Advanced Search
Search Results
217 total results found
Data migration documentation [Mandatory]
Data migration documentation is required when a software project involves moving data from a legacy software system to the new software system. It can also include moving data from manual files or spreadsheets to the new system. Types of data migration documen...
User documentation [Mandatory]
This documentation is created for end-users and should explain in the simplest way possible how users can effectively use the software. User documentation provides an overview of the product’s functionality and gives basic guidelines on how to use it. The docu...
Software configuration and maintenance documentation [Mandatory]
Software maintenance and configuration document is a document that provides key information required to effectively maintain the software. It includes the configurations required for the software including security settings, installation instructions, versio...
Certificate Revocation
Objective: Ensure your system correctly performs the certificate validity check. Guidelines: The deployed system should be able to checks the certificate validity i.e. to check if the certificate is not revoked. Two protocols are used: OCSP (Online Ce...
Certificate Expiration
Objective Prevent the use of expired certificates in your system. Guidelines Automatically check the certificates validity period during the validation process. Ensure that expired certificates are not accepted by the system for any operation. The user...
Signature Validation
Objective: Validate the authenticity and integrity of digital signatures, including Long-Term Validation (LTV) or Time-based validity. Guidelines: Implement validation mechanisms to verify digital signatures against trusted certificates. Enable Long-Term...
Password Management
Objective: Ensure secure handling of user certificate passwords. Guidelines: Do not store user certificate passwords in the database or on any easily accessible file. It is the user responsibility to ensure the password protection Use HTTPS to encrypt d...
Timestamp Validation (Optional)
Objective: Validate the timestamps associated with digital signatures to ensure their reliability and time synchronization. Guidelines: Use a trusted Time Stamping Authority (TSA) to provide accurate and synchronized timestamps for digital signatures. T...
Objectives
These guidelines aim at providing a uniform framework for the design, configuration, and management of digitalization across government institutions in Rwanda to: Harmonize and ensure security and protection of critical systems, infrastructure, data and inf...
Benefits
Adoption of these guidelines will allow government institutions to: Have a high quality and reliable work environment. Efficiently deliver government services to citizens. Remove duplication and reduce costs related to digitalization operations. Enable ...
Scope
These guidelines shall be strictly adhered to by all government institutions, including institutions at central and local government as well as all their affiliated agencies and parastatals.They cover areas including network infrastructure, hardware and end-us...
Principles
These digitalization implementation guidelines shall be used as best practices for digitalization deployment. Digitalization offices shall submit sector level compliance reports annually as an assessment tool to evaluate enforcement of these guidelines. Al...
Network design
The following parameters shall be based on while designing institution network: Number of users in the institution: The number of network users shall be both employees and guests. Services accessed or offered by the institution: Services shall be defined ...
Network Implementation
Network equipment: The network equipment and devices comprising the core network infrastructure to provide connectivity and security features shall among others include a rack, minimum routers, switches, and access points, as well as a firewall. Network ca...
Network Management
Network performance: Redundancy, load balancing, application response time, and quality of service shall be controlled and assured. Network maintenance: Each institution shall elaborate a network maintenance plan together with the disaster recovery (DR), bu...
User devices
Institutional devices used by employees shall be labeled (tagged), recorded and proper naming shall be done. They shall not be used to illegally process, distribute, or store any data protected by copyright of intellectual property. These devices shall not be ...
Precaution measures
Offices with digitalization equipment shall be locked to prevent theft and other risks. Digitalization equipment shall not be placed next to air conditioners as humidity and heat can shorten the life of internal components. Users shall not eat, drink or sm...
Stolen computers
In case of a stolen computer, the user shall immediately report to the supervisor and to Rwanda investigation bureau (RIB) and to the administrator in charge. Institution’s rules and regulations governing loss of public properties shall be applied.
User responsibilities
Users shall ensure proper use of digitalization equipment in accordance with all provisions of these guidelines. Users are required to report any misuse or potential threats to digitalization equipment. It is the user’s responsibility to seek guidance when...
Hardware acquisition, maintenance
All IT equipment shall be checked once in every quarter and maintained according to the elaborated maintenance plan. Institutions shall always refer to RISA hardware acquisition and maintenance framework contracts.