GovCloud Policy for Trinidad & Tobago
GovCloud Policy for Trinidad & Tobago
MARCH 2020
List of Abbreviations
ii
WoG Whole of Government
Table of Contents
List of Abbreviations ............................................................................................................................................. ii
Terminology .......................................................................................................................................................... v
1. Introduction.................................................................................................................................................. 1
2. Background................................................................................................................................................... 1
3. Purpose ........................................................................................................................................................ 2
4. Statement ..................................................................................................................................................... 2
5. Principles ...................................................................................................................................................... 3
6. Scope ............................................................................................................................................................ 4
7. Objective: Maximising the Value of Cloud Computing ................................................................................ 4
8. Practical Considerations ............................................................................................................................... 5
9. Action Plan ................................................................................................................................................... 5
10. A Hybrid Cloud Computing Model for GoRTT- GovCloud............................................................................. 6
10.1 SaaS via GovCloud ........................................................................................................................... 6
10.2 Opt-out of GovCloud ....................................................................................................................... 6
11. Cloud Service Providers Catalog ................................................................................................................... 7
12. Essential Considerations for the Adoption of Cloud Computing Solutions ................................................. 8
12.1 Human Capital Requirements ......................................................................................................... 8
12.2 Digital Information Security Management...................................................................................... 8
12.3 Data Classification ........................................................................................................................... 9
12.4 Compliance with Legislative Framework....................................................................................... 11
12.5 Legislative and Regulatory Review ................................................................................................ 12
12.6 Data Ownership............................................................................................................................. 12
12.7 Funding, Asset Management and Enterprise Licensing Impact .................................................... 13
12.8 Procurement Compliance.............................................................................................................. 13
12.9 Contract Agreements .................................................................................................................... 14
12.10 Interoperability and Portability ................................................................................................... 14
13. Practical Methodology for Migration to Cloud .......................................................................................... 14
14. Best Practice Exchange............................................................................................................................... 16
15. Policy Review.............................................................................................................................................. 17
APPENDIX I Cloud Computing: Characteristics and Models ............................................................................... 17
APPENDIX II Benefits of Cloud Computing for GoRTT......................................................................................... 21
iii
APPENDIX III Process For Administration of Opt-Out From Whole of Government (Wog) Cloud Computing
Arrangements ..................................................................................................................................................... 23
APPENDIX IV Guidelines for Protecting the Integrity of Data, Systems and Their Users .................................... 25
iv
Terminology
Cloud First – A cloud first approach involves the default delivery of ICT products and services from a
cloud-based infrastructure rather than from an on-premise, private infrastructure owned by the
Government Ministry, Department or Agency (MDA). In this approach, various cloud computing
solutions are considered first and are preferred. Non-cloud delivered services are considered only if a
cloud solution is deemed not to be feasible.
Consider Cloud – A consider cloud approach involves the inclusion of cloud delivered services as
options that must be considered in the choice set and evaluation process for the acquisition of ICT
solutions. It does not prescribe cloud delivered services and solutions as the only acceptable, default
option.
Cloud Native – A native cloud approach involves the design, deployment and operations of
applications and service processes specifically for delivery and support via various cloud computing
architecture.
Cloud Computing – (also called simply, “the cloud”) describes the act of storing, managing and
processing data online — as opposed to the organisation’s own physical computer or network.
Since the Cloud is a broad collection of services, organisations can choose where, when, and
how they use Cloud Computing.
Cloud Computing is a general term that sits over a variety of services from Infrastructure as a
Service (IaaS) at the base, through Platform as a Service (PaaS) as a development tool and
through to Software as a Service (SaaS) replacing on premise software applications.
v
1. Introduction
Trinidad and Tobago is a small, twin island nation that must be competitive in an
increasingly digitally connected global environment, where technological changes are rapidly
unfolding. These changes introduce opportunities as well as new risks, challenges and
complexities. It is incumbent on a forward thinking Government to create the necessary policies
to leverage the benefits of developments in technology to improve the lives of all citizens.
