Cloud Audit
Cloud Audit
Cloud Audit
Independent Auditor’s
Report | 2022
Performance audit reports
This report presents the results of a performance audit conducted by the Office of the Auditor General of Canada (OAG)
under the authority of the Auditor General Act.
A performance audit is an independent, objective, and systematic assessment of how well government is managing its
activities, responsibilities, and resources. Audit topics are selected on the basis of their significance. While the OAG may
comment on policy implementation in a performance audit, it does not comment on the merits of a policy.
Performance audits are planned, performed, and reported in accordance with professional auditing standards and OAG
policies. They are conducted by qualified auditors who
• establish audit objectives and criteria for the assessment of performance
• gather the evidence necessary to assess performance against the criteria
• report both positive and negative findings
• conclude against the established audit objectives
• make recommendations for improvement when there are significant differences
between criteria and assessed performance
Performance audits contribute to a public service that is ethical and effective
and a government that is accountable to Parliament and Canadians.
Introduction 1
Background.............................................................................................................................................1
Conclusion 20
Introduction
Background
Moving government
information and
services to the cloud
7.1 “The cloud” refers to computer servers that people access over
the Internet and the software applications and databases that run on
them. Despite their name, cloud servers are physically located in data
centres all over the world. The organizations that use them, including the
Government of Canada, do not need to own, run, or maintain their own
physical servers or software applications. They can use cloud servers
and applications on demand, paying for only what they need.
7.3 The strategy notes that cloud service providers and the federal
departments that use their services share the responsibility for security.
Federal departments remain accountable for the confidentiality,
integrity, and availability of information technnology services and of
related information that a cloud‑service provider hosts. The Treasury
Board of Canada Secretariat’s Digital Operations Strategic Plan: 2018–
2022 recognizes that to minimize security risks, departments that use
cloud services must build cloud‑savvy workforces.
Securing information in
the cloud
Roles and
responsibilities
7.15 More details about the audit objective, scope, approach, and
criteria are in About the Audit at the end of this report.
7.18 We also found that, 4 years after the Treasury Board of Canada
Secretariat first directed departments to consider moving to the cloud, it
had still not provided a long-term funding approach for cloud adoption.
It had also not given departments tools to calculate the costs of moving
to or of operating in the cloud and securing the information stored in it.
Departments need both a funding approach and costing tools to ensure
that the people, expertise, skills, training, funding, and other resources
they need to secure cloud-based information are available to prevent
and address the greatest threats and risks. A funding approach and
costing tools are essential for cloud adoption and would strengthen
Canada’s cyber-defence capabilities both at the departmental level and
government-wide.
What we found
Context
7.24 Each department is responsible for managing its own
cybersecurity risks and implementing security controls. But departments
also rely on several central departments to implement certain security
controls for preventing, detecting, and responding to breaches. As a
result, there is a high level of shared responsibility across the federal
government for managing the cybersecurity of personal information in
the cloud. We looked at these responsibilities for 4 categories of security
controls (Exhibit 7.1). A cloud guardrail (exhibits 7.1 and 7.2) is a type of
security control.
Exhibit 7.1—A variety of federal government departments share responsibilities for key cloud
security controls
Cloud guardrails To protect data that is stored or • Departments must implement these
transmitted through networks in guardrails according to the Treasury Board
the cloud Directive on Service and Digital.
• Shared Services Canada validates3 the
implementation of the guardrails, monitors
departmental compliance with the guardrails
on a monthly basis, and reports any
non‑compliance to the Treasury Board of
Canada Secretariat.
If guardrails are not implemented and applied
consistently across departments, there is an
increased risk that attackers could exploit
vulnerabilities. Periodic monitoring also
helps maintain consistent security. Security
weaknesses may go unnoticed or unchecked if
monitoring is only partially done.
