Federal Science DataHubFederal Science DataHub
  • English
  • Français
  • English
  • English
  • Français
  • English
  • Overview
  • Managing Workspaces and Users

    • Getting a workspace (only available on the GC network)
    • Estimate costs (only available on the GC network)
    • Account Setup
    • Requesting, configuring and removing tools in your workspace
    • Invite a user
    • Change a user role
    • Manage your CBR & workspace budgets
  • Storage

    • Working with Azure Storage
    • Bring Your Own Storage

      • Import AWS S3 Bucket
      • Import Azure Storage
      • Import Google Cloud Platform Storage
    • Access Storage in Databricks
    • Use AzCopy to Interact with Storage
  • Databricks

    • Getting Started with Databricks
    • FSDH Cluster Policies
    • MLFlow: AutoML and Experiments
    • Databricks Workflows
    • Dashboarding

      • How to Dashboard in Databricks
      • Dashboarding Tool Comparison
    • External Extensions

      • Git/GitHub Integration with Databricks
      • Databricks VS Code Extension
      • Working with Conda
      • Connecting Google API to Databricks
  • PostgreSQL

    • Create and use a PostgreSQL Database
    • Add a User to PostgreSQL on FSDH
    • PostgreSQL vs Azure Databricks Database Features
  • Web Applications

    • Hosting Web Apps on DataHub
  • Migrating to Production

    • Migrating Storage
    • Migrating Databricks
    • Migrating PostgreSQL
    • Migrating Web Apps
  • User Guidance

    • Account Management and Access control of workspaces
    • Backup and Recovery
    • Code Management
    • Restricted File Types on FSDH Storage
    • Workspace Monitoring
  • Terms and Conditions

Workspace Monitoring

Monitor Usage

The workspace lead or delegated personnel must review workspace usage to identify inappropriate usage and report to the FSDH team if unusual usage is noticed. The FSDH team can support when in doubt but will not regularly monitor the workspaces for unusual usage.

If the FSDH team identifies unauthorized or inappropriate usage of FSDH workspaces, it will investigate and report the incident to SSC IT security and other relevant teams for further corrective measures.

Monitoring and Auditing a Workspace

The workspace lead and administrators must monitor account usage periodically and ensure all accounts meet the relevant policies and guidelines. They are also responsible for conducting regular audits within the workspace to ensure all security, ATIP, privacy, accessibility and legal policies are followed. Workspace leads should consult with their Departmental IT Security authorities to ensure compliance with Information system audit management requirements established by the Directive on Security Management (Directive on Security Management- Canada.ca - B.2.3.8)

The workspace lead is responsible for ensuring that a process is in place to ensure quick detection and reaction to information spillage events (for instance, when sensitive information is mistakenly uploaded to an unclassified workspace). Workspace leads should consult with their Departmental IT Security Authorities to ensure such an event is tracked and responded to in accordance with Departmental Incident Response Processes.

Incident Detection & Response

The workspace lead is responsible for reporting any security incident, such as unauthorized access, a breach of the workspace, or information spillage. The Workspace lead is also responsible for coordinating incident reporting with their internal Departmental Incident Response Authorities in accordance with established procedures. The workspace lead should consult with their Departmental IT Security Authorities to ensure incidents are tracked and reacted to in accordance with Departmental Incident Response Processes.

The workspace lead works with their departmental IT security team to contain and investigate the incident and apply all necessary corrective action. Once the incident is contained, the workspace lead works with SSC and the departmental security team to conduct a post-incident review.

For more information, please consult the Portal and Workspace Incident Response guidance.

Edit this page on GitHub
Last Updated: 2026-05-08, 2:30 p.m.
Previous
Restricted File Types on FSDH Storage