Skip to main content

Scope

What this guideline covers

This guideline applies to all software systems developed, acquired, deployed, or maintained by Government of Rwanda (GoR) institutions. It provides step-by-step instructions, controls, and best practices for embedding privacy and security throughout the software lifecycle, including:

  • Software initiation, requirements gathering, architecture and design, development, testing, deployment, operations, maintenance, and decommissioning.
  • Risk assessment, threat modeling, and privacy impact assessments (PIAs).
  • Implementation of minimum security and privacy controls such as encryption, RBAC, multi-factor authentication, secure coding, vulnerability management, and audit logging.
  • Incident management, monitoring, and compliance with Law No 058/2021 (Data Protection) and national minimum cybersecurity standards.

What this guideline does not cover

  • Physical security of facilities, data centers, and offices.
  • Security of personal devices (BYOD) beyond software access requirements.
  • National-level cyber defense operations or military/intelligence systems.
  • Vendor internal security policies unrelated to GoR systems.
  • Financial, procurement, or project management procedures not related to software security and privacy.
  • Non-software systems like manual or paper-based processes.
  • User behavior or content moderation on platforms. The focus is on system design and data protection.

Applicable departments and roles

  • All GoR institutions developing or using software systems.
  • Employees, contractors, and third-party vendors involved in software lifecycle activities.