Back
REGISTRATION
100% confidence
via regex
GAZETTE NOTICE NO. 12835
GAZETTE NOTICE NO. 12835
THE CONSTITUTION
REGISTRATION
IN EXERCISE OF THE MANDATE OF THE COMMISSION ON REVENUE ALLOCATION
COMMISSION ON REVENUE ALLOCATION
STANDARDS AND GUIDELINES ON THE INTEGRATED COUNTY REVENUE MANAGEMENT SYSTEM (ICRMS)
Preface
The Commission on Revenue Allocation (CRA) issues this Integrated County Revenue Management System (ICRMS) Standards and Guidelines
pursuant to Article 216 (1) (c) of the Constitution of Kenya, 2010, which mandates the Commission to recommend measures concerning the
financing and financial management of County Governments. In exercising this mandate, and in accordance with Article 216 (2), the Commission
seeks to promote and give effect to the criteria set out in Article 203 (1) (e); to define and enhance, where appropriate, the revenue sources of both
the National and County Governments; and to encourage fiscal responsibility in the management of public resources.
The purpose of these Standards and Guidelines is to establish a uniform, secure, interoperable, and accountable framework for the design,
procurement, deployment, operation, and oversight of Integrated County Revenue Management Systems (ICRMS) across all 47 County
Governments. It responds to systemic challenges in Own Source Revenue (OSR) mobilization, including fragmented systems, weak integration, poor
auditability and lack of standardization.
These Standards and Guidelines supersedes any other guidelines issued in regard to revenue management systems and shall serve as reference for
all National Government agencies, County Governments, service providers and intergovernmental institutions.
1. Introduction and Executive Summary
1.1. The Commission on Revenue Allocation (CRA), in consultation with the National Treasury, Council of Governors (CoG), Office of the
Auditor-General (OAG), Office of the Controller of Budget (CoB), ICT Authority (ICTA), and County Governments, hereby issues the
Integrated County Revenue Management System (ICRMS) Standards and Guidelines.
1.2. These Standards and Guidelines establishes a national framework to standardise the management of Own Source Revenue (OSR) through
the implementation of integrated, secure and interoperable revenue systems within and across all County Governments.
1.3. The ICRMS aims to:
1. Enhance OSR mobilisation and support financial autonomy of counties;
2. Standardize own source revenue collection and management across all county governments
3. Promote transparency, accountability, and efficiency in revenue collection and reporting;
4. Ensure interoperability with national financial and regulatory systems;
5. Standardise functional and technical capabilities across counties;
6. Strengthen data governance, auditability, and compliance.
12:13 PM THE KENYA GAZETTE 9th September, 2025
6152 6152
1.4. These Standards and Guidelines s are issued under the constitutional and statutory mandate of the CRA and shall apply to all National
Government agencies , County Governments, service providers, and intergovernmental institutions involved in the development,
procurement, deployment, or support of revenue management systems.
1.5. The document further outlines the minimum requirements for:
1. Functional capabilities (Annex 1);
2. Technical specifications (Annex 2);
3. Procurement, compliance, and audit tools (Annexes 3–4);
4. Operational frameworks including risk management, data migration, change management, and reporting (Annexes 5–12).
1.6. The adoption of these Guidelines will enhance consistency, interoperability, security, and data governance across counties, thereby
promoting equitable and prudent management of public resources.
2. Problem Statement and Rationale
2.1. Despite constitutional empowerment under Article 209(3) to collect property rates, entertainment taxes, and service charges, many
counties continue to underperform in OSR collection due to:
1. Fragmented and manual revenue systems;
2. Limited automation and functional coverage;
3. Poor integration with national databases (e.g. IPRS, BRS, IFMIS);
4. Non-standard procurement practices leading to vendor lock-in;
5. Inadequate audit trails and data security;
6. Resistance to digital adoption;
7. Weak institutional capacity in ICT and revenue automation.
8. Inadequate assurance of data migration during vendor transitions:
2.2. These challenges result in:
1. Revenue leakages and reduced fiscal sustainability;
2. Inconsistent reporting standards, limiting the comparability and reliability of financial data across counties and over time.
3. Compromised service delivery, as unpredictable or declining revenues constrain budget execution and public investment.
4. Weakened oversight by PFM institutions due to fragmented or unreliable revenue data
5. Increased exposure to fraud, abuse, and system manipulation, particularly where audit trails, access controls, and transaction logs are
inadequate.
6. Ineffective transition between administrations, with incoming county leadership unable to access or trust inherited digital systems,
records, or service contracts.
2.3. Unified Standards and Guidelines framework is therefore necessary to ensure consistency, interoperability, compliance, and long-term
sustainability of county revenue systems.
3. Legal and Institutional Framework
3.1. Constitutional Basis
These Standards and Guidelines is anchored in the Constitution of Kenya, 2010, which provides the foundation for county revenue management
and fiscal responsibility. The relevant provisions include:
1. Article 6(2): Recognition of County Governments as distinct and interdependent units of governance that must conduct their mutual
relations on the basis of consultation and co-operation.
2. Article 201: Public finance principles, which require that revenue raising and expenditure be guided by openness, accountability, equity,
and prudent use of public resources.
3. Article 203(1)(e and i): In determining the equitable share of national revenue, one of the criteria is the need to provide incentives for
each County to optimize its capacity to raise revenue. This underscores the constitutional basis for strengthening County Own Source
Revenue (OSR) through integrated systems such as the ICRMS.
4. Article 209(3): Authority of County Governments to impose property rates, entertainment taxes, and charges for services they provide,
subject to national legislation.
5. Article 216(2)(c): Mandate of the Commission on Revenue Allocation (CRA) to recommend measures concerning the financing and
financial management of County Governments.
6. Article 216(2)(b) and (c): In exercising this mandate, the CRA is required to define and enhance revenue sources of both the National and
County Governments, and to encourage fiscal responsibility. This directly supports the adoption of standardized, technology-driven
revenue management systems.
3.2. Legislative Framework
The Standards and Guidelines is operationalised under the following statutes:
1. Public Finance Management (PFM) Act, 2012: Sections 12(e), 125, 133, and Part VI–VII on financial systems, revenue collection, and
oversight.
2. County Governments Act, 2012: Sections 104 and 115 on transparent financial management and public participation.
9th September, 2025 THE KENYA GAZETTE
3. Public Procurement and Asset Disposal Act (PPADA), 2015: Ensures competitive, transparent procurement of ICT systems.
4. Data Protection Act, 2019: Governs lawful processing, storage, and protection of personal and financial data.
5. Intergovernmental Relations Act, 2012: Facilitates co-ordination between national and county governments.
4. Standards and Guidelines Objectives
4.1. General Objective
To establish a standardised, secure, and interoperable revenue management framework that enhances Own Source Revenue mobilisation, ensures
prudent public financial management, and upholds the principles of equity, transparency, and accountability.
4.2. Specific Objectives
1. Standardise functional and technical specifications for ICRMS across all counties.
2. Improve OSR performance through automation, reconciliation, and enforcement.
3. Ensure compliance with the Constitution, PFM Act, PPADA Act, and Data Protection Act.
4. Enable seamless integration with IFMIS, SCOA, IPRS, KRA, BRS, NTSA, and GIS systems.
5. Safeguard data integrity, confidentiality, and availability.
6. Strengthen transparency and auditability through digital logs and reporting.
7. Build institutional capacity for sustainable system management.
8. Promote shared services and joint procurement to reduce costs.
9. Preserve county autonomy in system administration and revenue decision-making.
10. Promote fiscal prudence, reduce leakages, and support equitable development.
5. Scope and Application
5.1. Institutional Scope
These Standards and Guidelines applies to:
1. All 47 County Governments
2. National government agencies
3. Intergovernmental bodies
4. Private sector vendors, contractors, and service providers.
5. Development partners supporting digital revenue reforms.
5.2. Functional Scope
The Standards and Guidelines covers the full lifecycle of ICRMS, including:
1. Planning, budgeting, and needs assessment;
2. Procurement and contracting;
3. System development, acquisition, or customisation;
4. Deployment, data migration, and integration;
5. Operation, maintenance, and user management;
6. Audit, reporting, and continuous improvement.
6. Guiding Principles
All ICRMS implementations shall adhere to the following principles:
1. Constitutionalism and Rule of Law: Compliance with the Constitution and all applicable laws and legislations .
2. Accessibility to all: Equal access to revenue services for all ratepayers, including marginalised groups .
3. Accountability and Transparency: Full traceability of transactions and decisions.
4. Data Integrity and Protection: Compliance with the Data Protection Act, 2019.
5. Interoperability and Standardisation: Use of open APIs and national standards.
6. County Autonomy: Counties retain administrative control over local system functions.
7. Collaboration: Encouragement of shared infrastructure and joint initiatives.
8. Accessibility: Systems must be accessible via web, mobile, and USSD, and compliant with disability standards.
9. Efficiency: Systems must minimise costs and maximise revenue collection.
7. Roles and Responsibilities
The successful implementation and sustainability of the Integrated County Revenue Management System (ICRMS) requires coordinated
participation by County Governments, constitutional commissions, and national institutions. The following roles and responsibilities shall guide
execution, oversight, and compliance.
12:13 PM THE KENYA GAZETTE 9th September, 2025
6154 6154
7.1. County Governments
SHALL:
1. Have full operational and administrative control over its local instance of the Integrated County Revenue Management System (ICRMS),
including user management, system configuration, and workflow customisation for its revenue processes.
2. Be responsible for the day-to-day operation and management of the system, including data entry, transaction monitoring, user support, and
system maintenance at the county level.
3. Provide and maintain the last-mile ICT infrastructure necessary to support system functionality within its jurisdiction, including
connectivity, power backup, equipment, and related support services.
4. Ensure full compliance with the Public Finance Management Act, 2012, and any other applicable law governing financial management,
including the timely generation and submission of revenue performance reports to relevant institutions.
5. Ensure that all bank accounts receiving county revenue are integrated with the ICRMS to enable real-time reconciliation, transparency,
and effective monitoring of revenue inflows.
6. Establish a Project Implementation Unit (PIU) or Technical Working Group to oversee system implementation at the county level.
7. Coordinate and Conduct training and build internal technical capacity at the county level.
8. The County to establish a monitoring and evaluation Unit to ensure the ICMRS efficiency.
9. Submit quarterly system compliance and performance reports to the PFM institutions.
10. Conduct periodic internal audits of the ICRMS, including audit trail verification, system usage controls, and reconciliation processes, in
line with the internal audit framework established under the PFM Act and county legislation.
7.2. Commission on Revenue Allocation (CRA)
SHALL:
1. Serve as the Standards and Guidelines custodian of the Integrated County Revenue Management System (ICRMS), providing strategic
guidance, technical advice, and intergovernmental co-ordination, in accordance with Article 216(2), 216(3)(a) and (b), and Article
203(1)(e) and (i) of the Constitution.
2. Develop and periodically review the Standards and Guidelines governing the implementation, functionality, and reporting requirements of
ICRMS.
3. Provide technical support to County Governments and relevant institutions on matters related to ICRMS deployment, integration, and
continuous improvement.
4. Analyze Own Source Revenue (OSR) performance reports generated from ICRMS platforms and issue advisory notes to the County
Governments ,PFM Institutions, , and intergovernmental bodies.
