ICT Authority
ICTA Assessment Digital Readiness & E-Services

Infrastructure Readiness

Connectivity, hosting, resilience, cybersecurity and operational maturity across MDAs.

Average TRI: 2.4 No dedicated DR: 55%

Infrastructure Readiness (TRI)

TRI assesses connectivity, hosting, resilience, cybersecurity and operational maturity. While baseline connectivity exists across most MDAs, risks are concentrated in hosting fragmentation and weak disaster recovery.

2.4
Average TRI Score
Scaled 0–5; transitional readiness with notable resilience gaps.
55%
No Dedicated DR
Most MDAs lack a tested or dedicated DR capability.
40%
On-Premise Hosting
A large portion of systems are still hosted primarily on-prem.
56%
GoK Shared Cloud (Cloud Share)
Share of cloud-hosted systems on Government Shared Cloud.
What to prioritise first (triage)
1) DR for critical systems
Reduce downtime risk; standardize DR testing and reporting.
2) Connectivity redundancy
Single-ISP dependency drives outages; prioritise dual links where feasible.
3) Hosting consolidation
Move suitable workloads to shared cloud/hybrid patterns with controls.

Hosting Landscape

Distribution of systems by hosting model and cloud provider share.

Hosting Model (On-Prem / Hybrid / Cloud)

Cloud Provider Share (Cloud-hosted systems)

Interpretation
  • On-prem and hybrid typically carry higher operational burden (patching, backups, physical security, power, and cooling).
  • Cloud adoption is present, but benefits depend on standard governance, security baselines, and DR/test discipline.

Resilience & Recovery

Disaster recovery arrangements remain the primary operational risk in the infrastructure stack.

Key finding
Only ~20% report a dedicated DR site; ~25% have partial arrangements; ~55% report no DR.
Implication
System downtime risk is amplified for on-prem and hybrid deployments without tested recovery plans.
Recommended actions
  • Stand up shared DR and backup services for high-risk systems.
  • Standardize DR testing schedules, evidence capture, and reporting.
  • Prioritize migration of suitable workloads to the Government Shared Cloud (with controls).
DR breakdown (drill-down)
DR status % of MDAs
Dedicated DR Site20%
Partial / Planned DR25%
No DR55%

Use this table to cross-check the chart values against the report.

Connectivity & Network Quality

Drill-down views for connectivity redundancy (ISP count) and network stability ratings captured in the assessment.

Connectivity Redundancy (ISP Count, n=63)

Network Stability Rating (n=192)

ISP count drill-down table
ISP count % of MDAs
1 ISP70%
2 ISPs30%

Single-ISP dependency is a common outage driver; prioritise redundancy for critical sites.

Stability rating drill-down table
Rating Count Percentage
Excellent3518.2%
Good9348.4%
Average6433.3%

Good+ totals 66.7% (Excellent+Good). Use this for KPI tracking over time.

Cybersecurity Baseline

Desktop review indicates strong HTTPS uptake but weaker secure configuration posture.

95.8%
HTTPS Implemented
62.2%
Secure Config (Basic)
52.4%
ICTA Registrar Signals
How to use this baseline
  • Maintain HTTPS but add configuration hardening and routine scanning for common weaknesses.
  • Prioritise shared services: DNS, certificates, monitoring, and vulnerability management.
  • Use Desktop Review indicators as repeatable KPIs for improvement cycles.

See Desktop Review page for full indicator set.