Cybersecurity To outline how to detect and • The Treasury Board of Canada Secretariat
event respond to security breaches provides the Government of Canada Cyber
management at the departmental level and Security Event Management Plan to detect,
plans and government-wide respond to, and limit the consequences of
exercises an attack on an organization’s information
and technology systems.
• Departments must also have plans with
similar procedures.
These plans are critical for protecting
information and technology assets against
cyber threats because they provide policies,
procedures, roles and responsibilities, and
guidance that minimize response times and
reduce the chance of confusion.
Analysis to support
this finding
Exhibit 7.2—The Government of Canada established 12 cloud guardrails that serve as a minimum
set of security controls
1. Protect root/global Protect the root or master account that was used to establish the cloud
administrator service.
account
3. Cloud console Limit access to authorized users and Government of Canada devices.
access
4. Enterprise monitoring Create role-based accounts to enable enterprise monitoring and visibility.
accounts
6. Protection of data Protect data at rest by default (for example, storage) for cloud-based
at rest applications.
7. Protection of data Protect data transit networks by using appropriate encryption and network
in transit safeguards.
9. Network security Establish external and internal network perimeters, and monitor network
services traffic.
11. Logging and Enable logging of network and system information and events for the cloud
monitoring environment and for cloud-based workloads.
12. Configuration of Restrict the use of commercial software from third-party cloud service
cloud marketplaces providers to products approved by the Government of Canada.
7.28 We found that for contracts that Shared Services Canada set up
between departments and cloud service providers, it checked whether
departments implemented the guardrails within the first 30 days.
However, it performed only limited ongoing monitoring after that. We
also found that for cloud services that were set up by Public Services
and Procurement Canada, no one validated whether departments put
guardrails in place initially, and no one monitored ongoing compliance.
In our view, this inconsistent application of controls across government
increases the risk that Canadians’ personal information in the cloud
could be compromised.
7.32 We found that the contracts for cloud services put in place by
Shared Services Canada and the supply arrangements established by
Public Services and Procurement Canada included only limited details
about providers’ obligations during security incidents, such as who
should respond and how quickly.
7.33 From April 2018 to March 2022, the departments set up cloud
contracts or supply arrangements with 14 cloud service providers. We
reviewed all of these and found that, although the arrangements set
out some security and privacy obligations, neither department provided
sufficient detail about the departments’ or cloud service providers’
obligations for handling security incidents and privacy breaches,
including how quickly either party should respond and who should
communicate incidents and breaches (and to whom).
The roles and responsibilities for ensuring cloud cybersecurity were unclear and
incomplete
What we found
Context
Analysis to support
this finding
7.46 The roles and responsibilities for cloud security are articulated
in multiple documents. As a result, we found that departments were
confused about some of their roles and responsibilities. For example,
the Directive on Service and Digital says departments are responsible for
ensuring that data stored in the cloud, including sensitive and personal
information, resides in Canada. Yet, after having reviewed the contracts
and supply arrangements established by Shared Services Canada and
Public Services and Procurement Canada, we found that not all parties
involved understood this:
• The 3 selected departments told us they thought that Public
Services and Procurement Canada or Communications Security
Establishment Canada was responsible for checking on this.
The Treasury Board of Canada Secretariat did not provide departments with a costing
model or funding approach for cloud services
What we found
Analysis to support
this finding
Cybersecurity
Note: These lists are meant to illustrate some of the cost considerations involved. They are
not comprehensive.
Public Services and Procurement Canada and Shared Services Canada did not include
environmental criteria in their procurement of cloud services
What we found
Context
7.67 At the time of the audit, the Government of Canada was updating
its cloud adoption strategy. The most recent draft, dated February 2022,
included 10 items intended to help departments achieve business value.
One item involved contributing to the government’s overall sustainable
development objectives by “providing highly-efficient enterprise-scale
infrastructure that reduces [greenhouse] gas emissions and promotes
the greening of government.”
