Recently Updated Pages
Introduction
DevOps is a set of practices and tools that integrate and automate the work of software developme...
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer ...
Auditing [Mandatory]
Each server must be configured to track and log each access to the server. These access logs must...
Monitoring [Mandatory]
Monitoring tools for infrastructure must be available and configured with alerts for when servers...
Different environments[Mandatory]
Different environments must be available for deployment of applications in development, testing a...
Backup[Mandatory]
Regular backup of data and of the whole OS must be taken and this task must be automated.
Operating System (OS)[Recommended]
Linux-based Operating systems are recommended and the same version of the OS must be installed in...
Entry into force
This guideline shall come into force on the date of its signature by the Chief Executive Officer ...
Data purging [Recommended]
Data purging involves permanently deleting data that is no longer required or relevant. Document ...
Documentation [Mandatory]
Maintain accurate and up-to-date database documentation which is crucial for the efficient and ...
Security standards and guidelines [Mandatory]
Ensure compliance to the Minimum Cybersecurity Standards for Public Institutions that are provi...
Encryption [Mandatory]
Use strong encryption algorithms to protect sensitive data stored on disks, databases, and other ...
DBMS Versions and security updates [Mandatory]
The versions of DBMS used must still be supported by the vendor All installations of a DBMS mu...
Default passwords[Mandatory]
The default passwords for accounts and services such as System Administrator must be changed prio...
Security hardening [Mandatory]
The server operating systems that the database is installed upon must be security hardened
Data validation [Mandatory]
When capturing new data in a DBMS, data validation must be used to ensure the DBMS’s stability an...
Network Implementation
Network equipment: The network equipment and devices comprising the core network infrastructur...
References
Minimum Bandwidth for Broadband Internet Connectivity in Rwanda Directives on Cyber Security...
Resources and Impact
Resources (human and financial) needed to implement the strategy and potential sources of funds w...
Personnel Security
The public institution shall identify (inventories) its own human resources. For each official ...