5. Undertake independent assessments to evaluate the performance, effectiveness, and operational efficiency of ICRMS platforms deployed
across counties, and recommend corrective or enhancement measures as necessary.
7.3. National Treasury
1. Develop and gazette regulations to guide the implementation, standardization, and oversight of Integrated County Revenue Management
Systems (ICRMS), in accordance with its mandate under the Public Finance Management Act, 2012.
2. Coordinate the design, development, and implementation of a centralized ICRMS platform for County Governments, ensuring functional
completeness, scalability, and alignment with these standard and guidelines on ICRMS
3. Bear the cost of core system development and infrastructure for ICRMS platform, including licensing, hosting, and national-level support
components
4. Oversee the integration of ICRMS with national financial and identity systems, including IFMIS, Standard Chart of Accounts (SCOA),
Business Registration Service (BRS), Integrated Population Registration System (IPRS), and any other relevant government platforms.
5. Initiate and operationalize intergovernmental framework agreements with participating County Governments to govern the deployment,
financing, ownership, and operational responsibilities for shared ICRMS platforms
7.4. Ministry of ICT and the Digital Economy
1. Verify system compliance with the Kenya Government Enterprise Architecture (KGEA) and the Kenya National Interoperability
Framework (KNIF), as developed and issued under the Ministry’s mandate for ICT standards and infrastructure co-ordination.
2. Conduct cybersecurity assessments of ICRMS platforms to ensure conformance with national cybersecurity standards, including data
protection, access controls, and system resilience requirements.
7.5. Office of the Controller of Budget (CoB)
1. Exercise oversight over the implementation of County Government budgets in accordance with Article 228(4) and (6) of the Constitution
and Section 9 of the Controller of Budget Act, 2016, with specific reference to Own Source Revenue (OSR) collection and reporting
through the Integrated County Revenue Management System (ICRMS).
2. Have secure, read-only access to ICRMS-generated revenue reports approved by the County Executive Committee Member responsible
for Finance, for the purpose of monitoring revenue performance, verifying budget execution, and advising on fund releases.
3. Analyze ICRMS data to assess whether actual revenue collection aligns with budget projections, and to identify any shortfalls, variances,
or inconsistencies that may affect budget implementation and fiscal planning.
4. Prepare and submit quarterly and annual reports to Parliament and County Assemblies on the status of budget implementation across
counties, incorporating findings derived from ICRMS revenue data.
9th September, 2025 THE KENYA GAZETTE
7.6. Office of the Auditor-General (OAG)
1. Access and audit the Integrated County Revenue Management System (ICRMS) in all County Governments to verify that revenue
collected, receipted, reported, and managed through the system complies with the Public Finance Management Act, 2012, and related
regulations.
2. Undertake regular financial, compliance, and performance audits of ICRMS platforms pursuant to Article 229 of the Constitution and the
Public Audit Act, 2015.
3. Assess the adequacy of internal controls, system configurations, audit trails, and reconciliation mechanisms embedded within the ICRMS,
to determine whether the system safeguards revenue integrity and accountability.
4. Issue statutory audit reports and management letters detailing findings, risks, and recommendations for corrective action, and submit such
reports to County Assemblies, Parliament, CRA, CoB, and other oversight bodies as required.
5. Follow up on the implementation of audit recommendations by County Governments or national implementing agencies, and track
remedial measures to close audit queries, enhance controls, and prevent recurrence of identified weaknesses.
8. Technical and Functional Standards
8.1. Technical Standards (See Annex 2)
All ICRMS must meet minimum technical requirements in:
8.1.1. Architecture, hardware, software, security, integration, disaster recovery, and data governance.
8.2. Functional Standards (See Annex 1)
All ICRMS must include: Revenue registration, assessment and billing, payment processing, debt management, reporting, self-service portals,
alerts, and audit trails.
9. Governance, Ownership and Administration
The Integrated County Revenue Management System (ICRMS) shall operate as a unified, centrally coordinated platform, developed and
maintained under the leadership of the National Treasury and adopted by all 47 County Governments through formal intergovernmental
arrangements. This governance framework shall be guided by the principles of intergovernmental co-operation, fiscal accountability, and mutual
administrative responsibility, as envisaged under Article 6(2) of the Constitution, the Intergovernmental Relations Act, 2012, and section 12(e) of the
Public Finance Management Act, 2012.
9.1. Centralized Governance and Custodianship
9.1.1 The National Treasury shall serve as the lead implementing agency and system custodian, responsible for the development, hosting,
integration, and core administration of the ICRMS platform. It shall also coordinate linkages with national systems such as IFMIS,
SCOA, BRS, and IPRS, and oversee technical service providers.
9.2 Intergovernmental Framework Agreement
9.2.1 County Governments will adopt the system through an Intergovernmental Framework Agreements with the National Treasury to be
agreed upon by the parties.
9.3 System Ownership and Administrative Rights
9.3.1 Ownership of the ICRMS platform, including core infrastructure and vendor contracts, shall vest in the National Treasury.
9.3.2 Each County Government shall retain exclusive operational administrative rights over its local instance, including user management,
system configuration, data access, and revenue reporting.
9.4 Standards and guidelines Compliance
9.4.1 The ICRMS platform shall fully comply with all provisions of these Standards and Guidelines, including the functional requirements
outlined in Annex 1, technical standards in Annex 2, and service-level provisions in Annex 6.
9.4.2 No deviation from these standards shall be permitted unless formally reviewed and approved through the governance structure established
herein.
9.5 Joint Governance and Oversight Mechanism
9.5.1 A Joint Governance Committee shall be established, co-chaired by the National Treasury and the Council of Governors, with
representation from CRA, ICTA, CoB, OAG, and County Governments.
9.5.2 The Committee shall oversee policy decisions, system upgrades, vendor performance, and provide strategic guidance on the ongoing
development of ICRMS.
9.6 Data Sovereignty and Security
9.6.1 Each County Government shall retain full ownership and custodianship of its own revenue data and any other party shall only access the
data after approval from the county government.
9.6.2 The platform shall comply with the Data Protection Act, 2019, and applicable national cybersecurity standards.
9.7 Local User Administration and Support
9.7.1 County Governments shall establish internal administrative structures to manage user roles, provide frontline support, and escalate system
issues.
9.7.2 The National Treasury shall operate a national helpdesk and coordinate change management, capacity building, and periodic training for
county users
10. Procurement, Development and Deployment
The procurement, development, and deployment of the ICRMS shall be governed by the following provisions:
12:13 PM THE KENYA GAZETTE 9th September, 2025
6156 6156
10.1. The National Treasury shall be the lead implementing agency and shall undertake the procurement, design, customisation, and national-
level deployment of the ICRMS in accordance with the Public Procurement and Asset Disposal Act, 2015, the Public Finance
Management Act, 2012, and applicable ICT standards.
10.2. The ICRMS platform shall be acquired or developed as a shared system, with modular capabilities that allow county-level configuration,
autonomy in operations, and independent access to reporting and user management tools.
10.3. County Governments shall adopt the platform by entering into a formal Intergovernmental Framework Agreement with the National
Treasury, detailing governance, roles, financial obligations (where applicable), data rights, and service-level expectations.
10.4. The procurement of third-party components, hosting, and core infrastructure shall be managed centrally by the National Treasury,
including vendor contracting, software licensing, support services, and integration with national systems such as IFMIS, SCOA, BRS, and
IPRS.
10.5. County Governments shall be responsible for financing and executing their respective local deployment activities, including hardware
provisioning, staff training, onboarding, change management, and localised support infrastructure.
10.6. All components of the system including development, configuration, and rollout must conform to the functional specifications (Annex 1),
technical standards (Annex 2), and SLA requirements (Annex 6) set out in these Standards and Guidelines . No customisation or
divergence from the approved architecture shall be permitted outside the provisions of the agreed governance framework.
10.7. All contracts and implementation arrangements shall include explicit provisions for data protection, source code escrow, knowledge
transfer, and system sustainability to ensure long-term performance and institutional ownership.
10.8. Counties and National Treasury shall develop and approve a Change Management Plan (Annex 9) prior to go-live, addressing stakeholder
engagement, process redesign, and resistance mitigation.
10.9. All development must follow open standards and avoid vendor lock-in.
11. Implementation Framework
The process will entail preparation by the multi-agency, acquisition of the ICRMS by the National treasury, Commissioning and system
implementation.
11.1. Co-ordination Mechanisms
Effective co-ordination of the ICRMS platform shall be ensured through structured multi-level committees and technical units that promote
intergovernmental collaboration, operational oversight, and accountability. The following co-ordination mechanisms shall be established:
11.1.1 National ICRMS Committees
The governance of the centralized Integrated County Revenue Management System (ICRMS) shall be anchored in two interlinked
committees: the National ICRMS Steering Committee and the National ICRMS Technical Committee. Both shall be co-chaired by the
National Treasury and the Commission on Revenue Allocation (CRA), with representation from the Council of Governors (CoG), the
Office of the Controller of Budget (CoB), the Office of the Auditor-General (OAG), the ICT Authority (ICTA), and selected County
Executive Committee (CEC) Members for Finance.
Committee Membership Mandate Key Responsibilities
National ICRMS
Steering Committee
- Co-Chairs: National
Treasury and CRA
- Members: CoG, CoB, OAG,
ICTA, selected CECs Finance
Strategic and policy-
level oversight of the
centralized ICRMS
1. Provide strategic leadership and direction for ICRMS
implementation.
2. Approve major policy directives, system enhancements, and
rollout schedules.
3. Resolve policy-level disputes and foster intergovernmental
consensus.
4. Endorse intergovernmental framework agreements and service
level arrangements.
5. Guide sustainability, compliance, and accountability in line with
the Constitution and PFM Act, 2012.
National ICRMS
Technical Committee
- Co-Chairs: National
Treasury and CRA (technical
representatives)
- Members: ICTA, CoG
technical reps, County ICT
Directors, system vendors (as
needed)
Technical and
operational oversight in
support of the Steering
Committee
1. Coordinate system design, configuration, and integration with
IFMIS, SCOA, BRS, IPRS.
2. Develop and enforce technical and functional standards.
3. Evaluate system changes, upgrades, and vendor deliverables.
4. Monitor performance, manage incidents, and track KPIs.
5. Support capacity building, training, and technical support.
6. Advise the Steering Committee on risks, innovations, and
emerging issues.
11.1.1. County ICRMS Committees
11.1.2. Each County Government shall establish a County ICRMS Committee, chaired by the CEC Member for Finance, with membership
from ICT, internal audit, legal, revenue, and planning departments.
11.1.3. The committee shall oversee local deployment, ensure cross-departmental co-ordination, approve system customisations, and
escalate policy issues to the national level.
11.1.4. Project Implementation Units (PIUs)
11.1.5. Dedicated Project Implementation Units shall be established at both national and county levels:
9th September, 2025 THE KENYA GAZETTE
11.1.5.1. The National PIU, domiciled at the National Treasury, shall coordinate vendor engagement, configuration, helpdesk services,
national training, integration testing, and release management.
11.1.5.2. Each County PIU shall coordinate local infrastructure setup, user training, change management, and day-to-day liaison with the
National PIU during rollout and support phases
11.2. Financing and Cost-Sharing Framework
The Integrated County Revenue Management System (ICRMS) shall be centrally developed and coordinated by the National Treasury. The
financing structure shall be guided by the Public Finance Management Act, 2012, and uphold the principles of sustainability, transparency, and value
for money.
