Policy Principles

5. Policy Principles #

Security and privacy by design

All solutions must embed security and privacy controls from the outset. Designs must minimize data collected and retained, restrict access to least privilege, and support subject‑rights, configurable retention, and secure deletion. Where applicable privacy law or contract is stricter than this policy, the stricter requirement applies.

Canada‑only residency by default

Personal information must be stored and accessed in Canada by default. Any exception requires a documented risk assessment and, if PI is involved, a DPIA, with technical and contractual safeguards and a defined expiry for re‑validation. PENDING: Residency exception package contents and approval workflow

Standard identity and least privilege

Solutions must support SSO with CLD’s IdP, enforce MFA for administrative roles and Restricted data access, and implement RBAC/ABAC with clearly scoped roles. Service accounts must be non‑interactive, least‑privilege, vaulted, and rotated. PENDING: IdP/protocols; standard roles; SCIM/JIT expectation

Measurable gates and evidence

Releases must pass defined SDLC gates (Design, Pre‑Production, Go‑Live) with a minimal, consistent evidence package (e.g., SBOM, SAST/SCA/DAST summaries, change/rollback plan, updated logging/data‑flow where applicable, UAT sign‑off). Evidence must be reviewable and retained. PENDING: Final evidence list, SBOM format and delivery location

Logging, monitoring, and SIEM readiness

Security/audit events must be comprehensive, tamper‑resistant, and SIEM‑ready, capturing who/when/where/what/outcome and a correlation ID, with time sync (UTC) and sensitive data redaction. Vendors must operate a SIEM per contract; CLD may require log forwarding to its SIEM. PENDING: CLD SIEM forwarding decision, ingestion method, minimum fields, retention months

Testing and continuous assurance

Each release must complete pre‑production security testing appropriate to risk (SAST, SCA with SBOM, secrets scanning, DAST for web/API; container/IaC scans when applicable). Vendors must conduct an annual independent penetration test (and after material changes) and provide remediation plans with verification. Releases are blocked on unresolved Critical/High issues unless an ISO‑approved waiver with compensating controls exists. PENDING: Fail‑gate thresholds; pentest report sharing scope

Vulnerability remediation SLAs

Discovered vulnerabilities and misconfigurations must be triaged, tracked, and remediated within defined timeframes, with emergency handling for exploited issues, and evidence of closure. Proposed SLAs: Critical 7 days, High 30 days, Medium 60 days, Low 90 days. PENDING: Confirm or adjust SLAs; notification thresholds

API and file‑upload protections

APIs must use OAuth 2.0/OIDC (user flows via Auth Code + PKCE; service‑to‑service via Client Credentials or mTLS), least‑privilege scopes, input validation, schema enforcement, and rate‑limiting. File uploads must be size/type‑restricted, scanned by AV/antimalware, and processed without retaining sensitive metadata (e.g., EXIF/GPS) unless required. PENDING: Allowed grants, token TTLs, scope conventions; upload size/types; AV behavior; EXIF rule

Operational resilience

Solutions must meet defined availability objectives, maintain encrypted and verifiable backups, and practice recovery with documented runbooks and rollback plans. RTO/RPO targets are set by solution tier and validated through periodic restore tests with retained evidence. PENDING: Tiers and targets; restore cadence; immutability/object‑lock requirement

Subprocessor governance

Vendors must disclose and obtain approval before engaging subprocessors that store, process, or access CLD data, flow down equivalent obligations contractually, and provide annual compliance artifacts (e.g., SOC 2 Type 2). PENDING: Notice lead time; prohibited jurisdictions; CLD approver

Exceptions are temporary and controlled

Any deviation from this policy requires a written exception with scope, rationale, risk assessment, compensating controls, named owner, and expiry; ISO recommends and Executive Sponsor approves. Privacy‑impacting exceptions require Legal/Privacy review. PENDING: Exception template location