120 likes | 136 Views
Learn about Statistics Canada's strategic approach to IT security, encompassing business requirements, threats, tactics, challenges, and overall strategy for maintaining data integrity and confidentiality. Explore the organizational structure, security measures, and ongoing operational support in place to safeguard respondent information while ensuring accessibility. Discover the comprehensive security practices, protocols, and technologies used to counter unauthorized disclosure, prevent data breaches, and combat evolving threats in the digital landscape.
E N D
Statistics Canada’s strategic approach to IT Security OECD Conference on IT Security Paris, April 19th and 20th, 2001 • Dave Venables • Director, Informatics Technology Services Division • Statistics Canada • (613) 951-8428 • dave.venables@statcan.ca
Overview • Business requirements • Threats • Overall strategy • Tactics • Challenges • Summary
Organisational Character • Statistics Canada comprises: • 5100 employees at Headquarters • 650 employees in 9 Regional Offices • 1200 interviewers in the Regions • Informatics is integral to our business: • 850 IT Staff, 400 in Central Informatics • 7,000 workstations; 300 Servers; 1 Mainframe • Strong corporate culture • Security
Business requirements • Maintain respondent confidence • Protect respondent confidentiality • Preserve data integrity • Ensure data availability • Facilitate data accessibility • Support ongoing operations
Threats • Unauthorised disclosure • Data collection • Collected micro-data and Published data • Authentication • Collection and Access • Accessibility • denial of service • Viruses • known, variants and unknown
Overall Strategy • Centrally managed infrastructure • Dual Network • Prevention • Proactive • Balance operational flexibility with safeguards
Tactics • Dual network with air gap • Internal network (A) for confidential data • External network (B) for published data • Robotic A/B switch • Manual A/B switch • Firewall with hardened OS • Automatic encryption • between HQ, RO and interviewers
Tactics • Interviewer Laptop - full disk encryption • Internal access controls • Token based remote access • Anti-virus desktop software • Anti-virus software at firewall • Attribute checking of email at firewall • Inbound overnight mail queued
Tactics • Oath • Clear security policy • Clear security practices • Proactive security awareness program • Regular automated policy reminder • Proactive entry attempts
Challenges • Full disk encryption for all laptops • Increased electronic data reporting • External data research centres • Virus detection for encrypted information • Wireless technology • PDAs • Other new technology
Summary • Strong security culture • Some operational inconvenience • Room for improvement • Continual reassessment • High respondent confidence • High level of protection