11.3.1 The National Treasury shall finance the core platform development, infrastructure, licensing, hosting, and national-level support
services.
11.3.2 Each County Government shall budget for its respective local deployment costs, including equipment, internet connectivity, training,
onboarding, and change management.
11.3.3 Cost-sharing obligations, where applicable, shall be defined and agreed upon in the Intergovernmental Framework Agreement signed
between the National Treasury and County Governments.
11.3.4 All financial commitments shall be reflected in approved budgets and implemented in accordance with the Public Finance
Management Act, 2012.
11.3. Risk Management
1. Counties shall adopt the Risk Management Framework (Annex 5) to identify, assess, mitigate, and monitor risks.
2. Key risks: Prolonged System breakdown, Data loss, vendor lock-in, user resistance, privacy breaches.
11.4. Data Migration
11.4.1. All data migration shall follow the Data Migration and Cutover Plan (Annex 8) to ensure accuracy, integrity, and minimal disruption.
12. Monitoring, Evaluation and Compliance
12.1. Purpose
To ensure accountability, continuous improvement, and compliance with Standards and Guidelines.
12.2. Monitoring and Evaluation Principles
1. Accuracy: Data must be factual and verifiable.
2. Timeliness: Reports submitted on schedule.
3. Transparency: Findings accessible to authorised stakeholders.
4. Consistency: Standardised formats across counties.
5. Actionability: Findings used for corrective action.
12.3. Monitoring Framework
A robust monitoring mechanism shall be instituted to ensure the proper functioning, compliance, and continual enhancement of the centralized
ICRMS platform. Responsibilities are delineated as follows:
12.3.1 Continuous System Monitoring
The County, in collaboration with the National Treasury, shall conduct daily system checks to ensure real-time system integrity, data
accuracy, uptime, and incident management.
12.3.2 Strategic Compliance Reporting
The County shall submit quarterly compliance reports using the Risk and Compliance Reporting Template (Annex 5) to CRA,
National Treasury, and other oversight agencies.
12.3.3 Annual System Audits
The Office of the Auditor-General (OAG), in conjunction with County Internal Audit departments, shall conduct annual audits of
ICRMS to evaluate system controls, financial accuracy, legal compliance, and data governance.
12.3.4 Performance Assessment by CRA
In alignment with its constitutional mandate under Article 216(2) (to advise on financial management), the Commission on Revenue
Allocation (CRA) shall periodically assess the efficacy and efficiency of ICRMS deployment and usage across counties
12.3.5 Targeted Compliance Audits
Periodic compliance audits shall utilize the standardised Compliance Audit Checklist (Annex 4) to evaluate alignment with functional
requirements, technical standards, data governance, and service-level commitments.
12.4. Key Performance Indicators (KPIs)
The performance of the ICRMS shall be monitored and evaluated using the following minimum Key Performance Indicators (KPIs). These
indicators shall guide service-level agreements (SLAs), compliance audits, and overall system performance assessments.
12.4.1 System Uptime
The system shall maintain a minimum uptime of 99.5% on a monthly basis, excluding scheduled maintenance windows.
12:13 PM THE KENYA GAZETTE 9th September, 2025
6158 6158
12.4.2 Integration Compliance
The system shall comply with all mandatory integration requirements, including seamless interoperability with IFMIS, SCOA, BRS,
IPRS, and other designated national platforms.
12.4.3 Customer Ledger Auto-Reconciliations
All transactions processed by the system shall automatically post to the customer and transaction ledgers, with no manual
interventions required, ensuring reconciliation accuracy and auditability.
12.4.4 User Satisfaction Index
User feedback shall be periodically measured through structured surveys, with a minimum target satisfaction index of 80% across
system usability, responsiveness, and support services.
12.4.5 Security Incidents
The system shall maintain zero tolerance for unresolved critical security incidents, with all reported incidents addressed within defined
SLA timelines, and continuous monitoring for vulnerabilities.
12.4.6 Reporting Capability
The system shall demonstrate the ability to generate all mandatory statutory, financial, audit, and management reports in real-time or
near real-time, in accordance with formats prescribed in these Guidelines.
12.4.7 Transaction Processing Capacity
The system shall process a minimum of 2,000,000 transactions per second (TPS), ensuring scalability to handle peak demand across
all 47 counties without performance degradation
12.5. Compliance Enforcement
12.5.1 Notice and Corrective Action
In the event of material non-compliance with these Standards and Guidelines by a County Government or the National Treasury:
12.5.2 The Commission, in co-ordination with the National Treasury and Council of Governors shall issue a formal Compliance Notice,
specifying the breach and a mandatory 90-day remediation period.
12.5.3 The entity in breach shall submit a written Remedial Plan, monitored by CRA, to restore compliance within the allotted timeframe.
12.5.4 Escalation for Continued Non-Compliance
If the breach persists or is recurrent:
12.5.4.1 CRA shall escalate the matter to the Intergovernmental Budget and Economic Council (IBEC) as per procedures in the
Intergovernmental Relations Act.
12.5.4.2 Access to support or updates may be temporarily suspended for non-compliant counties, subject to agreed terms.
12.5.5 Dispute Resolution
12.5.5.1 Dispute resolutions shall be conducted as per the intergovernmental relations Act
12.5.6 Documentation and Transparency
12.5.6.1 All compliance actions, resolutions, and outcomes shall be documented and shared with relevant oversight bodies.
12.5.6.2 CRA may publish anonymized compliance summaries to promote transparency and peer accountability
13. Review, Amendment and Effective Date
13.1. These Standards and Guidelines shall be reviewed every three (3) years by the Commission on Revenue Allocation in consultation with
the relevant stakeholders.
13.2. An early review may be triggered by:
1. Major legal or constitutional changes;
2. Technological advancements;
3. Persistent non-compliance or systemic failures.
13.3. The review process shall include:
1. Stakeholder consultations;
2. Technical validation;
13.4. Revised guidelines shall be gazetted as a statutory notice.
13.5. These Standards and Guidelines takes effect immediately upon gazettement.
14. Annexes
Note: All annexes are binding and form an integral part of these Standards and Guidelines .
GIVEN under the Hand of the Chairperson, Commission on Revenue Allocation, this 8th day of September, 2025.
CPA MARY WANYONYI CHEBUKATI,
Chairperson, Commission on Revenue Allocation.
9th September, 2025 THE KENYA GAZETTE
ANNEXES
INTEGRATED COUNTY REVENUE MANAGEMENT SYSTEM (ICRMS) STANDARDS AND GUIDELINES
Annex No. Title
Annex 1: Minimum Functional Requirements Checklist for the ICRMS
Annex 2: Minimum Technical Requirements Checklist for the ICRMS
Annex 3: Procurement and Compliance Evaluation Matrix
Annex 4: Compliance Audit Tool for the ICRMS
Annex 5: Risk Management Framework for the ICRMS
Annex 6: Sample Service Level Agreement (SLA) for the ICRMS
Annex 7: Stakeholder Consultation Record
Annex 8: Data Migration and Cutover Plan
Annex 9: Change Management and Training Plan
Annex 10: Standard Reports Catalogue
Annex 11: Data and Records Governance
Annex 12: Glossary and Acronyms
(i) Annex 1: Minimum Functional Requirements Checklist for the ICRMS
Section 1: Purpose
This annex specifies the minimum functional requirements for the Integrated County Revenue Management System (ICRMS) to ensure that
deployments are compliant, interoperable, and support the complete revenue lifecycle from source registration to reporting and audit.
Section 2: Scope
These requirements apply to all ICRMS deployments, whether county-specific or part of a national centralized system, and must be adhered to in
procurement, development, implementation, commissioning, and operation.
Functional Requirements
Ref No. Functional Area Requirement Description Priority Test Procedure Evidence Required
FR.1 Registry and
Identity Management
Maintain a central register of
taxpayers/ratepayers/businesses with National ID,
KRA PIN, and BRS Number; support many-to-
many relationships (entity↔revenue streams,
parcels, accounts) and scale to ≥1M records.
M Create/update/search sample
records; merge duplicates;
run API query.
Screenshots; search
logs; API spec.
FR.2 Registry and
Identity Management
Link a single entity to multiple revenue streams
(land rates, SBP, parking, market fees, etc.).
M Link ≥3 streams to one
taxpayer; generate
consolidated account.
Consolidated account
report.
FR.3 Registry and
Identity Management
Store and retrieve supporting documents (ID,
licences, plans) against each profile.
M Upload and retrieve
documents for sample
record.
Document logs.
FR.4 Registry and
Identity Management
Detect and flag duplicate accounts for review;
merge with audit trail.
M Create duplicate entries;
system flags; merge.
Duplicate detection
report.
FR.5 Registry and
Identity Management
Maintain full history of all interactions
(applications, inspections, bills, payments,
licences).
M Open sample record; review
history.
History log export.
FR.6 Registry and
Identity Management
Maintain individual customer/ratepayer ledgers
showing all transactions, running balances, and
aging, in addition to system journals.
M View sample ledger; verify
accuracy against
transactions.
Ledger report.
FR.7 Registry and
Identity Management
Maintain full transaction ledgers for each revenue
stream with SCOA coding.
M Generate stream ledger
report; verify SCOA
mapping.
Transaction ledger
export.
FR.8 Registry and
Identity Management
Search registry by multiple criteria (name, ID,
PIN, location, status).
M Run multi-criteria search;
verify results.
Search results
screenshot.
FR.9 Registry and
Identity Management
Bulk import/export registry data (CSV/Excel)
with validation.
M Import test file; review
validation logs.
Import/export logs.
FR.10 Revenue Source and
Tariff Management
Configure revenue streams as per Finance Act,
Tariff and Pricing Policy, or Schedules.
M Load tariff schedule; check
application.
Tariff configuration
logs.
FR.11 Revenue Source and
Tariff Management
Add new revenue streams without vendor
intervention; set tariffs, SCOA codes, and
parameters.
M Create a new stream;
generate bill.
Stream creation log.
12:13 PM THE KENYA GAZETTE 9th September, 2025
6160 6160
Ref No. Functional Area Requirement Description Priority Test Procedure Evidence Required
FR.12 Revenue Source and
Tariff Management
Rule-based engine to compute fees, penalties,
interest; maintain version history with
effective/expiry dates, reason codes, and audit
trail of changes.
M Configure 10+ tariffs;
simulate bulk changes;
show version history.
Config guide; change
log.
FR.13 Revenue Source and
Tariff Management
Upload multiple tariffs in bulk from Finance Bill
or Tariff Policy, including zone-based rates.
M Import bulk tariff file; verify
in system.
Import log; tariff list.
FR.14 Revenue Source and
Tariff Management
Map all revenue items to Standard Chart of
Accounts codes; enforce mapping before billing.
M Attempt unmapped billing;
system blocks.
SCOA mapping
report.
FR.15 Revenue Source and
Tariff Management
Maintain register of county-owned assets tied to
revenue streams (markets, buildings, equipment).
M Add asset; link to revenue
stream.
Asset register export.
FR.16 Revenue Source and
Tariff Management
Geo-reference revenue sources for spatial
planning and enforcement; support
shapefiles/GeoJSON import, layer-based queries,
and spatial analytics.
