield code="q">HTML</marc:subfield>
      <marc:subfield code="s">N/A</marc:subfield>
      <marc:subfield code="u">https://cyber.gc.ca/en/guidance/cyber-security-considerations-consumers-managed-services-itsm50030</marc:subfield>
    </marc:datafield>
  </marc:record>
</marc:collection>
