Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

739 total results found

Purpose of the Directive

Directives on Cyber Security for Networ...

This Directive aims at providing important instructions and guidelines for securing GoR entities ICT infrastructures and Information by:  Strengthening ICT infrastructure and information access. Insuring high availability of data and systems for dedicated ...

Minimizing the Exposure of Systems to External Networks

Directives on Cyber Security for Networ...

Install and configure Gateway firewall Configure Inbound and outbound ACL (Access Control List) to control only requiredand legitimate traffic only to be allowed to go In and Out of the network. Close all the ports and only open the required port Avoid "a...

Intrusion Prevention System (IPS)

Directives on Cyber Security for Networ...

Implement IPS at gateway for all incoming and outgoing traffic to detect and prevent any intrusion or threats Configure intrusion protection system to protect against denial of service attacks or any malicious attacks 

Email Protection

Directives on Cyber Security for Networ...

You must ensure that all the mails are scanned before entering into network/ email server and Antispam / Antivirus system Implement Policy based Data leak protection solution to protect sensitive data leaving out of your network through emails 

Gateway Level Antivirus Protection

Directives on Cyber Security for Networ...

You must have gateway level antivirus protection to detect and disinfect the network traffic to ensure all detectable virus on the gateway not entering and infecting internal servers or systems 

Wireless Protection

Directives on Cyber Security for Networ...

Wi-Fi must be secured by setting wireless hotspots using proper authentications and strong password or key  No wireless networks should be connected to their internal network directly. They must be connected through firewall.

Web Browsing Protection

Directives on Cyber Security for Networ...

You must implement a web proxy to protect end users from web threats and control their time online You must apply URL-filtering policies and enforce browsing quotas and time-based web surfing for individual users or groups to limit the use of unwanted appli...

Securing On-premises Hosted Services

Directives on Cyber Security for Networ...

You must harden web servers and apps ensuring minimum secure application are hosted Every web services MUST be SSL certificate enabled Thoroughly test the web-based application for any security flaw using guidelines from Open web application security proje...

Acronyms

Rwanda Digital Government Strategy and...

Acronym Full Name BIDAT Business, Information, Data, Application and Technology Architecture BU Business Unit CIO Chief Information Officer DGP Digital Government Platform ...

Terminology

Rwanda Digital Government Strategy and...

Visibility and Monitoring

Directives on Cyber Security for Networ...

Design and implement network to have clear visibility of the traffic going between:  Computer to computer Computer to Server, Server to Computer, Server to Internet and Internet to Internal server and Computers. Use 'Static IP addressing' on syst...

Executive Summary

Rwanda Digital Government Strategy and...

In October 2015, The Government of Rwanda issued the “SMART Rwanda Master Plan” (SRMP), which provides the elements needed to achieve the vision of “a Knowledge Based Society”. The SRMP identified a set of core objectives, including the following: ...

Patch Management

Directives on Cyber Security for Networ...

All the system and application MUST have latest patch installed Test the patch before applying and then apply in the production environment Patch network devices (Firmware), applications, middleware, OS and any utility programs (Office, Adobe etc ... ) 

Security Assessment

Directives on Cyber Security for Networ...

You must carry out Regular vulnerability scanning to ensure all the known vulnerabilities such as bugs and configurations are identified All the identified vulnerabilities MUST be fixed by patching the systems or applications immediately and proper systems ...

End User/ End Point Protection

Directives on Cyber Security for Networ...

Install End-Point Protection to secure all the end points such as Host based IDS / IPS for servers Ensure that end user devices, systems and application are protected using Endpoint protection and Antivirus solutions. 

Implement Passwords Policy

Directives on Cyber Security for Networ...

Strictly use strong passwords:  Minimum 10 character Combination of Alpha numerical and special characters Don't reuse the passwords Have different passwords for different accounts Change all default passwords upon installation of new software or ...

Vision and Objectives

Rwanda Digital Government Strategy and... Digital Government Strategy

Smart Rwanda Master Plan Context In October 2015, The Government of Rwanda issued the “SMART Rwanda Master Plan” (SRMP), which provides the elements needed to achieve the vision of “a Knowledge Based Society”. SRMP identified a set of core objectives, includi...

Availability of Systems and Services

Directives on Cyber Security for Networ...

Ensure critical services are available whenever it required by: Having Redundant System components  Redundant Servers Failover networks Disaster Recovery Arrangements Such as alternative site or arrangements based on the criticality of the services they ...

Backups

Directives on Cyber Security for Networ...

All the GoR Entities should have backup:  Daily Weekly Monthly and Yearly One copy of backup should be stored at offsite securely All the backup should be encrypted with password Backup should include data, applications, configurations and Syste...

Incident Management

Directives on Cyber Security for Networ...

Have a clearly defined incident management procedure (refer to the Incident management procedure circulated). Every Institution should establish an Incident management team and clear communication channel internal or external for communicating the incidents...