S Map sample sources; view on
GIS layer.
GIS map screenshot;
integration doc.
FR.17 Revenue Source and
Tariff Management
Configure billing frequencies per stream (daily,
monthly, annually, seasonal).
M Change billing cycle; generate
bills.
Billing config logs.
FR.18 Revenue Source and
Tariff Management
Apply penalties/interest automatically; approve
waivers/exemptions with thresholds, reason
codes, and document attachments; enforce
maker-checker.
M Process penalty and waiver;
check audit trail.
Waiver workflow log.
FR.19 Revenue Source and
Tariff Management
Categorize streams (by ward, market, category)
and set revenue targets.
S Assign targets; run
performance report.
Target allocation file.
FR.20 Applications,
Billing, Payments,
Receipting
End-to-end workflow from application →
inspection → billing → payment →
licence/permit.
M Apply for service; follow to
licence issue.
Workflow
screenshots.
FR.21 Applications,
Billing, Payments,
Receipting
Customizable checklists for each service; enforce
before billing.
M Configure checklist; submit
application.
Checklist config
export.
FR.22 Applications,
Billing, Payments,
Receipting
Auto-flag accounts for renewal; send reminders
via SMS/email/USSD.
M Simulate renewal period; send
reminder.
Reminder logs.
FR.23 Applications,
Billing, Payments,
Receipting
Accept payments via mobile money, EFT, cards,
USSD, agency banking; support offline queueing
with sync; handle reversals/chargebacks.
M Process payments via each
channel; simulate offline sync.
Payment logs.
FR.24 Applications,
Billing, Payments,
Receipting
Issue receipts instantly; send confirmation to
payer.
M Complete payment; check
confirmation.
Receipt copy;
SMS/email log.
FR.25 Applications,
Billing, Payments,
Receipting
Match daily collections with bank/wallet
statements (T+1); maintain exception worklists
and closure SLAs (≤1% unresolved after T+3).
M Import bank file; auto-match;
review exceptions.
Reconciliation report.
FR.26 Applications,
Billing, Payments,
Receipting
Process refunds and reversals with approval
workflow and audit trail.
M Initiate reversal; check logs. Reversal log.
FR.27 Applications,
Billing, Payments,
Receipting
Support partial payments, overpayments (credit
wallets), and split payments.
S Test each case; verify
balances.
Payment allocation
report.
FR.28 Applications,
Billing, Payments,
Receipting
Generate invoices (PDF + e-bill); unique
payment refs; mass billing; re-billing with
traceability; batch ≥100k invoices in <30 mins.
M Run batch test; verify lineage. Batch report;
runbook.
FR.29 Debt Management
and Enforcement
Generate aging reports (30/60/90/180+ days), by
stream/ward.
M Produce report for sample
data.
Aging report.
FR.30 Debt Management
and Enforcement
Create installment plans; monitor compliance. M Set plan; test missed payment
alert.
Payment plan report.
FR.31 Debt Management
and Enforcement
Automated reminders (SMS/email/app), dunning
workflow with escalation.
M Trigger reminders; check logs. Reminder logs.
FR.32 Debt Management
and Enforcement
Case management; field assignment; GPS/time-
stamped actions; outcome tracking; ≥90% cases
geo-stamped.
S Issue e-ticket; inspect GPS
logs.
Enforcement logs;
field app demo.
FR.33 Debt Management
and Enforcement
Restrict repeat offenders; allow policy-based
exemptions.
S Add/remove from list; verify
block.
Blacklist log.
FR.34 User, Collector and
Agent Management
Register revenue staff; assign roles per
organogram.
M Add staff; assign role. Staff registry export.
9th September, 2025 THE KENYA GAZETTE
Ref No. Functional Area Requirement Description Priority Test Procedure Evidence Required
FR.35 User, Collector and
Agent Management
Assign collectors to sources/targets; monitor
performance.
M Allocate targets; review
report.
Target assignment
log.
FR.36 User, Collector and
Agent Management
Register/manage external collection agents;
assign roles and targets.
S Add agent; set target; check
report.
Agent assignment
log.
FR.37 User, Collector and
Agent Management
Real-time staff/agent performance metrics. S Display live dashboard. Dashboard
screenshot.
FR.38 Self-Service and
Access Channels
Allow taxpayers to access accounts, bills,
payments, receipts, applications, support tickets;
OTP login; WCAG accessibility compliance.
M Log in; complete payment;
verify accessibility.
Portal transaction log;
test scripts.
FR.39 Self-Service and
Access Channels
Enable low-bandwidth access via USSD for key
services.
S Dial USSD; complete task. USSD session log.
FR.40 Self-Service and
Access Channels
Provide officer app (assess, inspect, enforce) and
taxpayer app (pay, view, renew); offline-first with
sync conflict handling.
S Demo apps; test offline
sync.
App demos; device
policy.
FR.41 Self-Service and
Access Channels
Ensure compliance with accessibility standards;
multilingual support (EN/SWA).
S Switch language; view
accessibility tools.
Accessibility settings
log.
FR.42 Configuration, Period
Close and Reporting
Update rates, cycles, penalties without coding
changes; support multi-language and geo
parameters (wards, streams, holidays).
M Change rate; apply in bill. Config change log.
FR.43 Configuration, Period
Close and Reporting
Perform daily ledger posting, reconciliation, and
reporting with system lock; support authorised re-
opens.
M Run EoD; attempt back-
dated entry.
EoD report; lock log.
FR.44 Configuration, Period
Close and Reporting
Period lock, roll forward balances, age debt,
generate monthly reports.
M Run EoM; check
ledgers/reports.
EoM reports.
FR.45 Configuration, Period
Close and Reporting
Close fiscal year, carry forward arrears/balances,
archive year-specific parameters and tariffs.
M Run EoY; verify opening
balances.
EoY close report.
FR.46 Configuration, Period
Close and Reporting
Generate statutory, management, and ad-hoc
reports (≥30 standard reports); ad-hoc builder;
export CSV/XLSX/JSON.
M Run sample reports; export. Report catalogue;
samples.
FR.47 Configuration, Period
Close and Reporting
Produce SCOA-coded exports compatible with
IFMIS.
M Export sample; import to
IFMIS test.
Export file; IFMIS
log.
FR.48 Configuration, Period
Close and Reporting
Generate maps and spatial reports for mapped
revenue sources.
S Run GIS query. GIS map screenshot.
FR.49 Configuration, Period
Close and Reporting
Produce logs of all sensitive actions/configuration
changes; tamper-evident hash; role-based
retrieval; retain ≥7 years.
M Generate audit report; verify
hash.
Audit log export.
FR.50 Configuration, Period
Close and Reporting
Provide REST/JSON APIs (OAuth2/OpenID),
webhooks, API throttling and versioning; API
uptime ≥99%, p95 latency ≤2s.
M Review API docs; run test
calls.
API documentation;
monitoring
screenshots.
(ii) Annex 2: Minimum Technical Requirements Checklist for the ICRMS
Section 1: Purpose
This annex outlines the minimum technical specifications and compliance requirements for the ICRMS to ensure security, scalability,
interoperability, and operational performance across county governments.
Section 2: Scope
Applies to all ICRMS implementations, whether developed in-house, procured commercially, or provided as part of a centralized national
platform, and must be adhered to during procurement, implementation, commissioning, and operation.
Technical Requirements Table
Ref No. Technical Area Requirement Description Priority Test Procedure Evidence Required
TR.1 System Architecture
and Hosting
Adopt modular/service-oriented or microservices
architecture; include stateless APIs and message
queue for asynchronous jobs; support independent
upgrades; scale to ≥200% projected volumes over 5
years; define auto-scaling thresholds.
M Review architecture
diagrams; simulate load
test.
Architecture doc;
load test results.
TR.2 System Architecture
and Hosting
Support on-premises, GoK-approved data center,
compliant local cloud, or hybrid; conduct security
and Total Cost of Ownership (TCO) assessment for
chosen deployment.
M Inspect hosting setup;
review assessment.
Hosting certificate;
TCO/security report.
TR.3 System Architecture
and Hosting
For centralized deployments: provide logical data
segregation, per-county encryption keys, and per-
M Inspect multi-tenancy
config; run segregation
Multi-tenancy config
report.
12:13 PM THE KENYA GAZETTE 9th September, 2025
6162 6162
Ref No. Technical Area Requirement Description Priority Test Procedure Evidence Required
tenant admin roles. tests.
TR.4 System Architecture
and Hosting
Achieve ≥99.5% uptime per quarter; include failover
mechanisms and load balancing.
M Review monitoring
logs; conduct failover
test.
Uptime report;
failover log.
TR.5 System Architecture
and Hosting
Provide separate dev, test, training, and production
environments; enable controlled promotion of
configurations.
M Inspect environment
structure.
Environment config
report.
TR.6 Infrastructure Use enterprise-grade redundant infrastructure;
NVMe/SAN storage for DB; TLS termination at
load balancer.
M Inspect hardware specs;
test TLS.
Infra inventory; TLS
config log.
TR.7 Infrastructure On-premises setups to have UPS, generator backup,
controlled access, CCTV, and environmental
monitoring.
M Inspect facilities; review
monitoring.
Facility inspection
report.
TR.8 Infrastructure Automated, encrypted backups (daily full + hourly
incrementals); quarterly restore tests.
M Review backup config;
perform restore.
Backup log; restore
report.
TR.9 Software Stack and
Development
Practices
Use supported Long-Term Support (LTS) operating
systems; relational database with ACID compliance;
implement read replicas for analytics workloads.
M Review OS/DB
versions; verify replica
configuration.
OS/DB version list;
replica status report.
TR.10 Software Stack and
Development
Practices
Implement CI/CD pipeline; perform SAST(Static
Application Security Testing) and DAST(Dynamic
Application Security Testing); maintain artifact
repository; adopt Infrastructure as Code (IaC).
M Review DevSecOps
configuration; check
automated test reports.
CI/CD configuration
docs; SAST/DAST
reports.
TR.11 Software Stack and
Development
Practices
Maintain centralized logging (ELK or equivalent),
performance metrics, and APM traces; define and
configure alert thresholds.
M Inspect logging setup;
trigger alerts to validate
thresholds.
Logging
configuration; sample
alert records.
TR.12 Software Stack and
Development
Practices
Ensure compliance with Government Enterprise
Architecture (GEA), Government Interoperability
Framework (GIF), and OWASP ASVS(Open Web
Application Security Project / Application Security
Verification Standard.)
M Review compliance
checklist and test
results.
Compliance
certification or signed
checklist.
TR.13 Integration and
Interoperability
Provide secure APIs/files for two-way integration
with IFMIS; enforce Standard Chart of Accounts
(SCOA) mapping on all transactions.
M Generate SCOA-coded
export; perform IFMIS
import in test
environment.
SCOA export file;
IFMIS import log;
mapping validation.
TR.14 Integration and
Interoperability
Integrate with IPRS, BRS, NTSA, HMIS, and GIS
platforms; use REST/JSON APIs with
OAuth2/OpenID; apply mutual TLS (mTLS) for
sensitive transactions.
M Conduct API test calls;
inspect secure
connection
configurations.
API test logs; API
documentation;
connection configs.
