Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

245 total results found

Communications between database servers and web servers [Recommended]

Database Administration Guidelines Security and data privacy

Data communicated between database servers and web servers, especially over the internet, is susceptible to capture by malicious actors. As such, it is important that all data communicated between database servers and web servers is encrypted.

Network separation [Recommended]

Database Administration Guidelines Security and data privacy

Placing database servers on the same network segment as user workstations can increase the likelihood of database servers being compromised by malicious actors. Additionally, in cases where databases will only be accessed from their own database server, allowi...

Separation of development, testing and production database servers [Mandatory]

Database Administration Guidelines Security and data privacy

Using production database servers for development and testing activities could result in accidental damage to their integrity or contents. Therefore development, testing and production database servers should be separated.

Security hardening [Mandatory]

Database Administration Guidelines Security and data privacy

The server operating systems that the database is installed upon must be security hardened

Access control [Mandatory]

Database Administration Guidelines Security and data privacy

Implement strict access controls to restrict access to authorized personnel only Access to a DBMS must apply the principle of least privilege and users and applications should only have the permissions required to achieve their role and purpose

Default passwords[Mandatory]

Database Administration Guidelines Security and data privacy

The default passwords for accounts and services such as System Administrator must be changed prior to DBMS being deployed

DBMS Versions and security updates [Mandatory]

Database Administration Guidelines Security and data privacy

The versions of DBMS used must still be supported by the vendor All installations of a DBMS must be up to date with all appropriate security patches prior to deployment

Encryption [Mandatory]

Database Administration Guidelines Security and data privacy

Use strong encryption algorithms to protect sensitive data stored on disks, databases, and other storage systems. Ensure that encryption keys are properly managed and stored separately from the encrypted data.

Protecting database contents [Mandatory]

Database Administration Guidelines Security and data privacy

Database administrators and database users should know the sensitivity or classification associated with databases and their contents. In cases where all of a database’s contents are the same sensitivity or classification, an organisation should classify the...

Monitoring and database events logging [Recommended]

Database Administration Guidelines Security and data privacy

Employ real-time monitoring tools to detect and respond to unauthorized access attempts as they occur. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are useful for this purpose Centrally logging and analysing database events can a...

Security standards and guidelines [Mandatory]

Database Administration Guidelines Security and data privacy

Ensure compliance to the Minimum Cybersecurity Standards for Public Institutions that are provided by the National Cyber Security Authority Ensure compliance with Rwanda’s Data Privacy Law and RISA Security and Data privacy guidelines

Performance monitoring and tuning [Recommended]

Database Administration Guidelines Database maintenance

Implement real-time monitoring to promptly detect and respond to performance issues as they arise Implement database performance tuning which involves optimizing the configuration, structure, and queries of a database system to achieve optimal efficiency, r...

Change management [Mandatory]

Database Administration Guidelines Database maintenance

Establish a formal process for submitting requesting, approval and implementation of changes to a database Document all database changes comprehensively. This includes changes to schema, indexes, stored procedures, triggers, and configuration settings Use ...

Documentation [Mandatory]

Database Administration Guidelines Database maintenance

Maintain accurate and up-to-date database documentation which is crucial for the efficient and effective management of databases within an institution

Data backup and recovery strategy process [Mandatory]

Database Administration Guidelines 7 Disaster recovery and business contin...

Develop a backup and recovery strategy to prevent data loss in case of hardware failures, errors or disasters Specify the acceptable data loss in case of a disruption. This determines how frequently backups need to be taken to minimize data loss Determine ...

Data retention policies [Mandatory]

Database Administration Guidelines Data retention

Classify your data into categories based on factors such as sensitivity, importance, and compliance requirements. Different categories may have different retention periods Define data retention policies based on the operational needs of the institutions, re...

Data purging [Recommended]

Database Administration Guidelines Data retention

Data purging involves permanently deleting data that is no longer required or relevant. Document the procedures for data purging, including who is responsible for initiating purging, how it is executed, and how verification is done

Entry into force

Database Administration Guidelines

This guideline shall come into force on the date of its signature by the Chief Executive Officer of RISA.

Introduction

DevOps Guidelines

DevOps is a set of practices and tools that integrate and automate the work of software development and IT operations as a means for improving and shortening the systems development life cycle. This document is a guideline on the DevOps approach to be followed...

Scope and objectives

DevOps Guidelines

This document covers the DevOps approach to be followed by Government institutions in Rwanda. The intended audience are software developers, system administrators, DevOps engineers and engineering managers in software development companies that are working wit...