Analysis to support
this finding
7.69 However, we found that these departments did not require cloud
service providers to demonstrate their environmental performance or
to explain how their services would reduce Canada’s greenhouse gas
emissions. Although the departments requested information from
providers about their environmental commitments and the status of their
operations, they did not require it or confirm its accuracy when provided.
Conclusion
7.73 We concluded that the Treasury Board of Canada Secretariat,
Shared Services Canada, Public Services and Procurement Canada,
Communications Security Establishment Canada, and selected
departments had controls at their disposal to prevent, detect, and
respond to cybersecurity events that threaten the security of Canadians’
personal information in the cloud but did not effectively implement
them or establish and communicate clear roles and responsibilities for
implementing them.
All work in this audit was performed to a reasonable level of assurance in accordance with the
Canadian Standard on Assurance Engagements (CSAE) 3001—Direct Engagements, set out by
the Chartered Professional Accountants of Canada (CPA Canada) in the CPA Canada Handbook—
Assurance.
The Office of the Auditor General of Canada applies the Canadian Standard on Quality Control 1
and, accordingly, maintains a comprehensive system of quality control, including documented
policies and procedures regarding compliance with ethical requirements, professional standards,
and applicable legal and regulatory requirements.
In conducting the audit work, we complied with the independence and other ethical requirements of
the relevant rules of professional conduct applicable to the practice of public accounting in Canada,
which are founded on fundamental principles of integrity, objectivity, professional competence and
due care, confidentiality, and professional behaviour.
In accordance with our regular audit process, we obtained the following from entity management:
• confirmation of management’s responsibility for the subject under audit
• acknowledgement of the suitability of the criteria used in the audit
• confirmation that all known information that has been requested, or that could affect the
findings or audit conclusion, has been provided
• confirmation that the audit report is factually accurate
Audit objective
The objective of this audit was to determine whether the federal government—including the Treasury
Board of Canada Secretariat, Shared Services Canada, Public Services and Procurement Canada,
Communications Security Establishment Canada (and its Canadian Centre for Cyber Security),
and selected departments—had governance, guidance, and tools in place to prevent, detect, and
respond to cybersecurity events that could affect Canadians’ personal information in the cloud.
We also looked at whether the federal government met its commitments to the environment and
sustainable development in its procurement of cloud services. As part of the Office of the Auditor
General of Canada’s commitment to achieving the United Nations’ Sustainable Development Goals,
we identified Goal 12 as applicable to the procurement of cloud services because of its target to
promote public procurement practices that are sustainable, in accordance with national policies
and priorities.
The audit focused on how government departments share responsibilities for the security of
personal information: While individual departments are responsible for managing risk related to
organizational cybersecurity and for implementing security controls to mitigate cybersecurity
risk in their programs, they rely on lead security agencies for certain security controls. We
selected 3 departments that were using cloud services to store or process personal information. We
consulted them on the roles and responsibilities of the lead security agencies and examined how all
of the departments worked together on cybersecurity.
We identified a variety of key controls that relate to mitigating the risk of security breaches of
personal information in cloud-hosted applications and services: security clauses in contracts,
guardrail validation, assessments of physical and personnel security controls of cloud service
providers, security assessments of cloud service providers’ services, the Government of Canada
Cyber Security Event Management Plan, and departmental security event management plans.
We validated and confirmed these controls with each entity for accuracy, completeness, and
relevance. Where applicable, we incorporated these into the audit criteria and conducted additional
control testing.
Our audit work included reviewing plans, strategies, policies, and guidelines, interviewing relevant
departmental officials, and testing controls to understand the overall practices and systems
that the federal government has in place for securing personal information in the cloud. We did
the following:
• reviewed the 8 cloud framework agreements established with cloud service providers and
tested a sample of 6 cloud supply arrangements to determine whether security requirements
(contract clauses) exist with cloud service providers
• examined the validation of cloud guardrails for the selected departments
• reviewed a sample of 14 physical security inspection reports on cloud service providers
to determine whether physical inspection procedures were followed and whether results
were communicated
• reviewed 1 major security incident to determine whether security event management
procedures were followed
We did not examine cloud procurement activities carried out by the selected departments within
their own contracting authority limits. We also did not conduct our own information technology
security testing or assessments of the selected departments.
