Skip to main content

Recently Updated Pages

Physical and Environmental Protection

Digital Adoption Implementation Guidelines Cyber Security

The institution shall divide the area it manages into security zones based on risk assessment t...

Updated 4 months ago by RISA

Consequences of Non-Compliance

Digital Adoption Implementation Guidelines

Compliance to these guidelines is highly encouraged at all sector and institutional levels in ord...

Updated 4 months ago by RISA

User responsibilities

Digital Adoption Implementation Guidelines Hardware & End-User Equipment

Users shall ensure proper use of digitalization equipment in accordance with all provisions of ...

Updated 4 months ago by RISA

User devices

Digital Adoption Implementation Guidelines Hardware & End-User Equipment

Institutional devices used by employees shall be labeled (tagged), recorded and proper naming sha...

Updated 4 months ago by RISA

Scope

Digital Adoption Implementation Guidelines Introduction

These guidelines shall be strictly adhered to by all government institutions, including instituti...

Updated 4 months ago by RISA

Benefits

Digital Adoption Implementation Guidelines Introduction

Adoption of these guidelines will allow government institutions to: Have a high quality and re...

Updated 4 months ago by RISA

Objectives

Digital Adoption Implementation Guidelines Introduction

These guidelines aim at providing a uniform framework for the design, configuration, and manageme...

Updated 4 months ago by RISA

Definition of gaps

Digital Adoption Implementation Guidelines Sector Digital Strategic Plan

Based on the assessed current situation, a gap matrix shall be developed to highlight shortages i...

Updated 4 months ago by RISA

Definition of the strategic target position

Digital Adoption Implementation Guidelines Sector Digital Strategic Plan

The desired situation and attainable targets shall be defined within a period of 3-5 years. The t...

Updated 4 months ago by RISA

Personally identifiable information (PII) Processing and Transparency

Digital Adoption Implementation Guidelines Cyber Security

The institution shall identify and meet the requirements for preserving privacy and protecting PI...

Updated 4 months ago by RISA

System and Information Integrity

Digital Adoption Implementation Guidelines Cyber Security

The institution shall identify, report, and correct system security flaws on time. The institu...

Updated 4 months ago by RISA

Audit and Accountability

Digital Adoption Implementation Guidelines Cyber Security

The institution shall create and retain system audit logs and records to the extent needed to ena...

Updated 4 months ago by RISA

Institution awareness and Training

Digital Adoption Implementation Guidelines Cyber Security

The institution shall ensure that executives, senior management, managers, systems administrators...

Updated 4 months ago by RISA

Access Control

Digital Adoption Implementation Guidelines Cyber Security

The institution shall limit system access to authorized users, processes acting on behalf of au...

Updated 4 months ago by RISA

Minimizing the exposure of systems to External Networks

Digital Adoption Implementation Guidelines Cyber Security

Install and configure gateway firewall. Configure inbound and outbound Access Control List (AC...

Updated 4 months ago by RISA

Security Policy and Procedures

Digital Adoption Implementation Guidelines Cyber Security

The public institution shall as a minimum have a documented Information Security Policy (ISP) bas...

Updated 4 months ago by RISA

Password Management

PKI Service Integration Guidelines (For...

Objective: Ensure secure handling of user certificate passwords. Guidelines: Do not store us...

Updated 4 months ago by RISA

Signature Validation

PKI Service Integration Guidelines (For...

Objective: Validate the authenticity and integrity of digital signatures, including Long-Term Va...

Updated 4 months ago by RISA

Certificate Revocation

PKI Service Integration Guidelines (For...

Objective: Ensure your system correctly performs the certificate validity check. Guidelines:  ...

Updated 4 months ago by RISA

Certificate Expiration

PKI Service Integration Guidelines (For...

Objective  Prevent the use of expired certificates in your system. Guidelines Automatically ...

Updated 4 months ago by RISA