Recently Updated Pages
Security standards and guidelines [Mandatory]
Ensure compliance to the Minimum Cybersecurity Standards for Public Institutions that are provi...
Encryption [Mandatory]
Use strong encryption algorithms to protect sensitive data stored on disks, databases, and other ...
DBMS Versions and security updates [Mandatory]
The versions of DBMS used must still be supported by the vendor All installations of a DBMS mu...
Default passwords[Mandatory]
The default passwords for accounts and services such as System Administrator must be changed prio...
Security hardening [Mandatory]
The server operating systems that the database is installed upon must be security hardened
Data validation [Mandatory]
When capturing new data in a DBMS, data validation must be used to ensure the DBMS’s stability an...
Network Implementation
Network equipment: The network equipment and devices comprising the core network infrastructur...
References
Minimum Bandwidth for Broadband Internet Connectivity in Rwanda Directives on Cyber Security...
Resources and Impact
Resources (human and financial) needed to implement the strategy and potential sources of funds w...
Personnel Security
The public institution shall identify (inventories) its own human resources. For each official ...
System access and authorization
All corporate computers shall be joined to the Active Directory-Domain Controller for proper ma...
Email Accounts
All employees shall use corporate emails for any official communication. Email accounts belong...
Password Policy
The following are minimum requirements to create as well as protecting password: The length of...
User collaboration and email service
All Public institutions are obliged to encourage and make sure that all employees own official ...
Business Continuity (BC) and Disaster Recovery (DR)
Business continuity management is a planning and holistic management through which institutions c...
Data
Data produced or collected by government institutions is necessary for measuring effectiveness an...
Software applications
Architectural model for e-government applications: All systems shall be documented in five view...
Timestamp Validation (Optional)
Objective: Validate the timestamps associated with digital signatures to ensure their reliabili...
Main Strategies for Disposal of Old It Equipment
Reference is made to Ministerial order n° 007/2009 of 01/12/2009 determining the institution and ...
Main Phases for Disposal of Old It Equipment
Sufficient thought and analysis must be carried out in advance to all aspects of old equipment di...