Criteria
We used the following criteria to determine whether the federal government—including the Treasury
Board of Canada Secretariat, Shared Services Canada, Public Services and Procurement Canada,
Communications Security Establishment Canada (and its Canadian Centre for Cyber Security),
and selected departments—had governance, guidance, and tools in place to prevent, detect, and
respond to cybersecurity events that could affect Canadians’ personal information in the cloud.
We also used the following criteria to determine whether the federal government met its
commitments to the environment and sustainable development in its procurement of cloud
services.
Criteria Sources
The Treasury Board of Canada Secretariat defines • Policy on Government Security, Treasury Board
the roles and responsibilities for the cybersecurity
• Directive on Security Management, Treasury
of personal information in the cloud.
Board
• Policy on Service and Digital, Treasury Board
• Directive on Service and Digital, Treasury Board
• Government of Canada Strategic Plan for
Information Management and Information
Technology 2017 to 2021, Treasury Board of
Canada Secretariat
• Digital Operations Strategic Plan: 2021–2024,
Treasury Board of Canada Secretariat
• Government of Canada Cloud Adoption Strategy,
Treasury Board of Canada Secretariat, 2018
• Government of Canada Cloud Operationalization
Framework, Treasury Board of Canada
Secretariat
Criteria Sources
The Treasury Board of Canada Secretariat has a • Policy on Service and Digital, Treasury Board
funding model that ensures departments have the
• Directive on Service and Digital, Treasury Board
resources they need to protect the cybersecurity of
their cloud operations and to detect and respond • Policy on the Planning and Management of
to threats. Investments, Treasury Board, 2019
• Policy on the Planning and Management of
Investments, Treasury Board, 2021
• Government of Canada Strategic Plan for
Information Management and Information
Technology 2017 to 2021, Treasury Board of
Canada Secretariat
• Digital Operations Strategic Plan: 2018–2022,
Treasury Board of Canada Secretariat
• Digital Operations Strategic Plan: 2021–2024,
Treasury Board of Canada Secretariat
• Government of Canada Cloud Adoption Strategy,
Treasury Board of Canada Secretariat, 2018
• Budget 2018, Budget 2019, and Budget 2021
Shared Services Canada validates cloud guardrails • Government of Canada Cloud Guardrails,
prior to approving services in the cloud. Government of Canada
• Government of Canada Cloud Operationalization
Framework, Treasury Board of Canada
Secretariat
• Direction on the Secure Use of Commercial
Cloud Services, Treasury Board of Canada
Secretariat
• Government of Canada Cloud Security Risk
Management Approach and Procedures,
Treasury Board of Canada Secretariat
• Government of Canada Security Control Profile
for Cloud-Based GC Services
• Standard Operating Procedure: Validating
Cloud Guardrails, Treasury Board of Canada
Secretariat, 2019
Criteria Sources
Public Services and Procurement Canada and • Policy on Government Security, Treasury Board
Shared Services Canada, together with selected
• Directive on Security Management, Treasury
departments, document the contract clauses for
Board
security management, roles and responsibilities
for security, security monitoring and notification, • Policy on Service and Digital, Treasury Board
and data residency requirements.