Like many of its global counterparts, the Government of the Republic of Trinidad and
Tobago (GoRTT) is faced with growing demands for greater accountability, improved public
service delivery and faster implementation of appropriate, citizen-focused public sector
programmes. In order for these demands to be met, the public service must become agile,
responsive and cost efficient.
2. Background
Over the past two decades, significant investments have been made in public sector
computerisation and digitisation. In moving forward, it is important to acknowledge and build
upon this progress.
One of the five (5) themes of GoRTT’s National Development Strategy for 2016 – 2030,
Vision 2030, is “Promoting Good Governance and Service Excellence”1. The National ICT Plan
2018 - 2022 is in alignment with this theme. The Plan’s Strategic Thrust 3: Enhancing Public
Service Delivery, speaks to “ensuring the use of Information and Communication Technology
(ICT) to achieve institutional strengthening and transformation of the delivery of public goods
and services”2. The provision of secure, reliable, cost effective ICT solutions is a potent
instrument of good governance. Relevant national ICT investments can foster greater
collaboration, innovation and improved productivity in the public sector.
Globally, cloud computing has emerged as a major paradigm shift in the economics of
acquiring, accessing, scaling and managing ICTs. The traditional capital expenditure intensive
model of Governments being the owners of ICT assets is being superseded by cloud computing.
Cloud computing supports a usage based, shared services consumption model. The antecedents
to the adoption of Cloud Computing in Trinidad and Tobago is outlined in Appendix I.
1
National Development Strategy 2016-2030 (Vision 2030) p.48
2 th
National ICT Plan 2018 to 2022: Cabinet Approved 13 August, 2018
1
The promise and the risks of cloud computing must be clearly identified, understood and
appropriately managed. Thus, the strong interest, within the national community of
information technology practitioners in the wider use of cloud platforms in the public sector,
must be balanced with the necessary due diligence.
GoRTT has identified the wider adoption of cloud computing as a key mechanism for
maximising returns on ICT investments to support enhanced delivery of public services. A
critical success factor in this regard is the consideration to be given by Ministries, Departments
and Agencies (MDAs) for the use of cloud based solutions which are secure, fit for purpose,
comply with existing legislation and provide value for money as defined by the Public
Procurement and Disposal of Public Property Act, 20153. This policy fully acknowledges the
Government’s obligation to protect the data and privacy of all citizens.
3. Purpose
The purpose of the GoRTT CLOUD COMPUTING CONSIDERATION POLICY (the Policy) is to
provide the requisite clarity, guidance and encouragement for the wider adoption of cloud
services by MDAs. The Policy provides guidance for the use of cloud computing resources in a
responsible and structured manner that will ensure the security of Government and citizen
data.
4. Statement
Trinidad and Tobago’s Government MDAs will:
• evaluate cloud services for new ICT solutions. In cases where the transition of current
non-cloud operational services represent the best value for money, MDAs will choose
cloud services where such services represent the best value for money, are compliant
with data legislation and provide adequate management of risk compared to other
available options;
3
The Public Procurement and Disposal of Public Property Act, 2015
http://www.ttparliament.org/legislations/a2015-01.pdf
2
establish information sharing initiatives on adoption of cloud delivered services such as
a repository of case studies, best practices and practical lessons to enable MDAs to learn
from the experiences of innovators and early adopters. This will also seek to strike the
requisite balance between trying many services to see what is most suitable and
combining expenditure with fewer suppliers to leverage better discounts.
5. Principles
The following principles outline GoRTT’s priorities in its adoption of cloud services.
Cloud delivered services consumption costs be fully understood – Personnel at MDAs
are to be trained in planning, consuming and leveraging cloud services that enable
the achievement of public sector mandates. Cloud delivered service costs are fully
understood and payments are based on usage.
