Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

217 total results found

Hardware disposal

Digital Adoption Implementation Guideli... Hardware & End-User Equipment

Following the institution’s disposal committee resolutions regarding digitalization equipment to be disposed, the current electronic devices’ disposal guidelines shall be adhered to.

Software applications

Digital Adoption Implementation Guideli... Software Applications and Data

Architectural model for e-government applications: All systems shall be documented in five viewpoints including the enterprise viewpoint (describing purpose, scope and processes), the information viewpoint (determining the structure and semantics of the syst...

Data

Digital Adoption Implementation Guideli... Software Applications and Data

Data produced or collected by government institutions is necessary for measuring effectiveness and developing public services. In that sense, institutions are expected to perform the following: Data discovery and metadata capture. Search and filtering. Bu...

Business Continuity (BC) and Disaster Recovery (DR)

Digital Adoption Implementation Guideli... Software Applications and Data

Business continuity management is a planning and holistic management through which institutions create and implement measures, strategies and plans which are effective to manage crises, respond to/ and recover from a disaster. Business continuity is more than...

User collaboration and email service

Digital Adoption Implementation Guideli... System Administration

All Public institutions are obliged to encourage and make sure that all employees own official work emails and to collaborate online using official and well tested channels such as for video conferencing or document handling and transfer. All employees shal...

Password Policy

Digital Adoption Implementation Guideli... System Administration

The following are minimum requirements to create as well as protecting password: The length of a password is 10 characters and shall comprise at least 2 lowercase, 2 uppercase, numbers, and special characters such as ! @ # $ {} : ” > ? <; Password shall no...

Email Accounts

Digital Adoption Implementation Guideli... System Administration

All employees shall use corporate emails for any official communication. Email accounts belonging to government institutions shall have a domain with a suffix of .gov.rw for example abc.xyz@risa.gov.rw. The e-mail account format shall be FirstName.LastName...

System access and authorization

Digital Adoption Implementation Guideli... System Administration

All corporate computers shall be joined to the Active Directory-Domain Controller for proper management and access to institutional resources. Connection to the local area network (LAN): End-user/Personal computers that have been out of office shall be auto...

Security Policy and Procedures

Digital Adoption Implementation Guideli... Cyber Security

The public institution shall as a minimum have a documented Information Security Policy (ISP) based on information security requirements defined in this document and applicable legal, statutory and regulatory requirements. Information security and topic-speci...

Minimizing the exposure of systems to External Networks

Digital Adoption Implementation Guideli... Cyber Security

Install and configure gateway firewall. Configure inbound and outbound Access Control List (ACL) to control only required and legitimate traffic only to be allowed to go in and out of the network. Close all the ports and only open the required port. Avoid...

Access Control

Digital Adoption Implementation Guideli... Cyber Security

The institution shall limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). The institution shall limit system access to the types of transactions and functions that authorized users ...

Implement network segmentation

Digital Adoption Implementation Guideli... Cyber Security

Access control: It shall start with IT assets, data, and personnel classification into specific groups, and restrict related access through VLAN. Access management: access to VLANs shall be restricted by isolating them from one another and dispatching resou...

Institution awareness and Training

Digital Adoption Implementation Guideli... Cyber Security

The institution shall ensure that executives, senior management, managers, systems administrators, and users of institutional systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedure...

Audit and Accountability

Digital Adoption Implementation Guideli... Cyber Security

The institution shall create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity. The institution shall ensure that the actions of individual...

Configuration Management

Digital Adoption Implementation Guideli... Cyber Security

The institution shall establish and maintain baseline configurations and inventories of institutional systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles. The inventory shall contain info...

Identity Management and Authentication

Digital Adoption Implementation Guideli... Cyber Security

The institution shall identify system users, processes acting on behalf of users, and devices. The institution shall authenticate (or verify) the identities of users, processes, or devices as a prerequisite to allowing access to institutional systems. The ...

Incident Response

Digital Adoption Implementation Guideli... Cyber Security

The institution shall have an operational incident-handling capability for institutional systems, including preparation, detection, analysis, containment, recovery, and user response activities. The institution shall notify the public authority in charge of c...

Maintenance

Digital Adoption Implementation Guideli... Cyber Security

The institution shall perform maintenance on institutional digitalization systems. The institution shall provide controls on the tools, techniques, mechanisms and personnel used to conduct system maintenance.

Media Protection

Digital Adoption Implementation Guideli... Cyber Security

The institution shall protect (i.e., physically control and securely store) system media containing paper and digital media. The institution shall limit access to system media to authorized users. The institution shall sanitize or destroy system media befo...

Personnel Security

Digital Adoption Implementation Guideli... Cyber Security

The public institution shall identify (inventories) its own human resources. For each official position with access, the scope of duties and the analyzed security requirements are defined (the level of access to zones, rooms, documents, systems etc.). The p...