Advanced Search
Search Results
252 total results found
Patch Management
All the system and application MUST have latest patch installed Test the patch before applying and then apply in the production environment Patch network devices (Firmware), applications, middleware, OS and any utility programs (Office, Adobe etc ... )
Security Assessment
You must carry out Regular vulnerability scanning to ensure all the known vulnerabilities such as bugs and configurations are identified All the identified vulnerabilities MUST be fixed by patching the systems or applications immediately and proper systems ...
End User/ End Point Protection
Install End-Point Protection to secure all the end points such as Host based IDS / IPS for servers Ensure that end user devices, systems and application are protected using Endpoint protection and Antivirus solutions.
Implement Passwords Policy
Strictly use strong passwords: Minimum 10 character Combination of Alpha numerical and special characters Don't reuse the passwords Have different passwords for different accounts Change all default passwords upon installation of new software or ...
Availability of Systems and Services
Ensure critical services are available whenever it required by: Having Redundant System components Redundant Servers Failover networks Disaster Recovery Arrangements Such as alternative site or arrangements based on the criticality of the services they ...
Backups
All the GoR Entities should have backup: Daily Weekly Monthly and Yearly One copy of backup should be stored at offsite securely All the backup should be encrypted with password Backup should include data, applications, configurations and Syste...
Incident Management
Have a clearly defined incident management procedure (refer to the Incident management procedure circulated). Every Institution should establish an Incident management team and clear communication channel internal or external for communicating the incidents...
Security Awareness
Conduct regular security awareness programs for the end-users and system administrators to secure institution's data and information from any attacks
Introduction
Data Center is a centralized dedicated place that provides the information-processing infrastructure specifically the IT and Telecommunications equipment such as servers, storage equipment and the core network infrastructure. Considering the above critical fu...
Data Center Design Process
A Well thought DC design process is the mandatory consideration for any Data Center within Rwanda. As Data center is the nerve center of IT computing infrastructure. These requirements must be considered while designing Data center.Datacenters need to meet the...
Selection and Evaluation of the Site
This section emphasizes the requirements for evaluating and selecting a suitable site for the Data center, whether the location is a new site that involves the construction of a new data center or reviewing the location of an existing building that will functi...
Space Planning
Space planning is one of the key activities in the process of datacenter preparation. The size of the computer room space determines the capacity of datacenter to accommodate IT, Telecommunications equipment, power and cooling system. High-density data centers...
Site Selection
The site should not have interfering elements. The below interfering elements should be eliminated vibration air contamination security Flood electromagnetic interference Hazardous materials The site should have enough space around the building to ...
24/7 Operation of Data Center - Temperature and Relative Humidity Control
All Tier 3 and Tier 4 datacenter should have security personnel within the datacenter and security at arrival and departure locations. At high security facilities, walls, windows and doors of rooms typically permanently staffed (i.e., command center, a guard ...
Materials
The computer room shall be designed and built with new materials, which are durable, of superior quality, and easy to maintain and operate. Where recycled materials will not affect the operation of the space, they may be considered for use.
General Paths of Access
All entries into the data center shall be secured. There should be a direct communication between control center and the building guard station and it should be both audio and visual for high sensitive sites. The points of access include main data center pers...
Planning Detail
The entry to the computer room from non-computer room spaces shall lead into a controlled space within the data center, prior to providing access to the computer room areas.Entry for equipment, if separate from main entry, shall be controlled by the data cente...
Computer Room
The support equipment such as HVAC floor mounted air handlers, coolant distribution units, electrical PDU, static switches, fire suppression tank may require around 40% of overall space in the equipment area. The cabinet and rack layout should be considered t...
Entrance Rooms
Class 3 and higher data centers shall have separate entrance rooms and the entrance room if separate from the computer room, shall be accessed without going through the computer room. Class 2 and lower data centers may have a single entrance room. The entranc...
Mechanical Room
Outside of the computer room provide space for the heat ejection equipment and associated pumps, fuel tanks and controls. Mechanical components within a computer room should be located separate from the ITE rows in order to provide maintenance access. Coolin...