Recently Updated Pages
Performance monitoring and tuning [Recommended]
Implement real-time monitoring to promptly detect and respond to performance issues as they ari...
Monitoring and database events logging [Recommended]
Employ real-time monitoring tools to detect and respond to unauthorized access attempts as they...
Protecting database contents [Mandatory]
Database administrators and database users should know the sensitivity or classification associ...
Access control [Mandatory]
Implement strict access controls to restrict access to authorized personnel only Access to a D...
Separation of development, testing and production database servers [Mandatory]
Using production database servers for development and testing activities could result in accident...
Network separation [Recommended]
Placing database servers on the same network segment as user workstations can increase the likeli...
Communications between database servers and web servers [Recommended]
Data communicated between database servers and web servers, especially over the internet, is susc...
Functional separation between database servers and web servers [Recommended]
Due to the higher threat environment that web servers are typically exposed to, hosting database ...
Non critical database systems [Recommended]
For other systems and applications deemed non-critical and kept on premises, entities are require...
Migration of critical database systems [Mandatory]
For critical database systems and applications hosted on premises, the government entity should i...
Database hosting location [Mandatory]
Database systems and applications should be hosted in the data hosting environment officially ado...
DBMS Choice [Mandatory]
Evaluate different DBMS technologies based on the institution's requirements. Consider factors ...
Data model [Recommended]
Determine the appropriate data model for your DBMS such as relational or NoSQL based on the natur...
Scope and applicability
These guidelines aim to provide best practices for effective Database Management Systems (DBMS) i...
Access Control[Mandatory]
SSH login for root user must be disabled and a dedicated user with sudo access for CI/CD pipeline...
Continuous integration & Continuous Delivery (CI/CD) [Recommended]
The technical goal of CI/CD is to establish a consistent and automated way to build, package, tes...
Containerization and service orchestration [Mandatory]
Containers provide an isolated environment for running software. Docker or Kubernetes is the reco...
Infrastructure as Code [Mandatory]
Infrastructure as code is the process of managing and provisioning computer data centers through ...
Tagging[Mandatory]
Test branch must always contain tagged version from development branch and production branch must...
Scope and objectives
This document covers the DevOps approach to be followed by Government institutions in Rwanda. The...