High agility, scalability and mobility – Computing resources are available in real
time, on demand, anywhere, on any device and are not limited to the physical
constraints of MDAs’ owned infrastructure.
Strategic ICT Delivery – MDAs’ ICT personnel work alongside business managers to
deliver strategic objectives and enhance service delivery, while dedicating minimal
resources to the management of physical assets.
Holistic Information Security protocols - MDAs are able to leverage the capabilities of
mature cloud providers with robust, best practice information security protocols to
monitor and respond to threats. Secure, cloud services align with and complement
MDAs security policies and practices that are standardised and documented.
Resilient services that ensure business continuity - The failure of one component of
cloud delivered services has little impact on overall service availability and reduces
the risk of downtime. MDAs adopt cloud services that are consistent with their
business continuity and disaster recovery plans.
3
Risk-based Decision Making - Agencies identify, assess and understand the risks of
cloud services, including the security and privacy of data being stored and maintained
by third party providers and duly consider these risks in their cloud services planning
process.
6. Scope
The Cloud Policy applies to all Government Ministries, Departments and Agencies
(MDAs).
This “consider cloud” policy allows for the incorporation of experience gained over time
in the rollout of WoG cloud computing based solutions and platforms. As the associated cloud
economics, risks and benefits within Trinidad and Tobago’s unique domestic landscape become
more fully understood, the associated policy will be re-examined and updated to reflect
changes to the ICT environment and developments in the cloud services space.
Accordingly, the Government’s movement to Cloud Computing in its various forms will
be multi-phased and progressive rather than a singular event.
1. Raise the awareness of the potential benefits associated with the use of cloud
computing solutions by Government to deliver more agile, scalable and responsive
public services. Appendix II outlines benefits associated with cloud delivered services.
2. Provide strategic direction and clarity for the wider adoption of appropriate cloud
computing services across the public sector, with appropriate consideration for data
classification, information security management and structured processes.
4
An approach that mandates MDAs to consider cloud-based ICT delivered services as part of its ICT strategy
4
3. Establish the various mechanisms through which cloud computing resources can be
securely and responsibly accessed by the public sector.
4. Encourage the use of cloud delivered services and applications where they are secure,
fit for purpose and appropriate for the relevant class of data.
6. Enable and support collaborative cloud computing initiatives across the public sector
aimed at facilitating best practice exchange and continuous service delivery
improvements.
8. Practical Considerations
MDAs need to consider the following factors when procuring cloud services:
value for money – including that the service is fit for purpose - as defined in The
Public Procurement and Disposal of Public Property Act, 2015;
9. Action Plan
An action plan will be developed for the implementation of cloud delivered services by
MDAs with requisite timelines and milestone activities.
5
10. A Hybrid Cloud Computing Model for GoRTT
The Government Communications Backbone, GovNeTT, will be leveraged to deliver a
National Government Cloud (GovNeTT NG). A hybrid cloud deployment model in a multi-
tenanted environment will be used to deliver all three (3) cloud service models – Software as a
Service (SaaS); Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) to MDAs and
the wider public sector.
The hybrid Government Cloud (GovNeTT NG) environment provides MDAs with a
mixture of on-island private cloud for confidential, restricted or sensitive data that requires a
higher set of controls than data stored in the public cloud.
Private cloud services, for the storage of MDAs confidential and restricted data, will be
hosted within GoRTT approved Data Center(s).
b) where the current sectoral or MDA regulations prohibit the use of GovNeTT NG;
6
c) where international arrangements provide for access to proprietary cloud delivered
services and specialised content, outside the scope of GovNeTT NG such as that which
obtains in the area of Health Care.
d) where educational and non-profit arrangements provide for cloud delivered services,
software and productivity suites at no cost, or at a cost lower than what obtains via
GovNeTT NG.
