Advanced Search
Search Results
537 total results found
Security Assessment
You must carry out Regular vulnerability scanning to ensure all the known vulnerabilities such as bugs and configurations are identified All the identified vulnerabilities MUST be fixed by patching the systems or applications immediately and proper systems ...
End User/ End Point Protection
Install End-Point Protection to secure all the end points such as Host based IDS / IPS for servers Ensure that end user devices, systems and application are protected using Endpoint protection and Antivirus solutions.
Implement Passwords Policy
Strictly use strong passwords: Minimum 10 character Combination of Alpha numerical and special characters Don't reuse the passwords Have different passwords for different accounts Change all default passwords upon installation of new software or ...
Vision and Objectives
Smart Rwanda Master Plan Context In October 2015, The Government of Rwanda issued the “SMART Rwanda Master Plan” (SRMP), which provides the elements needed to achieve the vision of “a Knowledge Based Society”. SRMP identified a set of core objectives, includi...
Availability of Systems and Services
Ensure critical services are available whenever it required by: Having Redundant System components Redundant Servers Failover networks Disaster Recovery Arrangements Such as alternative site or arrangements based on the criticality of the services they ...
Backups
All the GoR Entities should have backup: Daily Weekly Monthly and Yearly One copy of backup should be stored at offsite securely All the backup should be encrypted with password Backup should include data, applications, configurations and Syste...
Incident Management
Have a clearly defined incident management procedure (refer to the Incident management procedure circulated). Every Institution should establish an Incident management team and clear communication channel internal or external for communicating the incidents...
Security Awareness
Conduct regular security awareness programs for the end-users and system administrators to secure institution's data and information from any attacks
Digital Government Platform Architecture
This section provides an overview of the proposed architecture for the Digital Government Platform. Architecture Overview The Digital Government Platform is not one single solution, but rather a set of technology components, architecture artefacts, and guide...
Ownership and Governance
As described earlier, the Rwanda Digital Government Platform (RDGP) should not beconsidered as one monolithic solution that can be deployed at once. It is rather a set of technology systems, components, architecture artefacts, and guidelines that are most like...
Implementation Roadmap
Considering the gap between the current status and the expected future status, the RDGP’s components are further classified into three categories: Tactical quick wins Strategic priorities Transformational initiatives. The matrix below is a summary of t...
Enterprise Architecture Governance
Introduction The Government of Rwanda under the leadership of RISA has undertaken to develop Enterprise Architecture Practice with the goal of establishing unified IT standards and practices across all public entities. The rationale behind this is the need fo...
Enterprise Architecture Documentation
This “Rwanda Digital Government Strategy and Governance” document describes at high level the architecture of the “Digital Government Platform” which seeks to establish a common integration and communication point for all GoR’s IT systems, setting integration ...
Acronyms
Glosary Terms
Background
The government of Rwanda has embarked on a project to establish and implement enterprise architecture (EA) in public entities with the end goal of establishing common architecture standards across all ICT functional units. This will in turn assist the governm...
Purpose
The purpose of this document is to provide guidance to enterprise architecture practitioners within government of Rwanda on the application of the enterprise wide architecture framework. The document unpacks the elements that make up the Enterprise Architectur...
Enterprise Architecture Domains
As stated above, enterprise architecture seeks to address business requirements that would bring added value to the organization and its target customers. To achieve this, leading practice has identified five interlinked domains that make up enterprise archite...
Enterprise Architecture Drivers
Listed below are some of the business requirements and drivers that make a case for Enterprise Architecture. Legislation: - Legislations change frequently. An agile enterprise architecture ensures that organizations comply with changing legislation easil...
Architecture Development Method (ADM)
The Architecture Development Method (ADM) describes how the artefacts that enterprise architecture will document and maintain. NOTE: Each entity within the government of Rwanda will define its own enterprise architecture following the standards that the RGEA ...