Skip to main content

Recently Updated Pages

Download Docker Compose Files from GitHub Releases

Deploying openmetadata

Download the Docker Compose files from the Latest GitHub Releases. The Docker compose file nam...

Updated 5 days ago by Victor

ggggggg

Openmetadata documentation

second page  dhdhduhd isdhdj jdhsidiuhsui

Updated 6 days ago by Victor

hhhhh

Openmetadata documentation

ggggggg   Hello my people   hdhdhhdh        

Updated 6 days ago by Victor

The central Role of the Rwanda Information Society Authority (RISA)

Chief Digital Officers Handbook The Digital Context in Rwanda

Established under the Ministry of ICT and Innovation, the Rwanda Information Society Authority “R...

Updated 2 months ago by RISA

References

Software Security and Privacy by Design...

Law No 058/2021 Relating to the Protection of Personal Data and Privacy. Shifting the Balance ...

Updated 2 months ago by RISA

Awareness, Training and Best Practices

Software Security and Privacy by Design...

Provide role-specific training and general awareness sessions.  Topics should include: Data p...

Updated 2 months ago by RISA

Initiation

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Establish security and privacy expectations and identify risks before design work begins. ...

Updated 2 months ago by RISA

Scope

Software Security and Privacy by Design...

What this guideline covers This guideline applies to all software systems developed, acquired, d...

Updated 2 months ago by RISA

Objectives

Software Security and Privacy by Design...

This guideline aims to provide clear, actionable instructions to embed security and privacy into ...

Updated 2 months ago by RISA

Target Audience Roles and Responsibilities

Software Security and Privacy by Design...

Key roles include: Management: Approve security and privacy deliverables and ensure resourcing...

Updated 2 months ago by RISA

Compliance, Audit and Continuous Improvement

Software Security and Privacy by Design...

Schedule regular audits, internal and external assessments, and maintain documented evidence for ...

Updated 2 months ago by RISA

Security Incident Management

Software Security and Privacy by Design...

Key steps: Prepare: maintain an incident response plan with roles, communication trees, and es...

Updated 2 months ago by RISA

Upgrade / Decommission

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Safely retire or replace systems while preserving required records and preventing data leak...

Updated 2 months ago by RISA

Operations and Maintenance

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Sustain security and privacy posture throughout operations. Maintain a schedule for vuln...

Updated 2 months ago by RISA

Deployment

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Deploy securely with correct configurations, access controls and monitoring in place. Ap...

Updated 2 months ago by RISA

Testing

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Verify security and privacy controls work as intended. Create a security test plan cover...

Updated 2 months ago by RISA

Development

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Implement secure, privacy-aware code and configurations. Adopt secure coding standards (...

Updated 2 months ago by RISA

Architecture and design

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Design an architecture that enforces privacy and security by construction. Produce secur...

Updated 2 months ago by RISA

Requirements and acquisition

Software Security and Privacy by Design... Software development lifecycle step-by-...

Goal: Ensure requirements include explicit privacy and security criteria. Define functional, p...

Updated 2 months ago by RISA

Minimum Security and Privacy Controls

Software Security and Privacy by Design...

Data minimization and purpose limitation, collect only what is necessary. Strong encryption fo...

Updated 2 months ago by RISA