Ensures CSPs meet Government’s Cloud Standards. The accredited list of cloud
vendors would be pre-vetted to ensure that they are financially stable and that
their services meet or exceed the mandatory risk management and security
controls for Government Cloud Standards and. For the operations of
Government Cloud, all contracts and service level agreements are subject to the
Laws and Regulations of the Republic of Trinidad and Tobago. Any claims raised
shall be resolved in the legal jurisdiction of the Republic of Trinidad and Tobago.
7
12. Essential Considerations for the Adoption of Cloud Computing
Solutions
The Cloud Policy document outlines the key considerations and conditions for the use of
cloud computing in the public sector. It recognises that each MDA will have specific needs for
data security, information and security assurance and privacy, which will influence its choice of
cloud services and deployment models. Thus, all relevant security and privacy risk impacts must
be thoroughly assessed and managed by individual MDAs based on their unique mandate,
budget and needs, providing for the adoption of a level of security which is at least equal to the
minimum whole-of-government (WOG) Information Security Standard.
Consequently, when considering the adoption of cloud services, greater focus must be
placed on the establishment of robust information security management systems in accordance
with the standards set out in:
ii. ISO/IEC 27017 – Guidelines for Information Security Controls applicable to the Provision
and Use of Cloud Services
8
iii. ISO/IEC 27018 - Code of practice for data protection controls for public cloud computing
services (includes personal data proctection)
iv. ISO 22301 - Societal security – Business Continuity Management Systems: Requirements
vi. ISO/IEC 27018 – - Code of Practice for Protecting Personal Data in the Cloud
The Information Security Management System protects the confidentiality and integrity
of information data sets by applying a risk management process, which is a precursor to proper
data classification.
In support of this Cloud Policy, at a minimum, the following digital information systems
security objectives must be achieved by MDAs:
It is noteworthy, that with the availability of security services via cloud delivery,
encryption capabilities must be used to secure data in the cloud. Additionally, MDAs can access
these capabilities through the cloud to protect their sensitive and confidential data.
9
It is recognised that as an interim measure, Data Classification must be implemented by
all GoRTT MDAs so that they may determine and assign relative values of risk and sensitivity to
the data they possess. All data cannot be treated in the same way or assigned the same value.
The process of data classification creates various categories of data based on the
applied risk assessment and sensitivity criteria. Such risk assessment must also take into
consideration which confidential data cannot be held in the public cloud due to existing
legislation or national interest concerns.
The mandates of various MDAs and the type of data which they handle differ greatly
across the public sector. Individual MDAs must consider their specific, identified risks when
developing a data classification process. A key outcome of the data classification process will be
the identification of sensitive confidential data assets and personal identifiable data sets, which
will impact the selection of cloud service that can be legally considered.
In the interim, in the absence of a formal Data Classification Policy for GoRTT,
Government data must be subjected to a privacy impact assessment and an appropriate
classification scheme. The Policy recommends a classification scheme comprising the following
four (4) tiers:
10
Tier 3: Confidential, Sensitive Personal Information (CSPI)
Data that is subject to specific access authorisation and controlled distribution, whether
recipients are internal or external. All recipients must require such data in order to
perform their duties effectively. Unauthorised disclosure of this data will cause severe
damage to the confidentiality of MDA’s operations and/or lead to financial penalties.
Some examples of CSPI are management accounts, system configurations, helpdesk
data, private or commercially important data and confidential internal communications.
Guidelines for protecting the integrity of the data, the systems and their users are provided at
Appendix IV.
11
ii. Financial Intelligence Unit of Trinidad and Tobago Act, Chap. 72:01 -establishes the
Financial Intelligence Unit of Trinidad and Tobago, for the implementation of the anti-
money laundering policies of the Financial Action Task Force.
iii. Freedom of Information Act, Chap. 22:02 - provides to members of the public, a general
right (with exceptions) of access to official documents of public authorities unless otherwise
exempted.
iv. Data Protection Act, Chap. 22:04 - provides for the protection of personal information in
the custody of an organisation, whether public or private. It must be noted that the Data
Protection Act governs the conditions under which personal information can be stored or
processed outside of the jurisdiction of Trinidad and Tobago.
