Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

537 total results found

Business Requirements Analysis

Enterprise Architecture Blueprint Devel...

Liaise with RISA EA Team for alignment with project boundaries Understand Business Requirements and value drivers Review business strategy, government of Rwanda initiatives and goals Review all available and relevant documentations including strategy do...

Baseline Blueprint Development

Enterprise Architecture Blueprint Devel...

Gain deep understanding of available assets that guide the project Prepare for Data Gathering Pre-work for the exercise should involve learning how to apply the assets Familiarity with the data gathering template will facilitate the running of the works...

Guidance for a True IT - Disaster Recovery

Business Continuity Management Guidelines

For a true DR, a recovery site should be outside of a blast radius this means if a primary site locate in Kigali a recovery site should be outside of Kigali Distance between sites should not be ≤ 45 km. Both Data centers (primary and recovery site) should ...

Develop Target Blueprint

Enterprise Architecture Blueprint Devel...

Use available assets to create deliverables that are understood across the board Develop Target (To Be) Recommendations Recommendations must take into account overall government goals Standard procedure in determining in whether to Build, Buy or Enhance...

Target Blueprint Development

Enterprise Architecture Blueprint Devel...

Align with all stakeholders for completeness of the deliverables Define Target (To Be) Blueprint Use reference models to guide the development of Target Blueprints Depending on the changes to the architecture, various reference models are available to a...

Gap Analysis

Enterprise Architecture Blueprint Devel...

Recommended solutions to be aligned to Government of Rwanda capabilities Conduct Gap Analysis New initiatives and mandates should be considered in conducting gap analysis It is recommended that reference models be used to create ‘Heat Maps’ to depict hi...

Create Roadmap for Target Blueprint Implementation

Enterprise Architecture Blueprint Devel...

In close collaboration with all stakeholders to ensure seamless alignment Create Roadmap Roadmap development should be driven by the business case and initiatives prioritisation Close collaboration with stakeholders in developing the roadmap will ensure...

Purpose of the Directive

Directives on Cyber Security for Networ...

This Directive aims at providing important instructions and guidelines for securing GoR entities ICT infrastructures and Information by:  Strengthening ICT infrastructure and information access. Insuring high availability of data and systems for dedicated ...

Minimizing the Exposure of Systems to External Networks

Directives on Cyber Security for Networ...

Install and configure Gateway firewall Configure Inbound and outbound ACL (Access Control List) to control only requiredand legitimate traffic only to be allowed to go In and Out of the network. Close all the ports and only open the required port Avoid "a...

Intrusion Prevention System (IPS)

Directives on Cyber Security for Networ...

Implement IPS at gateway for all incoming and outgoing traffic to detect and prevent any intrusion or threats Configure intrusion protection system to protect against denial of service attacks or any malicious attacks 

Email Protection

Directives on Cyber Security for Networ...

You must ensure that all the mails are scanned before entering into network/ email server and Antispam / Antivirus system Implement Policy based Data leak protection solution to protect sensitive data leaving out of your network through emails 

Gateway Level Antivirus Protection

Directives on Cyber Security for Networ...

You must have gateway level antivirus protection to detect and disinfect the network traffic to ensure all detectable virus on the gateway not entering and infecting internal servers or systems 

Wireless Protection

Directives on Cyber Security for Networ...

Wi-Fi must be secured by setting wireless hotspots using proper authentications and strong password or key  No wireless networks should be connected to their internal network directly. They must be connected through firewall.

Web Browsing Protection

Directives on Cyber Security for Networ...

You must implement a web proxy to protect end users from web threats and control their time online You must apply URL-filtering policies and enforce browsing quotas and time-based web surfing for individual users or groups to limit the use of unwanted appli...

Securing On-premises Hosted Services

Directives on Cyber Security for Networ...

You must harden web servers and apps ensuring minimum secure application are hosted Every web services MUST be SSL certificate enabled Thoroughly test the web-based application for any security flaw using guidelines from Open web application security proje...

Acronyms

Rwanda Digital Government Strategy and...

Acronym Full Name BIDAT Business, Information, Data, Application and Technology Architecture BU Business Unit CIO Chief Information Officer DGP Digital Government Platform ...

Terminology

Rwanda Digital Government Strategy and...

Visibility and Monitoring

Directives on Cyber Security for Networ...

Design and implement network to have clear visibility of the traffic going between:  Computer to computer Computer to Server, Server to Computer, Server to Internet and Internet to Internal server and Computers. Use 'Static IP addressing' on syst...

Executive Summary

Rwanda Digital Government Strategy and...

In October 2015, The Government of Rwanda issued the “SMART Rwanda Master Plan” (SRMP), which provides the elements needed to achieve the vision of “a Knowledge Based Society”. The SRMP identified a set of core objectives, including the following: ...

Patch Management

Directives on Cyber Security for Networ...

All the system and application MUST have latest patch installed Test the patch before applying and then apply in the production environment Patch network devices (Firmware), applications, middleware, OS and any utility programs (Office, Adobe etc ... )