Advanced Search
Search Results
537 total results found
Business Requirements Analysis
Liaise with RISA EA Team for alignment with project boundaries Understand Business Requirements and value drivers Review business strategy, government of Rwanda initiatives and goals Review all available and relevant documentations including strategy do...
Baseline Blueprint Development
Gain deep understanding of available assets that guide the project Prepare for Data Gathering Pre-work for the exercise should involve learning how to apply the assets Familiarity with the data gathering template will facilitate the running of the works...
Guidance for a True IT - Disaster Recovery
For a true DR, a recovery site should be outside of a blast radius this means if a primary site locate in Kigali a recovery site should be outside of Kigali Distance between sites should not be ≤ 45 km. Both Data centers (primary and recovery site) should ...
Develop Target Blueprint
Use available assets to create deliverables that are understood across the board Develop Target (To Be) Recommendations Recommendations must take into account overall government goals Standard procedure in determining in whether to Build, Buy or Enhance...
Target Blueprint Development
Align with all stakeholders for completeness of the deliverables Define Target (To Be) Blueprint Use reference models to guide the development of Target Blueprints Depending on the changes to the architecture, various reference models are available to a...
Gap Analysis
Recommended solutions to be aligned to Government of Rwanda capabilities Conduct Gap Analysis New initiatives and mandates should be considered in conducting gap analysis It is recommended that reference models be used to create ‘Heat Maps’ to depict hi...
Create Roadmap for Target Blueprint Implementation
In close collaboration with all stakeholders to ensure seamless alignment Create Roadmap Roadmap development should be driven by the business case and initiatives prioritisation Close collaboration with stakeholders in developing the roadmap will ensure...
Purpose of the Directive
This Directive aims at providing important instructions and guidelines for securing GoR entities ICT infrastructures and Information by: Strengthening ICT infrastructure and information access. Insuring high availability of data and systems for dedicated ...
Minimizing the Exposure of Systems to External Networks
Install and configure Gateway firewall Configure Inbound and outbound ACL (Access Control List) to control only requiredand legitimate traffic only to be allowed to go In and Out of the network. Close all the ports and only open the required port Avoid "a...
Intrusion Prevention System (IPS)
Implement IPS at gateway for all incoming and outgoing traffic to detect and prevent any intrusion or threats Configure intrusion protection system to protect against denial of service attacks or any malicious attacks
Email Protection
You must ensure that all the mails are scanned before entering into network/ email server and Antispam / Antivirus system Implement Policy based Data leak protection solution to protect sensitive data leaving out of your network through emails
Gateway Level Antivirus Protection
You must have gateway level antivirus protection to detect and disinfect the network traffic to ensure all detectable virus on the gateway not entering and infecting internal servers or systems
Wireless Protection
Wi-Fi must be secured by setting wireless hotspots using proper authentications and strong password or key No wireless networks should be connected to their internal network directly. They must be connected through firewall.
Web Browsing Protection
You must implement a web proxy to protect end users from web threats and control their time online You must apply URL-filtering policies and enforce browsing quotas and time-based web surfing for individual users or groups to limit the use of unwanted appli...
Securing On-premises Hosted Services
You must harden web servers and apps ensuring minimum secure application are hosted Every web services MUST be SSL certificate enabled Thoroughly test the web-based application for any security flaw using guidelines from Open web application security proje...
Acronyms
Acronym Full Name BIDAT Business, Information, Data, Application and Technology Architecture BU Business Unit CIO Chief Information Officer DGP Digital Government Platform ...
Terminology
Visibility and Monitoring
Design and implement network to have clear visibility of the traffic going between: Computer to computer Computer to Server, Server to Computer, Server to Internet and Internet to Internal server and Computers. Use 'Static IP addressing' on syst...
Executive Summary
In October 2015, The Government of Rwanda issued the “SMART Rwanda Master Plan” (SRMP), which provides the elements needed to achieve the vision of “a Knowledge Based Society”. The SRMP identified a set of core objectives, including the following: ...
Patch Management
All the system and application MUST have latest patch installed Test the patch before applying and then apply in the production environment Patch network devices (Firmware), applications, middleware, OS and any utility programs (Office, Adobe etc ... )