Recently Updated Pages
Physical and Environmental Protection
The institution shall divide the area it manages into security zones based on risk assessment t...
Consequences of Non-Compliance
Compliance to these guidelines is highly encouraged at all sector and institutional levels in ord...
User responsibilities
Users shall ensure proper use of digitalization equipment in accordance with all provisions of ...
User devices
Institutional devices used by employees shall be labeled (tagged), recorded and proper naming sha...
Scope
These guidelines shall be strictly adhered to by all government institutions, including instituti...
Benefits
Adoption of these guidelines will allow government institutions to: Have a high quality and re...
Objectives
These guidelines aim at providing a uniform framework for the design, configuration, and manageme...
Definition of gaps
Based on the assessed current situation, a gap matrix shall be developed to highlight shortages i...
Definition of the strategic target position
The desired situation and attainable targets shall be defined within a period of 3-5 years. The t...
Personally identifiable information (PII) Processing and Transparency
The institution shall identify and meet the requirements for preserving privacy and protecting PI...
System and Information Integrity
The institution shall identify, report, and correct system security flaws on time. The institu...
Audit and Accountability
The institution shall create and retain system audit logs and records to the extent needed to ena...
Institution awareness and Training
The institution shall ensure that executives, senior management, managers, systems administrators...
Access Control
The institution shall limit system access to authorized users, processes acting on behalf of au...
Minimizing the exposure of systems to External Networks
Install and configure gateway firewall. Configure inbound and outbound Access Control List (AC...
Security Policy and Procedures
The public institution shall as a minimum have a documented Information Security Policy (ISP) bas...
Password Management
Objective: Ensure secure handling of user certificate passwords. Guidelines: Do not store us...
Signature Validation
Objective: Validate the authenticity and integrity of digital signatures, including Long-Term Va...
Certificate Revocation
Objective: Ensure your system correctly performs the certificate validity check. Guidelines: ...
Certificate Expiration
Objective Prevent the use of expired certificates in your system. Guidelines Automatically ...