• Directive on Service and Digital, Treasury Board
• Guideline on Service and Digital, Treasury Board
of Canada Secretariat
• Contracting Policy, Treasury Board
• Direction on the Secure Use of Commercial
Cloud Services, Treasury Board of Canada
Secretariat
• Direction for Electronic Data Residency, Treasury
Board of Canada Secretariat
• Government of Canada White Paper: Data
Sovereignty and Public Cloud, Treasury Board of
Canada Secretariat
• Supply Manual, Public Services and
Procurement Canada
• Contract Security Manual, Public Services and
Procurement Canada
• Standard Acquisition Clauses and Conditions
Manual, Public Services and Procurement
Canada
• Supply Manual, Shared Services Canada
• Technology Supply Chain Guidelines, Canadian
Centre for Cyber Security
• Guidance on Cloud Security Assessment and
Authorization, Canadian Centre for Cyber
Security
• IT Security Risk Management: A Lifecycle
Approach, Canadian Centre for Cyber Security
• The 18 CIS Critical Security Controls, Center for
Internet Security
• COBIT 2019 Framework (Control Objectives
for Information and Related Technology),
Information Systems Audit and Control
Association
Criteria Sources
Public Services and Procurement Canada screens • Policy on Government Security, Treasury Board
cloud service providers’ physical locations
• Directive on Security Management, Treasury
and personnel for security and data residency
Board
requirements and repeats this screening
periodically. • Direction on the Secure Use of Commercial
Cloud Services, Treasury Board of Canada
Secretariat
• Direction for Electronic Data Residency, Treasury
Board of Canada Secretariat
• Government of Canada White Paper: Data
Sovereignty and Public Cloud, Treasury Board of
Canada Secretariat
• Policy on the Contract Security Program, Public
Services and Procurement Canada, 2019
• Supply Manual, Public Services and
Procurement Canada
• Contract Security Manual, Public Services and
Procurement Canada
• IT Security Risk Management: A Lifecycle
Approach, Canadian Centre for Cyber Security
• The 18 CIS Critical Security Controls, Center for
Internet Security
• COBIT 2019 Framework (Control Objectives
for Information and Related Technology),
Information Systems Audit and Control
Association
• ISO/IEC 27001, Information Security
Management, International Organization for
Standardization
Criteria Sources
Criteria Sources
The Treasury Board of Canada Secretariat and • Policy on Government Security, Treasury Board
Communications Security Establishment Canada
• Directive on Security Management, Treasury
(and its Canadian Centre for Cyber Security) have
Board
a process in place to liaise with stakeholders and
deputy heads on security events that could have • Policy on Service and Digital, Treasury Board
government-wide impacts.
• Directive on Service and Digital, Treasury Board
Selected departments document security event
• Government of Canada Cloud Operationalization
management practices and conduct exercises to
Framework, Treasury Board of Canada
detect, respond to, and report on cybersecurity
Secretariat
events. They coordinate these activities within
their departments, with cloud service providers, • Government of Canada Digital Standards:
and with the Treasury Board of Canada Secretariat, Playbook, Treasury Board of Canada Secretariat
Communications Security Establishment Canada,
and the Canadian Centre for Cyber Security for • Government of Canada Cyber Security Event
government-wide events. Management Plan, Treasury Board of Canada
Secretariat, 2019
The Treasury Board of Canada Secretariat
coordinates government-wide security event • Event Logging Strategy, Government of Canada,
management exercises to detect, respond to, and 2019
report on cybersecurity events. • Event Logging Guidance, Treasury Board of
Canada Secretariat
• IT Security Risk Management: A Lifecycle
Approach, Canadian Centre for Cyber Security
• The 18 CIS Critical Security Controls, Center for
Internet Security
• Top 10 IT Security Actions, Canadian Centre for
Cyber Security
• Cloud Controls Matrix, Cloud Security Alliance
• COBIT 2019 Framework (Control Objectives
for Information and Related Technology),
Information Systems Audit and Control
Association
Criteria Sources
The federal government is meeting its • Policy on Green Procurement, Treasury Board
commitments to the environment and sustainable
• Contracting Policy, Treasury Board
development in its procurement of cloud services.