TR.15 Integration and
Interoperability
Support integration with bank host-to-host, ISO
20022/8583 messaging where applicable, and
mobile money APIs; ensure automated
reconciliation.
M Process test transactions
across all financial rails;
validate reconciliation
outputs.
Payment logs;
reconciliation reports;
integration
certificates.
TR.16 Integration and
Interoperability
Provide documented, version-controlled APIs;
enforce versioning (e.g., /v1); apply rate limits;
ensure ≥99% API uptime and p95 latency ≤2s.
M Inspect API
documentation; run
uptime and latency tests.
API monitoring
reports; API portal
screenshots.
TR.17 Integration and
Interoperability
Provide sandbox credentials, Swagger/OpenAPI
docs, sample payloads, error catalog, and integration
test cases for all mandatory integrations.
M Review artefact
package; run sample
integration tests.
Artefact inventory;
integration test logs.
TR.18 Security and Privacy Implement RBAC and ABAC to enforce least-
privilege, segregation of duties, and maker-checker
controls.
M Review role/attribute
matrix; simulate access;
verify maker-checker.
Role/attribute config;
access logs.
TR.19 Security and Privacy Require MFA for privileged/admin accounts;
support SSO(Single Sign-On) using SAML
(Security Assertion Markup Language) and OIDC
(OpenID Connect)
M Attempt admin login to
verify MFA; test SSO
login.
MFA screenshots;
SSO setup logs.
TR.20 Security and Privacy Encrypt data in transit (TLS 1.2+) and at rest (AES-
256); rotate keys regularly.
M Inspect encryption
configuration; review
key rotation logs.
Security config; key
rotation schedule.
TR.21 Security and Privacy Conduct quarterly vulnerability scans and annual
penetration tests; remediate critical vulnerabilities
≤30 days; high ≤60 days.
M Review scan results and
pen test reports; confirm
remediation timelines.
Scan reports; pen
test; remediation
logs.
TR.22 Security and Privacy Conduct DPIA(Data Protection Impact Assessment)
for all modules; implement consent/notice
M Inspect DPIA docs; test
consent capture in
DPIA reports;
consent logs.
9th September, 2025 THE KENYA GAZETTE
Ref No. Technical Area Requirement Description Priority Test Procedure Evidence Required
mechanisms; embed privacy-by-design. workflows.
TR.23 Security and Privacy Maintain registry of authorized devices; enforce
session timeouts and concurrent login limits; provide
remote wipe.
M Simulate lost device and
perform remote wipe;
review session logs.
Device registry;
remote wipe report.
TR.24 Security and Privacy Enable anti-tamper protections; log and alert on
suspicious activities/config changes.
M Attempt unauthorized
alteration; review
tamper logs.
Tamper protection
config; tamper log
export.
TR.25 Performance and
Resilience
Process at least 1,200 transactions per second (TPS)
across all channels during peak.
S Perform load testing
with simulated peak
volumes.
Load test results;
benchmark report.
TR.26 Performance and
Resilience
Complete key transactions (billing, payment posting,
receipting) within ≤2 seconds under normal load.
M Time transactions
during testing; verify
thresholds.
Transaction timing
logs.
TR.27 Performance and
Resilience
Provide offline operation for core functions (billing,
receipting, enforcement) with secure store-and-
forward synchronization.
M Simulate offline activity
and sync; confirm data
integrity.
Offline transaction
logs; sync report.
TR.28 Performance and
Resilience
Make GIS layers accessible offline on enforcement
devices; synchronize updates when online.
S Load and navigate
offline GIS map; sync
updates.
Offline GIS logs;
sync confirmation.
TR.29 E-Enforcement and
Field Operations
Integrate with mobile/POS devices for issuing
enforcement notices, tickets, penalties with
GPS/time-stamping.
M Issue test e-ticket via
device; verify GPS/time
stamp.
Enforcement case
log; GPS data report.
TR.30 E-Enforcement and
Field Operations
Capture photographic, video, and document
evidence linked to case records.
M Upload test evidence to
a case file; confirm
linkage.
Case file with media.
TR.31 E-Enforcement and
Field Operations
Provide configurable workflows for enforcement
actions, assignment, escalation, and SLA tracking.
M Execute sample
workflow; verify SLA
alerts.
Workflow config;
SLA log.
TR.32 E-Enforcement and
Field Operations
Enable export/API integration with external judicial
systems for escalation to court or recovery agencies.
S Export sample
enforcement case; verify
data receipt.
Export log; receiving
system confirmation.
TR.33 Disaster Recovery
and Business
Continuity
Maintain in-country DR site with Recovery Point
Objective(RPO) ≤15 minutes and Recovery Time
Objective (RTO)≤2 hours.
M Review DR
architecture; conduct
failover test.
DR documentation;
failover logs.
TR.34 Disaster Recovery
and Business
Continuity
Conduct bi-annual DR drills; document
failover/fallback with success criteria.
M Execute DR drill;
review results.
DR drill report;
recovery metrics.
TR.35 Disaster Recovery
and Business
Continuity
Maintain BCP with manual fallback procedures,
communication tree, and stakeholder notification
templates.
M Review BCP; simulate
communication process.
Approved BCP;
simulation report.
TR.36 Disaster Recovery
and Business
Continuity
Automated daily full backups and hourly
incrementals; quarterly restore tests.
M Inspect backup logs;
perform test restoration.
Backup logs; restore
verification.
TR.37 Disaster Recovery
and Business
Continuity
Automatic failover for critical services; quarterly
failover tests.
M Simulate outage and
trigger failover; measure
downtime.
Failover test results;
monitoring logs.
TR.38 Reporting and
Analytics
Reporting engine with ≥30 standard reports and ad-
hoc builder; export to PDF, CSV, XLSX, JSON.
M Generate sample
reports; test exports.
Report catalogue;
files.
TR.39 Reporting and
Analytics
Configurable real-time dashboards showing revenue
performance, targets, arrears, trends; data matches
reports.
M Compare dashboard
metrics to reports.
Dashboard
screenshots;
comparison logs.
TR.40 Reporting and
Analytics
Forecasting tools to project revenue trends and
arrears recovery based on historical data.
S Run forecast analysis on
test data; verify model
accuracy.
Forecast report;
analytics
configuration.
TR.41 Configuration and
Extensibility
Allow rates, penalties, waivers, workflows, and
forms via parameters; audit configuration changes.
M Update parameters;
verify change logs.
Config change log;
settings.
TR.42 Configuration and
Extensibility
Support English and Kiswahili interfaces and
multiple currency formats.
S Switch language; test
currency display.
Language/currency
settings logs.
TR.43 Configuration and
Extensibility
Add new revenue streams with tariffs, SCOA codes,
workflows, and reporting templates without vendor
intervention.
M Add new stream in test;
verify.
Stream creation log;
billing test.
12:13 PM THE KENYA GAZETTE 9th September, 2025
6164 6164
Ref No. Technical Area Requirement Description Priority Test Procedure Evidence Required
TR.44 Data Management Implement validation rules to prevent
incomplete/invalid data; enforce mandatory fields.
M Attempt to save invalid
data; review errors.
Validation error log;
config.
TR.45 Data Management Provide migration tools including mapping,
cleansing, trial loads, and reconciliation.
M Perform trial migration;
reconcile data.
Migration plan;
reconciliation report.
TR.46 Data Management Archive inactive records per retention; purge only
after multi-level authorisation and audit logging.
M Archive and purge
samples in test.
Archive/purge logs;
authorizations.
TR.47 Documentation and
Handover
Deliver system design dossier, data model and
dictionary, API docs, configuration runbooks, SOPs,
admin/user manuals, test reports, training materials,
and an escrow package (source code, build scripts).
M Review documentation
set for completeness and
compliance.
Documentation
inventory; escrow
confirmation.
(iii) Annex 3: Procurement and Compliance Evaluation Matrix
Section 1: Purpose
To provide a standard evaluation matrix for uniform, transparent, and objective assessment of ICRMS proposals during procurement,
commissioning, and compliance reviews.
Section 2: Scope
Applies to Procurement Evaluation Committees, Commissioning Teams, and Oversight/Audit Teams.
Procurement and Compliance Evaluation Matrix Table
Evaluation Area Criteria Linked FR/TR Weight (%) Scoring Method
Preliminary
Evaluation
Submission of mandatory documents (bid
security, tax compliance, signed forms, eligibility
requirements).
N/A Pass/Fail All must be provided to proceed.
Functional
Requirements
Compliance
Meets all Mandatory FR items in Annex 1. FR.1–FR.50 25% Pass/Fail for mandatory; optional
scored proportionally (0–1 per
item).
Functional
Requirements
Compliance
Meets Optional/Should Have FR items. FR.16, FR.19, FR.27,
FR.30, FR.31, FR.33,
FR.35, FR.39, FR.40,
FR.42, FR.48
5% Weighted score by optional items
implemented.
Technical
Requirements
Compliance
Meets all Mandatory TR items in Annex 2. TR.1–TR.47
(Mandatory)
25% Pass/Fail for mandatory; points for
exceeding minimum specs.
Technical
Requirements
Compliance
Meets Optional/Should Have TR items. TR.25, TR.28, TR.32,
TR.40, TR.42
5% Weighted score by optional items
implemented.
Integration and
Interoperability
Successful integration with IFMIS, SCOA, IPRS,
BRS, GIS, HMIS, NTSA, payment channels.
FR.14, FR.47,
TR.13–TR.17
5% Live/sandbox test evidence; error-
free transactions.
Security and
Compliance
Meets security, privacy, and data protection
requirements; passes vulnerability and
penetration testing.
TR.18–TR.24,
TR.20–TR.22
5% Review audit logs, security reports,
test results.
Performance and
Resilience
Meets throughput, uptime, offline capability,
DR/BCP benchmarks.
TR.1, TR.4, TR.25–
TR.28, TR.33–TR.37
5% Load tests, DR drill reports, offline
simulation.
Implementation
Approach and Plan
Methodology, migration plan, training, change
management, post-go-live support.
TR.45, TR.47,
FR.42–FR.45
10% Review project plan, timelines,
resource allocation.
Vendor Experience
and Capacity
ICRMS deployments in ≥3 counties; references;
local technical team.
N/A 5% Reference checks, team CVs.
Total Cost of
Ownership (TCO)
5-year TCO including licences, hosting,
maintenance, upgrades, training.
N/A 5% Evaluate detailed cost breakdown.
Risk and Exit
Strategy
Data portability, escrow, exit/migration plan,
SLA commitments.
TR.47, FR.11, FR.49 5% Review SLA, escrow agreement,
exit plan.
(iv) Annex 4: Compliance Audit Tool for the ICRMS
Section 1: Purpose
Structured compliance checklist for commissioning, post-implementation, annual audits, and spot checks.
Section 2: Scope
Applicable to all County Governments and National Implementing Agencies operating the ICRMS; used by Internal Audit, CRA, National
Treasury, Auditor-General, and QA consultants.
9th September, 2025 THE KENYA GAZETTE
Compliance Audit Checklist Table
Ref No. Audit Area Compliance Standard Linked
FR/TR Test Procedure Evidence Required Compliance
Rating*
Remediation
Actions
A4.1 Registry and
Identity
Management
Central registry linked to
National ID, KRA PIN, BRS;
supports many-to-many
relationships; ≥1M record
capacity.
