Procedures, Steps and Standards

Guidelines on Acceptable Software Use

Government institutions must ensure that all software is used in a lawful, ethical, and secure manner. This section outlines detailed procedures, Do’s, Don’ts, and best practices for software usage within public institutions. 

Intended Purpose [Mandatory]

Procedures:

Do’s

Don’ts

Best practice

Do use government software only for tasks that align with official duties.

 

Don’t use government software for personal, commercial, or political activities.

Provide annual refresher training on acceptable software use.

 

Do follow approved workflows and security policies when using applications.

Don’t upload, store, or process non-official data using government software.

 

Enforce disciplinary actions for repeated misuse or policy violation.

 

 

 

Implement user activity monitoring tools for accountability.

Licensed Software [Mandatory]

Procedures:

Do’s

Don’ts

Best practice

Do read and understand software license agreements before installation.

Don’t install pirated or unapproved software.

 

Schedule quarterly internal audits to check compliance with licensing policies.

 

Do store purchase and license documentation securely.

 

Don’t share or copy software installers without authorization.

 

Engage RISA or the national procurement authority for enterprise-wide licenses when possible.

Intellectual Property [Mandatory]

Procedures:

Do’s

Don’ts

Best practice

Do respect copyright and patent laws.

 

Don’t reverse-engineer, copy, or distribute proprietary software.

Establish an IP compliance checklist before system deployment.

Do use open-source software under approved licenses (e.g: Apache).

Don’t use cracked or unauthorized versions.

 

Train IT staff and end-users on recognizing and respecting software IP rights.

Software Updates [Mandatory]

Step-by-Step Procedures:

Do’s

Don’ts

Best practice

Do apply critical security patches as soon as they are released.

 

Don’t postpone or ignore update notifications.

 

Test major updates in a controlled environment before deployment to production.

Do inform users before major updates that may affect system availability.

Don’t install updates from untrusted or unofficial sources.

Maintain rollback plans in case updates cause service disruptions.

Reporting Violations [Recommended]

Procedures:

Do’s

Don’ts

Best practice

Do encourage staff to report suspicious activities promptly.

Don’t ignore minor incidents; report all issues for review.

 

Integrate violation tracking into the institution’s Service Desk system.

Do include violation reporting in cybersecurity awareness sessions.

 

Don’t share violation reports outside official channels.

 

Conduct post-incident reviews to identify root causes and preventive measures.

Storage Locations [Mandatory]

Procedures:

Do’s

Don’ts

Best practice

Do use secure government-managed repositories for storing software.

 

Don’t upload software or government data to public storage (e.g: Google Drive, Dropbox) unless officially approved.

Implement a centralized storage policy defining approved locations.

 

Do perform scheduled backups and verify data integrity.

Don’t use personal email to transmit installation files or system credentials.

Classify data according to sensitivity levels (public, confidential, restricted).

 

 

Periodically review access permissions to storage systems.

Security Awareness [Mandatory]

Procedures:

Do’s

Don’ts

Best practice

Do stay alert for phishing emails or suspicious links.

 

Don’t open attachments from unknown senders.

 

Incorporate software security awareness into onboarding sessions.

Do immediately report any suspected malware or data breach.

Don’t install browser extensions or apps without IT approval.

Reward compliance and positive reporting behavior.

 

 

 

Run simulated phishing tests quarterly to reinforce awareness.

Central Management [Recommended]

Procedures:

Do’s

Don’ts

Best practice

Do manage all installations from central repositories or IT-managed servers.

Don’t allow staff to install or modify software independently.

Adopt an endpoint management platform (e.g: Ansible).

Do enforce standard configurations for uniformity.

 

Don’t maintain outdated or redundant applications.

 

Schedule monthly compliance scans to ensure all systems meet software standards.

 

 

Maintain centralized logs for auditing and troubleshooting.

Guidelines on User Access Management

User Access Management is the process of creating, managing, and securing user accounts on software systems. It ensures that only authorized personnel can access government systems, protects sensitive data, and maintains accountability. This section outlines the mandatory procedures, standards, and best practices that every government institution must follow to manage user access effectively.

Authorized Access [Mandatory]

Ensure that only legitimate, authorized users can access government software applications according to their job roles and responsibilities.

Step-by-Step Procedures:

Do’s

Don’ts

Practice

Do verify each user’s identity before granting access.

Don’t grant administrative rights unless necessary.

Implement role-based access control (RBAC).

Do review access rights periodically (every 3–6 months).

Don’t approve access requests without written authorization.

Automate access approval and logging through identity management tools.

 

 

Require annual user access recertification.

Termination of User Accounts [Mandatory]

Prevent unauthorized access from former employees, contractors, or temporary users.

Procedures:

Do’s

Don’ts

Practice

Do confirm account termination with written acknowledgment from HR.

Don’t leave inactive accounts enabled.

 

Use an automated deprovisioning system linked to HR exit workflows.

Do maintain a record of all deactivated accounts.

Don’t reuse deleted usernames without clearance.

 

 

Third-Party Access [Mandatory]

Ensure that external vendors or partners access government software systems securely and temporarily.

Procedures:

Do’s

Don’ts

Practice

Do verify the identity and legitimacy of all third-party users.

Don’t provide administrative credentials.

 

Use a secure remote access gateway or jump server for vendor sessions.

Do audit third-party access logs monthly.

Don’t allow shared or unmonitored VPN connections.

 

Generic or Shared User Accounts [Mandatory]

Maintain accountability by ensuring all actions on systems are traceable to an individual user.

Procedures:

Do’s

Don’ts

Practice

Do maintain accountability records for exceptional shared access.

 

Don’t use shared accounts for daily operations

 

Integrate systems with centralized directory services (e.g: Active Directory) to enforce identity traceability.

Securing Login Credentials [Mandatory]

Protect user credentials from unauthorized disclosure or misuse.

Procedures:

Do’s

Don’ts

Practice

Do use password managers approved by the IT department.

Don’t reuse passwords across systems.

 

Implement automatic password rotation for privileged accounts.

Do lock your screen when away from your workstation

Don’t disclose login credentials via email or chat.

 

 

Password Policies [Mandatory]

Ensure consistent and secure password management across all systems by following the Standards (based on NIST SP 800-63B):

Procedures:

Do’s

Don’ts

Practice

Do encourage use of passphrases.

Don’t force frequent unnecessary password changes (unless a breach occurs).

Adopt adaptive authentication where risk-based password validation is applied.

 

Multi-Factor Authentication (MFA) [Mandatory]

Enhance security by requiring more than one factor of authentication.

Procedures:

Do’s

Don’ts

Best practice

Do enforce MFA for VPN, email, and system admin logins.

Don’t allow exceptions without written approval from IT Security.

 

Regularly review and update MFA settings to ensure only authorized users have active access.

Biometrics [Recommended]

Add an additional layer of user authentication to enhance security and convenience.

Procedures:

Do’s

Don’ts

Practice

Do inform users about how their biometric data is used and stored.

Don’t use biometric data for non-authentication purposes.

 

Combine biometric authentication with MFA for sensitive or high-security systems.

Do restrict biometric data access to authorized security personnel only.