Database Administration Guidelines

This document provides database management guidelines that serve as a foundational framework for ensuring that government institutions handle their data effectively, securely, and in compliance with regulatory standards. These guidelines encompass various principles, practices, and protocols aimed at optimizing database performance, safeguarding sensitive information, and fostering transparency and accountability.

Introduction

In today's digital age, where information is pivotal for decision-making and public service delivery, government institutions are increasingly reliant on database management systems to manage and maintain vast amounts of data efficiently as part of digitisation. Whether it's citizen information, financial records, or administrative data, the integrity, security, and accessibility of these databases are critical for the functioning of government agencies.

This document provides database management guidelines that serve as a foundational framework for ensuring that government institutions handle their data effectively, securely, and in compliance with regulatory standards. These guidelines encompass various principles, practices, and protocols aimed at optimizing database performance, safeguarding sensitive information, and fostering transparency and accountability.

Scope and applicability

These guidelines aim to provide best practices for effective Database Management Systems (DBMS) implementation and maintenance within Government institutions. They encompass various aspects of database administration, including planning, design, security, performance and disaster recovery. They apply to all Government institutions in Rwanda and all IT staff and contractors responsible for implementing and managing database systems should comply with the guidelines.

Selecting a DBMS

Government institutions should follow the software lifecycle guidelines when procuring and implementing database management systems. In particular, the following should be considered when selecting a DBMS:

Selecting a DBMS

Data model [Recommended]

Determine the appropriate data model for your DBMS such as relational or NoSQL based on the nature of the data and how it will be used. Relational DBMS tend to be used for structured data while NoSQL supports unstructured or semi-structured data.

Selecting a DBMS

DBMS Choice [Mandatory]

Database storage and hosting

The following guidelines on storage and hosting should be followed when implementing DBMS systems:

Database storage and hosting

Database hosting location [Mandatory]

Database systems and applications should be hosted in the data hosting environment officially adopted by the Government as guided by RISA. The institution should ensure that they subscribe to a minimum hosting plan that includes daily backups and disaster recovery services.

Database storage and hosting

Migration of critical database systems [Mandatory]

For critical database systems and applications hosted on premises, the government entity should immediately consult RISA to devise a road map for migration to the official Government hosting environment .

Database storage and hosting

Non critical database systems [Recommended]

For other systems and applications deemed non-critical and kept on premises, entities are required to implement appropriate measures to secure them and to develop and follow an appropriate backup and recovery process

Security and data privacy

Government institutions should follow RISA security and data privacy guidelines when deploying database management systems. In particular, the following guidelines should be followed:

Security and data privacy

Data validation [Mandatory]

When capturing new data in a DBMS, data validation must be used to ensure the DBMS’s stability and integrity of stored data

Security and data privacy

Functional separation between database servers and web servers [Recommended]

Due to the higher threat environment that web servers are typically exposed to, hosting database servers and web servers within the same operating environment increases the likelihood of database servers being compromised by malicious actors. This security risk can be mitigated by ensuring that database servers are functionally separated from web servers.

Security and data privacy

Communications between database servers and web servers [Recommended]

Data communicated between database servers and web servers, especially over the internet, is susceptible to capture by malicious actors. As such, it is important that all data communicated between database servers and web servers is encrypted.

Security and data privacy

Network separation [Recommended]

Placing database servers on the same network segment as user workstations can increase the likelihood of database servers being compromised by malicious actors. Additionally, in cases where databases will only be accessed from their own database server, allowing remote access to the database server poses an unnecessary security risk.

Security and data privacy

Separation of development, testing and production database servers [Mandatory]

Using production database servers for development and testing activities could result in accidental damage to their integrity or contents. Therefore development, testing and production database servers should be separated.

Security and data privacy

Security hardening [Mandatory]

The server operating systems that the database is installed upon must be security hardened

Security and data privacy

Access control [Mandatory]

Security and data privacy

Default passwords[Mandatory]

The default passwords for accounts and services such as System Administrator must be changed prior to DBMS being deployed

Security and data privacy

DBMS Versions and security updates [Mandatory]

Security and data privacy

Encryption [Mandatory]

Use strong encryption algorithms to protect sensitive data stored on disks, databases, and other storage systems. Ensure that encryption keys are properly managed and stored separately from the encrypted data.

Security and data privacy

Protecting database contents [Mandatory]

Security and data privacy

Monitoring and database events logging [Recommended]

Security and data privacy

Security standards and guidelines [Mandatory]

Database maintenance

The following are guidelines on management and maintenance of DBMS systems should be adopted:

Database maintenance

Performance monitoring and tuning [Recommended]

Database maintenance

Change management [Mandatory]

Database maintenance

Documentation [Mandatory]

7 Disaster recovery and business continuity management

Database systems hold critical data of Government institutions and are core to performance and availability of government software systems used to delivery services and automate government processes. It is therefore critical to ensure their continued availability by putting in place suitable disaster recovery and business continuity processes. The following guidelines apply to disaster recovery and business continuity management: 

7 Disaster recovery and business continuity management

Data backup and recovery strategy process [Mandatory]

Data retention

Data retention is the storing and managing of data and records for a designated period. The period is defined based on operational and regulatory requirements. The following guidelines should be followed:

Data retention

Data retention policies [Mandatory]

Data retention

Data purging [Recommended]

Data purging involves permanently deleting data that is no longer required or relevant. Document the procedures for data purging, including who is responsible for initiating purging, how it is executed, and how verification is done