FR.1 Inspect registry;
search and link
records; run API
query.
Screenshots; API
logs.
A4.2 Registry and
Identity
Management
Customer and transaction
ledgers with SCOA coding in
place.
FR.6, FR.7 View ledgers; verify
SCOA mapping.
Ledger reports;
SCOA export.
A4.3 Revenue Source and
Tariff Management
All streams configured per
Finance Act/Tariff Policy;
version history maintained.
FR.10,
FR.12
Compare system
tariffs to legal
schedule; review
change logs.
Tariff config logs.
A4.4 Revenue Source and
Tariff Management
SCOA mapping enforced for
all billable items.
FR.14,
TR.13
Attempt unmapped
billing; confirm
block.
SCOA mapping
report.
A4.5 Applications,
Billing, Payments
Batch billing capacity (≥100k
in <30 mins) met; re-billing
maintains lineage.
FR.28 Run batch; review
logs.
Batch run logs.
A4.6 Applications,
Billing, Payments
All mandatory payment
channels active; offline queue
and sync functional; reversals
tracked.
FR.23,
TR.27
Process payments;
simulate offline
mode.
Payment logs.
A4.7 Applications,
Billing, Payments
Receipts issued instantly;
confirmation sent to payer.
FR.24 Complete payment;
verify receipt/SMS.
Receipt copy;
SMS log.
A4.8 Applications,
Billing, Payments
Daily T+1 reconciliation; ≤1%
unresolved after T+3.
FR.25 Inspect recon reports;
check closure rates.
Reconciliation
logs.
A4.9 Debt Management
and Enforcement
Aging reports generated;
dunning workflow active.
FR.29,
FR.31
Run arrears report;
check reminders.
Aging report;
reminder log.
A4.10 Debt Management
and Enforcement
GPS/time-stamped
enforcement actions logged;
≥90% geo-stamped.
FR.32,
TR.29
Issue e-ticket; verify
GPS logs.
Enforcement logs.
A4.11 Debt Management
and Enforcement
Evidence capture linked to
case files.
TR.30 Upload sample
evidence to case;
confirm.
Case file with
media.
A4.12 Security and
Privacy
Roles and attributes correctly
configured; maker-checker in
place.
TR.18 Review role matrix;
simulate access.
Role config report.
A4.13 Security and
Privacy
MFA enforced for privileged
accounts; TLS 1.2+/AES-256
encryption active.
TR.19,
TR.20
Test MFA; inspect
encryption setup.
MFA logs;
encryption config.
A4.14 Security and
Privacy
Quarterly scans; annual pen
test; critical vulns fixed ≤30
days.
TR.21 Review reports;
confirm remediation
dates.
Security reports.
A4.15 Security and
Privacy
DPIAs completed; consent
capture mechanisms
functional.
TR.22 Inspect DPIA; test
consent prompts.
DPIA docs;
consent logs.
A4.16 Performance and
Resilience
≥1,200 TPS at peak; ≤2s
transaction response time.
TR.25,
TR.26
Run performance
test; measure
response.
Load test reports.
A4.17 Performance and
Resilience
Offline billing, receipting,
enforcement operational; sync
works.
TR.27 Simulate offline ops;
sync data.
Offline logs.
A4.18 Disaster Recovery
and BCP
DR site operational; RPO
≤15m; RTO ≤2h; 2 drills/year.
TR.33,
TR.34
Inspect DR site;
review drill reports.
DR drill report.
A4.19 Disaster Recovery
and BCP
Daily full + hourly incremental
backups; quarterly restores
successful.
TR.36 Check backup jobs;
perform restore.
Backup and
restore logs.
A4.20 Disaster Recovery
and BCP
Automatic failover tested
quarterly; meets uptime SLA.
TR.37 Simulate outage;
verify failover.
Failover logs.
A4.21 Reporting and ≥30 standard reports; ad-hoc
builder; all export formats
FR.46, Generate reports; test Report catalogue.
12:13 PM THE KENYA GAZETTE 9th September, 2025
6166 6166
Ref No. Audit Area Compliance Standard Linked
FR/TR Test Procedure Evidence Required Compliance
Rating*
Remediation
Actions
Analytics functional. TR.38 exports.
A4.22 Reporting and
Analytics
Real-time dashboards match
report data.
TR.39 Compare dashboard
vs. reports.
Dashboard
screenshot;
comparison log.
A4.23 Configuration and
Extensibility
Rates, penalties, waivers,
workflows updated via
parameters; changes logged.
TR.41 Update config;
review change logs.
Config logs.
4.24 Configuration and
Extensibility
New streams added without
vendor; fully functional.
TR.43 Create new stream;
test billing and
reporting.
Stream creation
log.
A4.25 Documentation and
Handover
All required documentation
and escrow package delivered.
TR.47 Inspect
documentation
inventory.
Documentation
list; escrow
confirmation.
(v) Annex 5: Risk Management Framework for the ICRMS
Section 1: Purpose
Establish a standard approach for identifying, assessing, mitigating, and monitoring risks during the lifecycle of the ICRMS.
Section 2: Scope
Applies to county ICRMS operations, national central deployments, and third-party service providers.
ICRMS Risk Register and Management Matrix
Risk ID
Risk Category
Risk
Description
Potential Impact
Likelihood (L/M/H)
Impact Severity (L/M/H)
Risk Owner
Mitigation Measu
res
Contingency / Response Plan
Key Risk
Indicator (KRI)
R1 Technical –
Infrastructure
System downtime
due to hardware
failure or hosting
outage.
Revenue loss;
public
dissatisfaction.
M H ICT Unit / Vendor Redundant
infrastructure; HA
design; monitoring.
Activate DR
site; failover
within RTO
≤2h.
Uptime %;
MTTR.
R2 Technical –
Application
Bugs/defects disrupt
billing, payments,
reconciliation.
Delayed
collections;
inaccurate data.
M H ICT Unit / Vendor QA/UAT before
updates; DevSecOps
pipeline with
rollback.
Revert to last
stable
version;
patch within
SLA.
Defect
density; time
to patch.
R3 Security Data breach or
unauthorised access
to taxpayer data.
Legal penalties;
reputational
damage.
M H ICT/Security
Officer
Role-based access
control (RBAC) and
attribute-based
access control
(ABAC); MFA;
encryption; security
audits.
Incident
response;
notify
regulators
and affected
parties.
Security
incidents;
failed logins.
R4 Integration Failure of integration
with IFMIS, SCOA,
payment channels, or
registries.
Delayed
reporting;
revenue posting
errors.
M H ICT/Finance/Ven
dor
Integration testing;
API monitoring;
SLAs.
Manual
upload;
escalate to
partner.
API success
rate; recon
variance.
R5 Data Management Loss/corruption of
financial records.
Loss of
accountability;
compliance
breach.
L H ICT/Vendor Encrypted backups;
quarterly restore
tests.
Restore from
backup;
forensic
analysis.
Backup
success rate;
restore
success.
R6 Operational –
Collection
Fraudulent
collection/diversion
by staff/agents.
Revenue
leakage; legal
action.
M H Revenue Dept /
Internal Audit
Cashless collections;
recon controls;
monitoring.
Suspend
accounts;
initiate audit.
Collector
performance
variance.
R7 Operational –
Enforcement
Delay/failure in
enforcement due to
technical/logistical
issues.
Drop in
compliance;
revenue
shortfall.
M M Enforcement/ICT E-enforcement
devices; SLA
monitoring.
Escalate
cases; manual
logs.
Enforcement
completion
rate.
R8 Change
Management
User resistance to
system/process
changes.
Low adoption;
parallel manual
processes.
M M HR/Change Lead Training;
sensitisation; support
channels.
Coaching;
leadership
escalation.
Adoption rate;
helpdesk
tickets.
R9 Regulatory Non-compliance
with Data Protection,
PFM, procurement
laws.
Fines; legal
sanctions; halted
operations.
L H Legal/Compliance Compliance reviews;
legal vetting.
Suspend
risky
processes;
remediate.
Audit findings
count.
9th September, 2025 THE KENYA GAZETTE
R10 Business
Continuity
Disaster (fire, flood,
cyberattack) disrupts
operations.
Extended
downtime; loss
of revenue.
L H ICT/DR Lead DR site; BCP drills;
environmental
controls.
Activate
BCP; failover
to DR.
BCP drill
success;
recovery time.
R11 Vendor
Management
Vendor
insolvency/disputes/
poor performance.
Delays; loss of
support.
M M Procurement/ICT/
Legal
SLAs; escrow for
source; alternate
vendor readiness.
Activate
escrow;
alternate
vendor.
SLA breach
rate.
R12 GIS and Field
Ops
Inaccurate GIS
mapping or field data
capture failures.
Poor targeting;
incomplete asset
register.
M M GIS/ICT GPS audits; offline
GIS maps; training.
Manual
validation;
re-map.
% verified
GIS assets.
(vi) Annex 6: Sample Service Level Agreement (SLA) for the ICRMS
Section 1: Purpose
Defines performance standards, responsibilities, and remedies for the provision, operation, and support of the ICRMS by the Vendor to the
Client.
Section 2: Scope of Services
Hosting and infrastructure (if applicable); application maintenance; integration maintenance; security management; DR/BCP; helpdesk and
incident management; training and documentation updates.
Section 3: Performance Metrics
Service Area Metric Target Linked FR/TR
System Availability Uptime per quarter ≥99.5% TR.4
Incident Response Acknowledge Priority 1 (Critical)
incidents
≤15 minutes TR.18, TR.19
Incident Resolution Restore service (Critical) ≤2 hours workaround; ≤8 hours full
fix
TR.18, TR.19
Reconciliation Accuracy Daily reconciliation completion 100% T+1; ≤1% unresolved after
T+3
FR.25
Integration Availability Success rate for mandatory
integrations
≥99% TR.13–TR.17
Security Compliance Vulnerability remediation Critical ≤30 days; High ≤60 days TR.21
Backup and Restore Quarterly restore test success rate 100% TR.36
DR Drill Success Meet RPO/RTO targets RPO ≤15m; RTO ≤2h TR.33, TR.34
Training Delivery Completion of agreed training plan 100% attendance and evaluation TR.47
Documentation Updates Updated within 5 working days after change TR.47
Section 4: Priority Levels and Resolution Targets
Priority Definition Response Time Resolution Target
P1 – Critical Complete outage; core revenue
functions unavailable.
≤15 min Workaround ≤2 hrs; Full fix ≤8 hrs
P2 – High Major function degraded;
workaround available.
≤30 min Full fix ≤24 hrs
P3 – Medium Minor function affected; low
business impact.
≤2 hrs Full fix ≤5 days
P4 – Low Cosmetic/UI issue; no business
impact.
≤4 hrs Fix in next planned release
Section 5: Reporting and Review
Monthly service performance reports; quarterly review meetings for SLA performance and continuous improvement.
Section 6: Penalties and Service Credits
Breach Penalty / Service Credit
Uptime below 99.5% 5% of monthly service fee per 0.5% shortfall
Missed Critical issue resolution time 10% of monthly service fee per incident
Missed DR RPO/RTO targets 15% of monthly service fee per failed test
Failure to remediate critical vulnerability in time 10% of monthly service fee per breach
12:13 PM THE KENYA GAZETTE 9th September, 2025
6168 6168
Cumulative penalties in a quarter shall not exceed 25% of the quarterly service fee. Persistent non-compliance may trigger contract termination.
