Skip to main content

Digital Adoption Implementation Guidelines for Government of Rwanda

This document serves as a guide to support the government of Rwanda institutions herein referred to as public institutions and affiliated institutions during digitalization implementation and application to ensure consistency in terms of security, reliability, scalability, effectiveness and efficiency in service delivery.

Introduction

This document serves as a guide to support the government of Rwanda institutions herein referred ...

Principles

These digitalization implementation guidelines shall be used as best practices for digitalizati...

Network and Communication Infrastructure

This section provides guidelines and requirements for deployment of IT networks across institutio...

Hardware & End-User Equipment

Software Applications and Data

This section provides high level guidelines for software applications development, acquiring, usa...

System Administration

System administration is a core function in digitalization implementation, it involves a range of...

Cyber Security

Security Policy and Procedures

The public institution shall as a minimum have a documented Information Security Policy (ISP) bas...

Minimizing the exposure of systems to External Networks

Install and configure gateway firewall. Configure inbound and outbound Access Control List (AC...

Access Control

The institution shall limit system access to authorized users, processes acting on behalf of au...

Implement network segmentation

Access control: It shall start with IT assets, data, and personnel classification into specific...

Institution awareness and Training

The institution shall ensure that executives, senior management, managers, systems administrators...

Audit and Accountability

The institution shall create and retain system audit logs and records to the extent needed to ena...

Configuration Management

The institution shall establish and maintain baseline configurations and inventories of instituti...

Identity Management and Authentication

The institution shall identify system users, processes acting on behalf of users, and devices. ...

Incident Response

The institution shall have an operational incident-handling capability for institutional systems,...

Maintenance

The institution shall perform maintenance on institutional digitalization systems. The institu...

Media Protection

The institution shall protect (i.e., physically control and securely store) system media contai...

Personnel Security

The public institution shall identify (inventories) its own human resources. For each official ...

Physical and Environmental Protection

The institution shall divide the area it manages into security zones based on risk assessment t...

Risk Assessment

The institution shall periodically (at least once a year) assess the risk to institutional operat...

System and Communications Protection

The institution shall monitor, control, and protect communications (i.e., information transmitt...

System and Information Integrity

The institution shall identify, report, and correct system security flaws on time. The institu...

Personally identifiable information (PII) Processing and Transparency

The institution shall identify and meet the requirements for preserving privacy and protecting PI...

Contingency Planning

The institution shall ensure that backup copies of data, software and system images are regular...

Supply Chain Risk Management

In collaboration with a competent authority where applicable, the institution shall establish a...

Passwords Protection

Users shall have different passwords for different accounts. All default passwords shall be ch...

Sector Digital Strategic Plan

All sectors are required to develop sector digital strategic plans to guide the sector’s digital ...

Digitalization Project Management

Digitalization Office Function, Staffing and Training

Innovation and Creativity

All public institutions are called upon to embrace innovation and to adopt new ideas. This secti...

Consequences of Non-Compliance

Compliance to these guidelines is highly encouraged at all sector and institutional levels in ord...

Document Review Cycle

RISA and stakeholders shall review these guidelines every three years or when deemed necessary to...

References

Minimum Bandwidth for Broadband Internet Connectivity in Rwanda   Directives on Cyber Security...