Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

252 total results found

User documentation [Mandatory]

Software Technical Documentation Guidel... Product documentation

This documentation is created for end-users and should explain in the simplest way possible how users can effectively use the software. User documentation provides an overview of the product’s functionality and gives basic guidelines on how to use it. The docu...

Software configuration and maintenance documentation [Mandatory]

Software Technical Documentation Guidel... Product documentation

Software maintenance and configuration document  is a  document that provides key information required to effectively maintain the software. It includes the configurations required for the software including security settings, installation instructions, versio...

Certificate Revocation

PKI Service Integration Guidelines (For...

Objective: Ensure your system correctly performs the certificate validity check. Guidelines:  The deployed system should be able to checks the certificate validity i.e. to check if the certificate is not revoked. Two protocols are used: OCSP (Online Ce...

Certificate Expiration

PKI Service Integration Guidelines (For...

Objective  Prevent the use of expired certificates in your system. Guidelines Automatically check the certificates validity period during the validation process. Ensure that expired certificates are not accepted by the system for any operation. The user...

Signature Validation

PKI Service Integration Guidelines (For...

Objective: Validate the authenticity and integrity of digital signatures, including Long-Term Validation (LTV) or Time-based validity. Guidelines: Implement validation mechanisms to verify digital signatures against trusted certificates. Enable Long-Term...

Introduction

Business Continuity Management Guidelines

Business continuity Management (BCM) is a planning and management discipline through which organizations design, implement and maintain measures, plans and strategies which are effective to manage crisis, respond to/ recover from a disaster; This start with an...

Business Continuity (BC) And Disaster Recovery (DR)

Business Continuity Management Guidelines

BC includes DR and DR requires guidance from BC, to direct priorities and set scope. Figure 1: Business continuity and Disaster recovery BUSINESS CONTINUITY (BC) DISASTER RECOVERY(DR) OBJECTIVE: Build resilience OBJECTIVE: Build ...

Business Continuity Management (BCM) Lifecycle

Business Continuity Management Guidelines

Business  continuity  management  (BCM)  is  centred  around  a BCM  lifecycle  that consists of following phases: Figure 2: Business Continuity Management Lifecycle Identification: Assets Inventory And Risk Assessment This phase is a starting point of BC...

Mainly Confronted Disasters in Rwanda and Management

Business Continuity Management Guidelines

BCM is a planning that extends well beyond IT function, it looks at everything that might cause interruption or losses in our business in order to provide effectives strategies for protecting our infrastructure, environment on which our business operations and...

IT- Disaster Recovery for a Business Continuity

Business Continuity Management Guidelines

IT  disaster  recovery  consists  of  developing  step-by-step  procedures  for  a  full recovery, disaster avoidance and business continuity. When many think about DR, they usually think about Backup, while it is only one piece in BC-DR puzzle and inefficien...

Guidance for a True IT - Disaster Recovery

Business Continuity Management Guidelines

For a true DR, a recovery site should be outside of a blast radius this means if a primary site locate in Kigali a recovery site should be outside of Kigali Distance between sites should not be ≤ 45 km. Both Data centers (primary and recovery site) should ...

Purpose of the Directive

Directives on Cyber Security for Networ...

This Directive aims at providing important instructions and guidelines for securing GoR entities ICT infrastructures and Information by:  Strengthening ICT infrastructure and information access. Insuring high availability of data and systems for dedicated ...

Minimizing the Exposure of Systems to External Networks

Directives on Cyber Security for Networ...

Install and configure Gateway firewall Configure Inbound and outbound ACL (Access Control List) to control only requiredand legitimate traffic only to be allowed to go In and Out of the network. Close all the ports and only open the required port Avoid "a...

Intrusion Prevention System (IPS)

Directives on Cyber Security for Networ...

Implement IPS at gateway for all incoming and outgoing traffic to detect and prevent any intrusion or threats Configure intrusion protection system to protect against denial of service attacks or any malicious attacks 

Email Protection

Directives on Cyber Security for Networ...

You must ensure that all the mails are scanned before entering into network/ email server and Antispam / Antivirus system Implement Policy based Data leak protection solution to protect sensitive data leaving out of your network through emails 

Gateway Level Antivirus Protection

Directives on Cyber Security for Networ...

You must have gateway level antivirus protection to detect and disinfect the network traffic to ensure all detectable virus on the gateway not entering and infecting internal servers or systems 

Wireless Protection

Directives on Cyber Security for Networ...

Wi-Fi must be secured by setting wireless hotspots using proper authentications and strong password or key  No wireless networks should be connected to their internal network directly. They must be connected through firewall.

Web Browsing Protection

Directives on Cyber Security for Networ...

You must implement a web proxy to protect end users from web threats and control their time online You must apply URL-filtering policies and enforce browsing quotas and time-based web surfing for individual users or groups to limit the use of unwanted appli...

Securing On-premises Hosted Services

Directives on Cyber Security for Networ...

You must harden web servers and apps ensuring minimum secure application are hosted Every web services MUST be SSL certificate enabled Thoroughly test the web-based application for any security flaw using guidelines from Open web application security proje...

Visibility and Monitoring

Directives on Cyber Security for Networ...

Design and implement network to have clear visibility of the traffic going between:  Computer to computer Computer to Server, Server to Computer, Server to Internet and Internet to Internal server and Computers. Use 'Static IP addressing' on syst...