Guidance on securely configuring network protocols (ITSP.40.062)

The January 2025 edition of the Canadian Centre for Cyber Security’s publication outlines security protocols and best practices for protecting sensitive information within the Government of Canada (GC). This document builds on previous versions, with a focus on UNCLASSIFIED, PROTECTED A, and PROTECTED B information. Effective from January 2025, it serves as a guide for organizations to securely transmit data, ensuring confidentiality, integrity, and availability while mitigating cyber threats.

### Overview of Security Protocols

The publication emphasizes the need for organizations to implement cryptographic security protocols tailored to their specific security needs. It highlights the critical importance of data confidentiality, integrity, availability, stakeholder authentication, and non-repudiation as key benefits of using properly configured security protocols. Organizations are encouraged to adopt approved algorithms and standards, referencing compliance with the National Institute of Standards and Technology (NIST) guidelines.

### IT Security Risk Management

Organizations are advised to incorporate IT security risk management practices as outlined in IT Security Risk Management: A Lifecycle Approach (ITSG-33). This includes defining security needs, deploying security controls, continuously monitoring them, and conducting assessments. Proper implementation requires adherence to both departmental and information system-level activities, ensuring that all measures contribute collectively to the organization’s security posture.

### Recommendations for Protocol Configurations

The document categorizes configurations into three groups: «Recommended,» «Sufficient,» and «Phase Out.» Recommended configurations should always be implemented where possible, while Sufficient configurations can be used when necessary adaptations must be made. Phase Out configurations are outdated and should be transitioned to recommended alternatives promptly.

### Public Key Infrastructure (PKI)

The publication discusses the role of Public Key Infrastructure in managing public keys for security services associated with PKI-enabled protocols such as TLS and SSH. It stresses not to reuse public key pairs across different protocols and recommends using X.509 version 3 certificate formats for public key certificates while ensuring compliance with the latest cryptographic guidelines.

### Transport Layer Security (TLS)

Transport Layer Security (TLS) is highlighted as a major protocol for safeguarding internet communications. Organizations are advised to default to TLS 1.3 and phase out earlier versions such as TLS 1.0 and TLS 1.1. The document recommends specific cipher suites for both TLS 1.3 and 1.2, and emphasizes the importance of securing email communications via SMTP over TLS.

### Internet Protocol Security (IPsec)

The combination of IPsec and the Internet Key Exchange Protocol Version 2 (IKEv2) is discussed as a method for secure data tunneling at the network layer. Recommendations include the use of strong authentication methods like digital signatures instead of pre-shared keys (PSKs) and guidance on maintaining secure key exchange practices.

### SSH and SNMP Recommendations

For Secure Shell (SSH), the preferred version is SSH 2.0, and strong authentication methods such as public key authentication are encouraged. Administrators are also advised to utilize best practices for Simple Network Management Protocol (SNMP), recommending SNMPv3 for enhanced security features.

### S/MIME and Content Security

The publication outlines guidance for Secure/Multipurpose Internet Mail Extensions (S/MIME), emphasizing the importance of using strong digest algorithms in line with current standards, as well as cipher algorithms for securing key material.

### Preparing for Post-Quantum Cryptography

While current standards remain secure against quantum threats, the document emphasizes the need for organizations to prepare for the potential future impacts of quantum computing on cryptography. Initial steps include assessing information sensitivity, updating IT systems, and educating personnel about the risks associated with quantum advancements.

### Conclusion

In summary, this comprehensive publication provides a framework for implementing effective cryptographic security protocols to protect sensitive government information. It underscores the importance of careful configuration of security settings, continuous risk assessment, and the necessity of transitioning outdated protocols to more secure alternatives in alignment with evolving standards. Organizations are encouraged to stay proactive in enhancing their cybersecurity frameworks while keeping abreast of advancements in cryptographic practices.

Enlace de la fuente, haz clic para tener más información

Artículos y alertas de seguridad

Consultar más contenidos y alertas

Alertas y noticias de seguridad de la información

Contacta

Contacta con nosotros para obtener soluciones integrales en IT y seguridad de la información

Estamos encantados de responder cualquier pregunta que puedas tener, y ayudarte a determinar cuáles de nuestros servicios se adaptan mejor a tus necesidades.

Nuestros beneficios:
¿Qué sucede a continuación?
1

Programamos una llamada según tu conveniencia.

2

Realizamos una reunión de descubrimiento y consultoría.

3

Preparamos una propuesta.

Agenda una consulta gratuita