v. Electronic Transactions Act, Chap. 22:05 - gives legal effect to electronic documents,
electronic records, electronic signatures and electronic transactions.
vi. Interception of Communications Act, 2011 - provides the legal framework within which
public or private communications, which are being transmitted by means of a public or
private telecommunications network, can be lawfully intercepted.
vii. Computer Misuse Act, Chap. 11.17 - prohibits any unauthorised access, use or interference
with a computer and for other related matters. It is to be noted that this Act is under active
review and may be replaced by the Cybercrime Bill after due consideration by the
Legislative Review Committee.
Such laws and regulations will need to be reviewed and updated on a case- by-case
basis, once identified by an MDA as being a constraint on the adoption and use of cloud
services to fulfill a business need or obtain requested service delivery enhancements.
12
remains the property of the contracting Government entity, regardless of who owns, manages
or operates the cloud service. The Government contracting entity retains rights of data access,
retrieval, migration, modification and deletion of data exported into cloud services.
Identification of the actual geographic locations where data storage and processing will occur is
required. The Republic of Trinidad and Tobago will be the jurisdiction which governs the
operation of the contract, and application of privacy, confidentiality, access and information
management. GoRTT MDAs will also retain the Intellectual Property Rights (IPR) for any specific
development that it pays for or elaborates internally.
Where GoRTT has enterprise software licences agreements comparative cost benefit
analysis will be undertaken to evaluate what benefits can be realised through SaaS.
Total cost of ownership (TCO) assessments must be done. TCO assessments consider the
acquisition cost, ongoing warranty, maintenance, sparing and disposal costs through the life
cycle of the computing solutions under consideration. It is the responsibility of each MDA to
undertake the necessary information security and data risk assessments and regulatory review
to ensure compliance within their unique environment.
13
While cloud delivered services may offer several advantages, they may not always be
the best solution. Critical factors such as national security considerations or other existing
policy directives must also be weighed, as needed.
14
Identify how ICT resources are aligned to objectives and how costs are optimised. These
include Government websites, public archives, application development and testing
environments.
Take stock of the status of the technology life cycle of your current ICT portfolio of
hardware, software and operating systems.
Identify potential benefits from cloud migration that are specific to your organisation.
For example, faster time to deploy, ease of management given current staff availability
and on-hand skill sets.
Conduct risk assessment of the data classification sets under consideration for
migration. Get information from your Legal Division on the existing regulatory and legal
frameworks that require compliance. Based on your data classification and risk impact
assessment, identify the suitable cloud environment and platform that can be
considered.
Software should be used on a trial basis, before purchase, to ensure that the
organisation’s needs can and will be met.
Identify alternative technology solutions and associated costs of cloud environment and
platform. Weigh the merits of replacing existing applications with new ones or complete
architecture redesign.
Submit your requirements, desired outcomes and risk assessments to your Procurement
Department or Officer, who will then undertake the necessary cost benefit analysis and
procurement activity.
If the cloud delivered service is the selected solution to be procured, proceed to Step 2
STEP 2. Provision
Create a cloud migration roadmap, with defined timelines, responsibilities and reporting
lines.
15
Establish a project management team for the cloud migration project.
Track migration progress of the plan in an iterative manner and identify any potential
risks.
Monitor performance and service delivery against contracted terms and key
performance objectives.
• Provisions for the return of data and/or transfer of data to new CSP (where possible)
when exit is required due to the termination of the agreement with the incumbent CSP;
• Provision for notification and remedies for CSP regarding breaches and outages;
16
15. Policy Review
This policy will be reviewed at least once every twelve months from the date of approval
and circulation. This will facilitate the incorporation of post-implementation feedback and/or
required updates. Monitoring and evaluation efforts will be focused on quantifying the savings
due to the use of cloud delivered services and qualitative assessments of public service delivery
improvements.