Section 7: Escalation Path
1. Service Desk / Helpdesk Officer
2. Vendor Support Manager
3. Vendor CTO / Senior Management
4. Client ICRMS Steering Committee
Section 8: Change Management
All system changes must be approved by the Client and tested in a staging environment before production deployment.
Section 9: Termination and Exit Management
Upon termination, Vendor shall provide latest system backup in open format, updated documentation, transfer of source code/configurations (as
per contract), and knowledge transfer to Client or replacement vendor.
(vii) Annex 7: Stakeholder Consultation Record
Section 1: Purpose
This annex documents the stakeholder engagement process undertaken in the formulation of the Integrated County Revenue Management System
(ICRMS) Standards and Guidelines, in compliance with Article 10 and Article 232 of the Constitution of Kenya and applicable public participation
laws.
Section 2: Scope
The consultation record covers identification of relevant stakeholders, engagement methods used, key issues raised, and how they were addressed
in the final Guidelines.
Section 3: Stakeholder Groups Consulted
1. National Government Agencies: The National Treasury and Economic Planning; Ministry of ICT and Digital Economy; Ministry of ICT;
Office of the Controller of Budget; Office of the Auditor-General; Commission on Revenue Allocation
2. County Governments: County Executive Committees for Finance and ICT; County Treasuries; County Assemblies’ Finance Committees;
County Revenue Boards/Directorates
3. Intergovernmental Bodies: Council of Governors (CoG); Intergovernmental Budget and Economic Council (IBEC)
4. Development Partners and Civil Society: World Bank; UNDP; GIZ; USAID; civil society organisations advocating for transparency and
good governance
5. Private Sector: ICRMS solution providers and integrators; banking and payment service providers; telecommunications companies
6. General Public: Taxpayers; business associations; resident associations; traders
Section 4: Consultation Record Table
Date Stakeholder Group Organisation /
Representative
Mode of
Engagement Key Issues Raised How Addressed in
Final Guidelines
Evidence /
Reference
Section 5: Supporting Evidence Checklist
[ ] Stakeholders notices and invitations issued
[ ] Draft guidelines circulated for comment
[ ] Attendance registers for all meetings
[ ] Minutes and recordings of consultations
[ ] Written submissions from stakeholders
[ ] Feedback matrix linking comments to guideline changes
(viii) Annex 8: Data Migration and Cutover Plan
Section 1: Purpose
This annex provides a structured framework to ensure safe, accurate, and efficient migration of data from legacy revenue management systems
and/or manual records into the ICRMS, with minimal disruption to service delivery and no loss of data integrity.
9th September, 2025 THE KENYA GAZETTE
Section 2: Scope
Applies to all County Governments and National Implementing Agencies deploying ICRMS, including migration from legacy systems (e.g.,
LAIFOMS and earlier RMS), transition from manual registers, and consolidation of multiple systems into ICRMS.
Section 3: Migration Principles
1. Accuracy: Migrated data must match verified source data exactly.
2. Completeness: All relevant historical and current records must be migrated.
3. Integrity: Relationships between records (e.g., customer-ledger-transactions) must be preserved.
4. Compliance: Data must comply with SCOA coding, Data Protection Act, and statutory retention rules.
5. Auditability: Every migration step must be logged and documented.
6. Minimal Downtime: Cutover must be planned to avoid prolonged service interruptions.
Section 4: Migration Phases and Activities
Phase Activity Description Linked FR/TR Deliverable
Pre-Migration Assessment Data Inventory Identify all existing data sources and
repositories.
TR.45 Data inventory report
Pre-Migration Assessment Data Mapping Map each data element from source to
ICRMS target field, ensuring SCOA
mapping.
FR.14; TR.13 Data mapping matrix
Pre-Migration Assessment Data Cleansing Remove duplicates, fix inconsistencies,
complete missing data.
FR.4; TR.44 Cleansed dataset
Pre-Migration Assessment Migration Tool
Setup
Configure vendor-supplied migration utilities
and scripts.
TR.45 Tool setup log
Pre-Migration Assessment Migration Plan
Approval
Secure sign-off for migration scope,
schedule, and responsibilities.
TR.47 Approved migration plan
Trial Migration Trial Load Perform migration in a test/staging
environment.
TR.45 Trial migration logs
Trial Migration Reconciliation Compare trial migrated data to source
records; verify ledgers and balances.
FR.6; FR.7 Reconciliation report
Trial Migration User Verification Departmental review and sign-off of trial
data.
FR.1–FR.3 User sign-off forms
Cutover Preparation Freeze Changes Halt non-critical changes to source data
during migration window.
TR.5 Change freeze notice
Cutover Preparation Final Backup Take full backup of source systems pre-
migration.
TR.36 Backup confirmation log
Cutover Preparation Communication Notify stakeholders of cutover date,
downtime, and contingency plan.
TR.35 Communication plan
Final Migration and Go-
Live
Final Load Load final dataset into production ICRMS. TR.45 Final migration log
Final Migration and Go-
Live
Validation Run validation checks and sample reports
post-load.
FR.43–FR.47 Validation checklist
Final Migration and Go-
Live
Cutover Execution Switch operations to ICRMS and
decommission legacy entry points.
TR.35 Cutover report
Post-Go-Live Support Hypercare Period Provide dedicated vendor/on-site support for
defined period.
TR.47 Support logs
Post-Go-Live Support Parallel
Reconciliation
Compare ICRMS vs legacy data for a defined
period.
FR.25 Reconciliation reports
Post-Go-Live Support Final Sign-off Formal acceptance of migrated data. TR.47 Acceptance certificate
Section 5: Roles and Responsibilities
Role Responsibility
County ICT Unit Co-ordinate migration; validate technical tools; manage backups and environments.
County Finance/Revenue Dept Validate SCOA mappings; verify ledger and transaction accuracy.
Vendor Migration Team Provide migration tools; execute migration and cutover; resolve issues.
Data Protection Officer Ensure compliance with privacy laws during migration.
Project Manager Oversee migration timeline, scope, and resources.
Audit/QA Team Independently verify migration quality and compliance.
Commission on Revenue Allocation Offer Technical Capacity Assistance
12:13 PM THE KENYA GAZETTE 9th September, 2025
6170 6170
Section 6: Key Risks and Mitigation
Risk Potential Impact Mitigation
Data loss during migration Missing or incomplete records Multiple backups; trial runs; reconciliation checks
Incomplete SCOA mapping Reporting and IFMIS errors Pre-validation of mappings; enforce SCOA codes
Extended downtime Service disruption Plan migration window; define fallback plan
User resistance Continued use of old processes Early training; user participation in migration
Privacy breach Legal penalties Secure handling; role-based access; encryption
(ix) Annex 9: Change Management and Training Plan
Section 1: Purpose
This annex outlines the structured approach for managing organisational change, stakeholder adoption, and capacity building during the transition
to the ICRMS.
Section 2: Change Management Phases
Phase Key Activities Deliverables Linked FR/TR
Readiness Assessment Assess current processes, systems, skills, and
stakeholder perceptions.
Readiness report; stakeholder
mapping
TR.47
Communication Planning Develop strategy, key messages, channels, and
timeline.
Communication plan; briefing
materials
TR.35
Stakeholder Engagement Meetings with user groups, management, oversight
bodies.
Engagement logs; feedback
matrix
FR.1; FR.38
Impact Analysis Identify process and role changes; KPIs affected. Change impact report TR.47
Resistance Management Identify potential resistance; plan mitigation. Resistance plan TR.47
Change Champion Network Appoint departmental champions to support
adoption.
Champion roster; role
descriptions
TR.47
Section 3: Training Plan Structure
Training Type Target Audience Objectives Responsibility Delivery Method Duration Linked FR/TR
System Overview Executive leadership;
managers
Understand system
purpose, benefits,
governance
TNT Workshop/Briefing 0.5 day FR.1–FR.3;
TR.47
Functional User
Training
Revenue and finance
officers; enforcement
staff
Operate modules for
billing, receipting,
reconciliation,
enforcement
TNT Hands-on workshops 2–3 days FR.20–FR.32
Technical/Admin
Training
ICT and system
administrators
Manage users, roles,
configurations,
integrations, backups,
security
CG, TNT Lab sessions 3–5 days TR.9–TR.24;
TR.36
Integration Training ICT and finance
integration staff
Manage IFMIS, SCOA,
payment and registry
integrations
Practical configuration
sessions
2 days FR.14;
TR.13–TR.17
Security and
Compliance Training
All users Data security, privacy
laws, role-based controls
E-learning/Interactive 1 day TR.18–TR.22
Reporting and
Analytics Training
Management; Mand
E; finance teams
Generate statutory and
management reports,
dashboards, analytics
Workshop 1 day FR.43–
FR.48;
TR.38–TR.40
DR/BCP Training ICT and operations
staff
DR drills, backup
restores, continuity
processes
Simulation 0.5–1 day TR.33–TR.37
Change Champion
Coaching
Change champions Support peer adoption;
escalate feedback
Peer coaching Ongoing TR.47
Section 4: Communication Guidelines
1. Pre-Go-Live: Weekly updates, FAQs, early demos.
2. Go-Live: Daily updates, escalation contacts, public notices.
3. Post-Go-Live: Success stories, usage stats, surveys.
Section 5: Adoption Monitoring and Success Criteria
1. User login frequency and transaction volumes.
2. Helpdesk ticket trends and resolution times.
3. Compliance with new processes and decommissioning of manual systems within 3 months.
9th September, 2025 THE KENYA GAZETTE
4. ≥90% of targeted users trained; ≥80% competency scores post-training.
5. ≥80% stakeholder satisfaction in surveys; adoption metrics meet projections.
(x) Annex 10: Standard Reports Catalogue
Section 1: Purpose
This annex defines the minimum set of reports that the ICRMS must produce to meet statutory, operational, management, analytical, and
transparency requirements.
Section 2: Report Categories
Category Description Frequency Linked FR/TR
Statutory and Financial Reports Legally required; SCOA-coded; IFMIS-
compatible
Monthly/Quarterly/Annual FR.44; TR.13
Management and Operational
Reports
Support internal decision-making Daily/Weekly/Monthly FR.43; TR.38
Debt and Enforcement Reports Track arrears, payment plans, enforcement
actions
Weekly/Monthly FR.29–FR.33; TR.29–TR.31
GIS and Asset Reports Spatial insights for revenue assets Monthly/Quarterly FR.16; FR.48; TR.28
Analytical and Forecasting Reports Predictive insights for planning Quarterly/Annual TR.39; TR.40
Section 3: Minimum Standard Reports
Ref No. Report Name Description and Purpose Frequency Format Linked FR/TR
SR.1 County Revenue Summary Consolidated revenue by stream, ward,
SCOA code; IFMIS-ready.
Monthly PDF; XLSX; SCOA
CSV
FR.44; TR.13
SR.2 Daily Collections Report Daily revenue by stream, collector,
payment channel.
Daily PDF; XLSX FR.43; FR.25
SR.3 Bank and Channel
Reconciliation Report
Matches transactions to bank/mobile
money; flags exceptions.