• Achieving a Sustainable Future: A Federal
Sustainable Development Strategy for
Canada 2016–2019, Environment and Climate
Change Canada
• Greening Government Strategy: A Government
of Canada Directive, Treasury Board of Canada
Secretariat, 2020
• Directive on the Management of Procurement,
Treasury Board
• Supply Manual, Public Services and
Procurement Canada
• Standard Acquisition Clauses and Conditions
Manual, Public Services and Procurement
Canada
• Supply Manual, Shared Services Canada
The audit covered the period from 1 April 2017 to 31 March 2022. This is the period to which the
audit conclusion applies.
We obtained sufficient and appropriate audit evidence on which to base our conclusion on
21 October 2022, in Ottawa, Canada.
Audit team
This audit was completed by a multidisciplinary team from across the Office of the Auditor General
of Canada led by Jean Goulet, Principal. The principal has overall responsibility for audit quality,
including conducting the audit in accordance with professional standards, applicable legal and
regulatory requirements, and the office’s policies and system of quality management.
Recommendation Response
7.31 In consultation with Shared Services Canada The Treasury Board of Canada Secretariat’s
and Public Services and Procurement Canada, the response. Agreed. The Treasury Board of Canada
Treasury Board of Canada Secretariat should do Secretariat will work with Shared Services Canada,
the following: Communications Security Establishment Canada,
and Public Services and Procurement Canada to
• Extend the requirement for guardrails to cloud
service provider contracts that stem from supply • publish the existing, approved Cloud
arrangements established by Public Services Responsibility Matrix to formally identify
and Procurement Canada. who is responsible for validating, ongoing
monitoring, performing oversight and
• Clarify who is responsible for the initial
compliance of the cloud guardrail controls by
validation and ongoing monitoring of cloud
end of September 2022
guardrail controls and what processes they
should follow. • clarify and extend the processes to be
followed for cloud service provider contracts
awarded by Public Services and Procurement
Canada as part of the updates to the Standard
Operating Procedure for Validating Cloud
Guardrails by December 2022
• update the GC Cloud Guardrails and the
Directive on Service and Digital to reflect
guardrail controls that apply to cloud services
including cloud services procured by Public
Services and Procurement Canada by January
2023
In addition, the Treasury Board of Canada
Secretariat will
• establish a score card to report on
departments’ level of adherence to the GC
Cloud Guardrails by February 2023
• collaborate with Shared Services Canada in
their efforts to implement tools to automate
guardrail monitoring for cloud service
providers in the Government of Canada by
April 2023
• continue to provide advice and guidance to
departments on ensuring that they perform
security assessment and authorization
activities for cloud-based applications using
tools such as the Security Playbook for
Information System Solutions, which outlines
a set of security tasks for consideration when
designing and implementing solutions for
Government of Canada information systems in
cloud environments
Recommendation Response
7.40 The Treasury Board of Canada Secretariat The Treasury Board of Canada Secretariat’s
should do the following: response. Agreed. The Treasury Board of Canada
Secretariat will ensure that
• Ensure that the Government of Canada Cyber
Security Event Management Plan applies to • the Government of Canada Cyber Security
the evolving cloud environment and shared Event Management Plan is reviewed and
responsibilities, review and test it at least tested at least annually and updated as
annually, and update it as needed. appropriate. This includes an update to the
plan, which is targeted for publication by
• Follow up annually to ensure that departments
late fall 2022, and inclusion of cloud-based
finalize, implement, and regularly test their
scenarios in the plan’s simulation exercises
security event management plans.