APPENDIX I
Cloud Computing: Characteristics and Models
Cloud computing services are generally standardised and configured by the cloud
service provider to maximise economies of scale and minimise implementation timelines.
GoRTT has adopted the widely referenced definitions of the models and characteristics
of cloud computing that were developed by the National Institute of Standards and Technology
(NIST) of the United States Department of Commerce.5 These are detailed in Table 1: Cloud
Computing Overview
5
https://www.nist.gov/news-events/news/2011/10/final-version-nist-cloud-computing-definition-published
17
NIST defines the following characteristics and models of cloud computing:
On demand self-service - A consumer can unilaterally and automatically provide
computing capabilities such as server time and network storage, as needed, without
requiring human interaction with each service provider.
Broad network access - Capabilities are available over the network and accessed
through standard mechanisms that promote usage by heterogeneous thin or thick client
platforms (e.g., mobile phones, tablets, laptops, and workstations).
Resource pooling - The provider’s computing resources are pooled to serve multiple
consumers, dynamically assigning physical and virtual resources according to consumer
demand.
18
where the consumer controls software deployment with minimal configuration options with
the provider providing the networks, servers, storage, OS, 'middleware' (e.g. Java runtime, .NET
runtime, integration), database and other services to host the consumer's application; or as a
private service (software or appliance) inside the firewall, or as software deployed on a public
infrastructure as a service.
Infrastructure as a Service (IaaS): The provision of a virtualised environment of servers,
data storage, computer processing and software that can be shared by several users. The
service provider is responsible for the maintenance of the physical infrastructure.
Public cloud which is provisioned for open use, wherein the service provider owns and
manages the infrastructure, which can be accessed via the Internet. Due to the tremendous
capacity of scaling, the highest levels of economies of scale may be realised through public
cloud. However, the public cloud also carries security risks associated with its wide availability
and ability to shift data geographically. Such potential price efficiencies must be balanced
against the risk with due consideration given to the class of data being evaluated.
Community Cloud is private cloud infrastructure that is provisioned for exclusive use by
a specific community of users or organisations. These organisations usually have shared
mandates, missions or security requirements. The community cloud infrastructure may be
owned and operated by one or more of the organisations in the community or a third party.
19
Public Cloud Private Cloud Community Cloud Hybrid Cloud
/ Dedicated
Servers
Multi-tenant Scalability plus the For predictable Connect the public
environment with enhanced security workloads that cloud to your private
pay-as-you-grow and control of a require enhanced cloud or dedicated
scalability single-tenant security and control servers — even in
environment your own data
center
Services delivered via Available in T&T from Fully Managed Mix of on premise
Description Datacentres in the in-country Cloud Dedicated Server Cloud Service
developed countries. Service Providers: Hosting Providers.
Well-known Public Digicel Available in T&T from
Cloud Service TSTT the in-country Cloud
Providers include: Fujitsu Service Providers
Amazon Services CW-Flow
Google etc.
Microsoft
Physical Shared Dedicated Dedicated Shared + Dedicated
hardware
20
APPENDIX II
Benefits of Cloud Computing for GoRTT
GoRTT is keen to realise the cost reductions and cost efficiencies which are the main
benefits commonly associated with the adoption of cloud computing. It must be stressed that
cloud computing can be used as a powerful enabler of better public sector service delivery for
citizen-centric programmes. Such improved performance outcomes, can only be realised by
concerted and collaborative efforts to re-engineer business processes and pursue prompt
implementation by leveraging cloud technologies.
Greater cost efficiencies – Given the small size of the economy, it is critical that the benefits of
cost savings and efficiencies from aggregated demand are sought rather than siloed
approaches. There are several common ICT requirements and processes across the public
sector which facilitate the leveraging of cloud computing within the context of a shared services
model.
Scalability – Cloud services can be contracted as required and in the amount required thereby
avoiding the acquisition of infrastructure and licences while allowing MDAs to enhance
adaptability based on their specific needs.
