Advanced Search
Search Results
739 total results found
Physical Security
Cloud service provider must enforce the physical security as per the ISO27001 controls and it must be implemented and followed in a professional manner and the detailed control mapping is mentioned in the Annex A. In a cloud environment, Individual entity env...
Network and Infrastructure Security
Cloud service provider must enforce the network security as per the ISO27001 controls and it must be implemented and followed in a professional manner and the detailed control mapping is mentioned in the Annex A. Cloud service provider must ensure the network...
Applications and Database Security
Environments where organizations’ data is stored in the same instance of the database managementsystems data store.
Security and Compliance
Proactive testing, identification and mitigation of vulnerabilities are an important part of achieving and maintaining compliance ISO 27001 and cloud security alliance standards that utilize cloud services and systems. Cloud service provider must ensure that ...
Information Security
IT governance by the cloud service provider is a significant concern for a cloud service customer, then customers are advised to establish whether a provider complies with one or more of these governance and management standards. Cloud service customers must ...
Security Operations and Management
Incident response Customers need to be notified when an issue, incident, or breach has occurred and the impact to environment or to their data. Issues, incidents and data breaches should be communicated by the Provider to all affected Customers in a timely m...
Business continuity and Disaster Recovery
Cloud service provider must develop an organizational requirement for business continuity plans (BCP), fault tolerance, high availability and disaster recovery (DR) controls apply to the Customer’s outsourced environments as they do for Customer managed facili...
Control Mapping
This below table represents the responsibilities of the Cloud Service Provider (CSP) and End User (EU) in the Cloud Security as per the ISO27001:2013 Standard, and Cloud Security Standard.*CSP – Cloud Service Provider*EU – End User ISO 27001:2013 ...
Scope and Applicability
GIS and spatial data systems play a role in capturing, analyzing, and visualizing geographic information, enabling informed decision-making across various industries. In Rwanda, Government institutions are using GIS in many ways such as National land use plann...
Data Storage and Management
Data storage guidelines address how spatial data should be organized, stored, and maintained in database systems or files. Consistent storage standards ensure data integrity, accessibility, and ease of retrieval for users and applications. Key guidelines for d...
Data Integration
Data integration processes for GIS spatial data include data conversion, data merging and data format standardization. These are essential for creating a consistent and unified spatial dataset. Key guidelines include: Adopt an open data format like Shapefil...
Data Sharing
Data sharing guidelines aim to support data sharing among institutions through adoption of common standards and tools. Recommendations include: Establish data sharing protocols and agreements when collaborating with other organizations. Clearly define data ...
Data Quality
The guidelines outline procedures for data validation, error checking, and data accuracy assessments. Data of high quality is essential for making reliable decisions and producing accurate results. Below are guidelines on data quality. Implement data valida...
Data Analysis
i. Geoprocessing: Verify the spatial relationships to avoid overlaps, gaps, or invalid geometries. Ensure all spatial datasets have the same coordinate system or project them to a common one for accurate analysis. Convert data between different formats...
Data Visualization
i. Map Design Principles: Simplicity - Maps should be visually clean, focusing on the most important information while removing unnecessary elements. Legibility - Ensure that the map's text, labels, and symbols are easy to read and understand, even when...
Purpose of the document
This document is divided into two sections and describes the two key elements to the approach and vision of testing within the GoR Institutions: Software Testing Policy: An overview of the values supporting the testing approach Test Guidelines: These are b...
Overview
RISA is driving the government’s digitalization and innovation plan by supporting sectors and institutions in their automation journey. Automation of services and processes involves acquiring or developing software. In order to ensure that the software meets ...
Scope
This document provides policies and guidelines for the planning and execution of software testing activities for Government of Rwanda Institutions. It is crucial that the consumers of this document (i.e., software project teams in Government of Rwanda Institut...
Purpose of this Software Testing policy
The testing policy outlines the high-level strategy and principles for software testing. It outlines the test goals and objectives, benefits and strategies for test process improvement. All subsequent test strategies and low-level test plans will be establishe...
Mission Statement
To ensure that any changes to software do not jeopardize the quality characteristics of mission-critical systems used by GoR Institutions. To verify, validate, and evaluate the quality of software or systems being delivered and to ensure that testing is perfo...