• a process is in place to validate that
departments have established and
implemented a departmental cyber security
event management plan that aligns with the
Government of Canada’s plan and that the
plans are submitted on an annual basis to
the Treasury Board of Canada Secretariat for
review by fall 2023
• tools are planned for and available which
will enable departments to regularly test
their departmental cyber security event
management plan, such as a canned tabletop
product that focuses on a cloud-based
scenario that departments can leverage to
run their own simulation exercise, as well as
exploring options to establish a procurement
vehicle that will enable facilitated cloud-based
simulation exercises by March 2023
7.47 In consultation with Communications Security The Treasury Board of Canada Secretariat’s
Establishment Canada, Shared Services Canada, response. Agreed. The Treasury Board of Canada
Public Services and Procurement Canada, and Secretariat will work with Communications
departments, the Treasury Board of Canada Security Establishment Canada, Shared Services
Secretariat should document and proactively Canada, Public Services and Procurement Canada,
communicate to any department that is using and departments to
or contemplating cloud services the roles and
• publish the existing approved Cloud
responsibilities needed to design, implement,
Responsibility Matrix to formally identify
validate, monitor, coordinate, and enforce the
who is responsible for validating, ongoing
security controls needed to protect sensitive and
monitoring, performing oversight and
personal information in the cloud. The secretariat
compliance of the cloud guardrail controls by
should review and update these roles and
end of September 2022
responsibilities at least every 12 months.
Recommendation Response
7.58 In consultation with Shared Services Canada The Treasury Board of Canada Secretariat’s
and other departments, the Treasury Board of response. Agreed. The Treasury Board of Canada
Canada Secretariat should do the following: Secretariat is currently consulting with the
Government of Canada community to discuss
• Develop and provide a costing model to help
cloud operational models, prioritization criteria,
departments make informed decisions about
and associated funding models. A series of
moving to the cloud and determine whether
recommendations will inform the Government of
additional resources and funding are required.
Canada Chief Information Officer on direction for
• Help departments determine their long-term operating in the cloud in fall 2022. The secretariat
operational funding needs and support their will, in consultation with departments and Shared
access to funding so they can fulfill their Services Canada
evolving responsibilities for cloud operations,
• develop and provide a costing model and
including securing sensitive information in the
guidance to help departments make informed
cloud.
decisions about moving to the cloud by June
2023
• assist departments including Shared Services
Canada with forecasting medium- and
long-term costs required to operate in a cloud
environment by June 2023
Recommendation Response
7.72 Public Services and Procurement Canada The departments’ response. Agreed. Public
and Shared Services Canada should include Services and Procurement Canada and Shared
environmental criteria when procuring cloud Services Canada agree that environmental criteria
services to support sustainability in procurement should be included in the procurement of cloud
practices and contribute to achieving Canada’s services. The Shared Services Canada Cloud
net-zero goal. Framework Agreement currently does not in
itself include sustainability requirements; it does
provide the ability to include such requirements
in future solicitations. Shared Services Canada
has developed rated environmental criteria, which
it plans on including in upcoming competitive
solicitations under the Government of Canada
Cloud Framework Agreement beginning in fall
2022, which includes greening requirements
related to greenhouse gas reduction targets.
In addition, Shared Services Canada has confirmed
that at this time 7 of the 8 Government of Canada
Cloud Framework Agreement vendors have equal
or enhanced targets compared with Canada’s
net-zero commitments.
The Public Services and Procurement Canada
software as a service supply arrangement does
not evaluate environmental criteria; however, it
does collect this information from suppliers in
order to assist clients in evaluating the solutions
available through the supply agreement. Public
Services and Procurement Canada plans to
update the environmental information collected
in its software as a service supply agreement
and plans to refresh the agreement in order to
address Government of Canada priorities related
to net-zero greenhouse gas emissions. The supply
agreement will provide the ability for clients to
include environmental criteria in bid solicitations
issued against the agreement, and Public Services
and Procurement Canada plans to develop
resulting contract clauses regarding greenhouse
gas emissions related to greenhouse gas reduction
targets.
Shared Services Canada and Public Services and
Procurement Canada have also been working
together to further align the approach to cloud
procurement. As part of this exercise, a standard
template for cloud contracts is being developed,
which is anticipated to be released by fall 2022.
This will include standard sustainability terms for
cloud providers.