Continuity of Operations for Government Business and Robust Business Recovery – The public
sector is becoming increasingly dependent on ICTs to carry out its day-to-day operations. Cloud
computing can support the deployment of more robust and resilient disaster recovery options
in the event of a natural disaster such as hurricanes, earthquakes or other disruptive events.
Off-island data storage also provides for geographic redundancy in the event of a national
catastrophe, natural or manmade.
21
It is envisaged that as IT resources are freed from the tasks of asset management and
maintenance, innovation can be fostered as their talents are applied towards the creation of
innovative custom-built Government applications and data analytics.
Greater command of the economics of national ICT Budgets – The utility-based usage model
associated with the cloud service model contributes to greater cost clarity and accountability.
This, in turn, supports improved budget control. The return on investments in national ICT can
also be captured with greater ease.
Table 2 contrasts the benefits of cloud computing for GoRTT with that of the current
environment
Improved asset utilisation through aggregated Government pays for idle, under utilised computing
demand. capacity
Government pays for usage of computing Predominantly on premise server and storage
resource installations
Agility and faster deployment of public service Mobilisation of new service can take between several
enhancements and Innovation weeks to several months.
IT resources involved in more strategic IT resources involved in operational activities and asset
activities such as custom application management and maintenance.
development, information security
management and data analytics Ongoing maintenance cost of legacy infrastructure
More robust Disaster Recovery and Business Inconsistent rollout of business continuity programmes
Continuity options
Greater command of the economics of national Lack of clarity on the econometrics of national ICT
ICT budget
Operating Expenditure Model focuses on Capital expenditure model requires significant upfront
paying for only what is needed contributing to investment in often under utilised equipment resulting in
greater agility and cost-efficiency wasted capacity and reduced agility and cost efficiency as
costs increase over time.
22
APPENDIX III
Process For Administration of Opt-Out
from Whole-of-Government (WoG) Cloud Computing Arrangements
MDAs must seek approval from the Ministry with responsibility for ICT, in conjunction
with the Ministry of Finance, to opt-out from agreed cloud delivered services arrangements.
economy of scale of benefits which do not have a significant adverse impact on wider
Government policies;
enhanced ability to move towards more joined-up services for citizens and businesses;
improved management and development of scarce ICT skills within the Public Service
improved operation of the GoRTT ICT marketplace;
reinforcement of other key priorities of GoRTT such as enhanced service delivery and
economic competitiveness;
reduction and avoidance of duplication of costs;
enhanced capacity and ability to respond to external ICT related issues and trends; and
improvement in the management and leveraging of GoRTT’s information assets with
due regard to privacy concerns as appropriate.
23
Criteria for Considering Opt-Out Requests
One or more of the following criteria should apply to a request to opt-out of a GoRTT
approved CLOUD COMPUTING CONSIDERATION POLICY:-
24
APPENDIX IV
Guidelines for Protecting the Integrity of Data, Systems & Their Users
The following guidelines are to assist in the protection of the system and users while
guaranteeing availability, confidentiality and integrity of the data, solutions and related
processes:-
• Identify the digital assets (data and information systems) included in the solution and
classify them according to their level of criticality to provide the solution with adequate
IT security.
• Verify that within the digital assets the following three properties of the data or the
information systems are guaranteed:
Availability : The data and related resources must be available to be
accessed by authorised users
• Define who is (are) the party (ties) responsible for the data or for the information
systems of the solution.
• Provide adequate processing for the solution based on its level of criticality at the
moment of defining the infrastructure that will support it.
• Ensure that the system or platform complies with the following principles to provide a
safe and protected environment:
o Identify all access points to the system or platform, taking into consideration all
users and applications that access it, whether local or remote. Keep a registry of
every access to the system.
25
o Protect and safeguard the system’s security and notify the TTCSIRT of any
security events.
o Always have recovery plan that meets the service expectations of users.
26