Recently Updated Pages
Clear instructions [Mandatory]
Provide clear and concise instructions for each form field to guide users through the data entry ...
Minimizing form fields [Mandatory]
Keep forms concise by only including essential fields necessary for collecting the required infor...
Robustness
Robustness means that software should be compatible with most devices and assistive technologies....
Understandability
Software that is understandable means that the user comprehends both the information it presents ...
Perceivability
An application that is perceivable means that information can be identified by more than one sens...
Operability
Software applications should allow users to perform all the actions necessary to navigate the use...
Scope and objectives
This document provides guidelines that are aimed at ensuring that software applications and digit...
Introduction
Government websites and systems serve as vital conduits between government institutions and the p...
Roles and responsibilities
Below are the typical roles in a software project and security responsibilities. These can be adj...
Security user awareness and training and best practices for employees
Security user awareness and training is the process of educating employees about cybersecurity an...
Security incident management
Security incident management is the process of identifying, reporting, analyzing and managing sec...
Minimum security controls for data protection
The following technical measures need to be implemented across government institutions in order t...
Security by default
“Secure-by-Default” means software products should be resilient against prevalent exploitation te...
Upgrade /Decommission
This stage involves retiring or removing a software system from service. The software may then be...
Operations and Maintenance
During this stage, the software is in production and operating. Continuous enhancements or modifi...
Deployment Phase
Security configurations[Mandatory] - When deploying software, ensure appropriate security confi...
Testing
following should be considered in the Testing phase: Test planning [Mandatory]- Planning for ...
Development
Secure coding [Mandatory] - In the development stage security requirements and design should be...
Architecture & Design
This stage involves ensuring security is considered as part of the overall system architecture de...
Acquisition
Software can be acquired either through external procurement or in-house development. For the Gov...