Daily PDF; XLSX FR.25; TR.15
SR.4 SCOA Export File SCOA-coded export for IFMIS posting. Monthly SCOA CSV FR.44; TR.13
SR.5 Arrears Aging Report Outstanding balances by age buckets. Monthly PDF; XLSX FR.29; TR.39
SR.6 Payment Plan Compliance
Report
Lists payment plans, instalments,
defaults.
Weekly PDF; XLSX FR.30
SR.7 Enforcement Action Register All enforcement cases, GPS-stamped
actions, outcomes.
Monthly PDF; XLSX FR.32; TR.29
SR.8 Waivers and Exemptions
Report
Approved waivers/exemptions with
details.
Monthly PDF; XLSX FR.18
SR.9 Top Revenue Sources Ranked streams/accounts with trends. Monthly PDF; XLSX FR.19; TR.39
SR.10 Revenue vs Target
Performance
Actual vs target collections by
stream/ward.
Monthly PDF; XLSX FR.19; TR.39
SR.11 Licence and Permit Register All licences/permits: active, expired,
pending.
Monthly PDF; XLSX FR.20–FR.22
SR.12 Asset Revenue Report Revenue from county assets. Quarterly PDF; XLSX FR.15
SR.13 GIS Asset Map and Revenue
Overlay
Map assets/revenue sources with
collections data.
Quarterly PDF; GIS Shapefile FR.16; FR.48
SR.14 Transaction Audit Report All transactions with
user/timestamp/action.
Monthly PDF; XLSX FR.49; TR.15
SR.15 Configuration Change Audit All config changes (tariffs, SCOA, roles). Monthly PDF; XLSX FR.42; TR.41
SR.16 Security Incident Report Failed logins, access violations, resolved
vulnerabilities.
Quarterly PDF TR.18–TR.21
SR.17 Revenue Forecast Report Predictive revenue per stream/ward. Quarterly PDF; XLSX TR.40
SR.18 DR/BCP Test Report DR and BCP test results. Bi-Annual PDF TR.33–TR.35
SR.19 Public Transparency Report Non-confidential summary for public
release.
Quarterly PDF; Web FR.38; TR.39
SR.20 Collector Performance
Report
Collections per collector/agent; efficiency
metrics.
Monthly PDF; XLSX FR.35
12:13 PM THE KENYA GAZETTE 9th September, 2025
6172 6172
(xi) Annex 11: Data and Records Governance
Section 1: Purpose
Establish the rules, responsibilities, and standards for secure, accurate, and compliant management of all data and records within the ICRMS,
ensuring transparency, accountability, and long-term integrity.
Section 2: Scope
Covers all data captured, processed, stored, or transmitted by the ICRMS including taxpayer and revenue records, SCOA-coded transactions,
audit logs and configuration changes, backups, archives, and purged records.
Section 3: Data Ownership and Stewardship
Role Responsibility
County Government (Data Owner) Legal ownership of ICRMS data within its jurisdiction.
National Implementing Agency (Central System-
National Treasury)
Ownership of central repository and inter-county integration data.
ICT Unit Technical custodian of databases, backups, and recovery operations.
Revenue Department Custodian of taxpayer and transaction records; enforces SCOA compliance.
Data Protection Officer Ensures compliance with data protection laws and privacy policies.
Internal Audit Verifies governance controls and data accuracy.
Section 4: Data Classification
Classification Description Examples
Public Accessible without restriction. Aggregated revenue reports
Internal For internal staff use only. Operational dashboards
Confidential Restricted to authorised roles. Taxpayer profiles; SCOA codes
Restricted Highest sensitivity. Encryption keys; investigation records
Section 5: Data Quality Standards
Standard Requirement Linked FR/TR
Accuracy Records must match source documents. FR.6; FR.7; TR.44
Completeness Mandatory fields enforced; no nulls where not permitted. TR.44
Consistency Standard formats for dates, SCOA codes, IDs. FR.14; TR.13
Timeliness Updates in real or near-real time. TR.26
Integrity Maintain referential integrity across related datasets. FR.1; FR.2
Section 6: Retention, Archiving and Disposal
1. Retention: Financial, transactional, and audit data retained for at least 7 years.
2. Archiving: Inactive records archived after 2 years but retrievable for audit.
3. Purging: Allowed only after retention period, with multi-level authorisation and audit logging.
4. Backup: Daily full + hourly incremental; quarterly restore tests (TR. 36).
Section 7: Records Management Controls
Control Area Requirement Linked FR/TR
Audit Trails Immutable logs for all create/update/delete actions. FR.49; TR.15
SCOA Compliance All transactions SCOA-coded. FR.14; TR.13
Source Documentation All records linked to scanned/uploaded documents. FR.3
Version Control Maintain history of tariffs, SCOA updates, configuration changes. FR.12; TR.41
Retrieval and Search Multi-criteria search for any record. FR.8
Section 8: Access and Security Auditing
1. Quarterly review of user access rights; immediate revocation after role change or exit.
2. Annual penetration testing; quarterly vulnerability scans.
3. Review logs for suspicious activity and investigate anomalies.
Section 9: Compliance Monitoring and Indicators
1. Annual Data and Records Governance Audit by Internal Audit; CRA/National Treasury oversight inspections.
2. Key Governance Indicators (KGIs): % records with complete SCOA mapping; % records meeting accuracy benchmarks; unauthorised
access incidents; backup and restore success rates.
9th September, 2025 THE KENYA GAZETTE
(xii) Annex 12: Glossary and Acronyms
Section 1: Purpose
Standardises the definitions and abbreviations used throughout the Standards and Guidelines to ensure clarity, accuracy, and uniform
interpretation.
Section 2: Glossary of Key Terms
Term Definition
Access Control The process of granting or denying requests to obtain and use information and system
services, managed via Role-Based Access Control (RBAC) and Attribute-Based Access
Control (ABAC).
Ad-hoc Report A report created on demand to meet specific information needs outside scheduled
reporting.
API (Application Programming Interface) Protocols and tools that enable communication between systems.
Audit Trail A secure, chronological record of all system activities showing the user, action, and
time.
Business Continuity Plan (BCP) Documented procedures to ensure continued operations during and after a disruption.
Cutover The planned process of switching operations from a legacy system to a new system.
Customer Ledger A detailed account record showing all transactions, charges, payments, and balances for
a taxpayer.
Data Cleansing Detecting and correcting (or removing) corrupt, inaccurate, or incomplete data.
Data Protection Impact Assessment (DPIA) An assessment to identify and minimise data protection risks.
Disaster Recovery (DR) Strategies and procedures to restore IT systems, applications, and data after a
disruption.
End-of-Day (EoD) Process Daily procedure of closing financial transactions, reconciling, and locking entries.
End-of-Month (EoM) Process Monthly closing procedure to roll forward balances, age debt, and lock the period.
End-of-Year (EoY) Process Annual closing procedure for the fiscal year, carrying forward balances and archiving.
Failover Automatic switching to a standby system when the primary fails.
Finance Act Legislation outlining revenue streams, rates, and penalties for a fiscal year.
Geographic Information System (GIS) A system for capturing, storing, analysing, and displaying spatial or geographic data.
Hypercare Period Intensive vendor and project team support immediately after go-live.
Immutable Log A log file that cannot be altered or deleted, ensuring audit integrity.
Integration Test Verification that separate system components work together as intended.
Maker-Checker Control A control where one user initiates a process and another approves it.
Multi-Factor Authentication (MFA) A security measure requiring more than one verification method for login.
Multi-Tenancy Architecture where one system instance serves multiple clients with data segregation.
Parametric Configuration Configure system behaviour through parameters without changing code.
Payment Channel Method used to process payments, such as mobile money, EFT, USSD, or POS.
Reconciliation Matching system records to bank or payment provider records to ensure accuracy.
Recovery Point Objective (RPO) Maximum acceptable amount of data loss measured in time.
Recovery Time Objective (RTO) Maximum acceptable time to restore services after a disruption.
Standard Chart of Accounts (SCOA) Uniform coding framework for government accounting.
Tamper-Evident Feature that shows when an attempt has been made to alter data or logs.
Transaction Ledger Record of all transactions for a specific revenue stream, with SCOA coding.
Version Control System that records changes to files or configurations and allows rollback.
Section 3: Acronyms
Acronym Full Form
ABAC Attribute-Based Access Control
API Application Programming Interface
BCP Business Continuity Plan
BRS Business Registration Service
12:13 PM THE KENYA GAZETTE 9th September, 2025
6174 6174
Acronym Full Form
CEC County Executive Committee
CoG Council of Governors
CRA Commission on Revenue Allocation
CSV Comma-Separated Values
DPIA Data Protection Impact Assessment
DR Disaster Recovery
EoD End-of-Day
EoM End-of-Month
EoY End-of-Year
ELK Elasticsearch, Logstash, Kibana
FR Functional Requirement
GEA Government Enterprise Architecture
GIF Government Interoperability Framework
GIS Geographic Information System
HMIS Health Management Information System
ICT Information and Communication Technology
ICRMS Integrated County Revenue Management System
ID Identification
IFMIS Integrated Financial Management Information System
IBEC Intergovernmental Budget and Economic Council
IPRS Integrated Population Registration System
JSON JavaScript Object Notation
KPI Key Performance Indicator
KRA Kenya Revenue Authority
LTS Long-Term Support
MFA Multi-Factor Authentication
NTSA National Transport and Safety Authority
OCOB Office of the Controller of Budget
OTP One-Time Password
PDF Portable Document Format
PFM Public Finance Management
POS Point of Sale
RBAC Role-Based Access Control
RPO Recovery Point Objective
RTO Recovery Time Objective
SAML Security Assertion Markup Language
SAST Static Application Security Testing
SCOA Standard Chart of Accounts
SLA Service Level Agreement
SSO Single Sign-On
TR Technical Requirement
TCO Total Cost of Ownership
TLS Transport Layer Security
UAT User Acceptance Testing
UPS Uninterruptible Power Supply
9th September, 2025 THE KENYA GAZETTE
Acronym Full Form
USSD Unstructured Supplementary Service Data
UUID Universal Unique Identifier
VAT Value Added Tax
XML Extensible Markup Language
CERTIFICATION
These Annexes to the Integrated County Revenue Management System (ICRMS) Standards and Guidelines have been reviewed and approved for
publication and implementation by the Commission on Revenue Allocation (CRA) in accordance with its constitutional mandate under Article 216 of
the Constitution of Kenya, the Public Finance Management Act and all other relevant statutory provisions.
In setting out these guidelines, the Commission seeks to promote prudent use of public resources, ensure value for money, and enhance revenue
generation and management across all County Governments and National Government implementing entities.
Approved on the 8th September, 2025.
MARY WANYONYI CHEBUKATI,
Chairperson, Commission on Revenue Allocation.
ROBLE NUNO,
Ag. Commission Secretary/Chief Executive Officer.
Dated the 8th September, 2025.
ROBLE NUNO,
Ag. Commission Secretary/Chief Executive Officer.
Extracted Entities (1)
previous_gazette_ref
12835
Details
- Act / Legislation
- THE CONSTITUTION
- Signed By
- ROBLE NUNO
- Title
- Ag. Commission Secretary/Chief Executive Officer
- Date Signed
- 8th September 2025
- Page
- 1
- Extraction Method
- regex
Source Gazette
Vol. CXXVII No. 191
Published 8th September 2025