Recently Updated Pages
Web Browsing Protection
You must implement a web proxy to protect end users from web threats and control their time onl...
Gateway Level Antivirus Protection
You must have gateway level antivirus protection to detect and disinfect the network traffic to e...
Email Protection
You must ensure that all the mails are scanned before entering into network/ email server and A...
Intrusion Prevention System (IPS)
Implement IPS at gateway for all incoming and outgoing traffic to detect and prevent any intrus...
Minimizing the Exposure of Systems to External Networks
Install and configure Gateway firewall Configure Inbound and outbound ACL (Access Control List...
Purpose of the Directive
This Directive aims at providing important instructions and guidelines for securing GoR entities ...
Create Roadmap for Target Blueprint Implementation
In close collaboration with all stakeholders to ensure seamless alignment Create Roadmap Road...
Gap Analysis
Recommended solutions to be aligned to Government of Rwanda capabilities Conduct Gap Analysis ...
Target Blueprint Development
Align with all stakeholders for completeness of the deliverables Define Target (To Be) Bluepri...
Develop Target Blueprint
Use available assets to create deliverables that are understood across the board Develop Targe...
IT- Disaster Recovery for a Business Continuity
IT disaster recovery consists of developing step-by-step procedures for a full recovery...
Business Continuity (BC) And Disaster Recovery (DR)
BC includes DR and DR requires guidance from BC, to direct priorities and set scope. Figure 1:...
Baseline Blueprint Development
Gain deep understanding of available assets that guide the project Prepare for Data Gathering ...
Guidance for a True IT - Disaster Recovery
For a true DR, a recovery site should be outside of a blast radius this means if a primary site...
Business Requirements Analysis
Liaise with RISA EA Team for alignment with project boundaries Understand Business Requirement...
EA Development Value Chain
Blueprint Development Guidelines
For ease of consultation these guidelines are provided in the form of diagrams organized in the f...
Mainly Confronted Disasters in Rwanda and Management
BCM is a planning that extends well beyond IT function, it looks at everything that might cause i...
Compliance
One of the key benefits for establishing an institution’s blueprint is to ensure the right select...
Business Continuity Management (BCM) Lifecycle
Business continuity management (BCM) is centred around a BCM lifecycle that consists of ...