text stringlengths 195 512 |
|---|
ement
CCM SA-02: Security Architecture - User ID Credentials
CCM SA-09: Security Architecture - Segmentation
CCM SA-11: Security Architecture - Shared Networks
CCM SA-14: Security Architecture - Audit Logging / Intrusion Detection
9.3 Links
1. New virtualization vulnerability allows escape to hypervisor attack... |
REFERENCE
Domain 1: Cloud computing
architectural framework
Domain 5: Information
management and data security
Domain 11: Encryption and key
management
Domain 12: Identity, entitlement,
and access management
Domain 13: Virtualization
IS THREAT STILL RELEVANT?
TOP THREAT RANKING
SERVICE MODEL
IaaS
P... |
Recommendation for Space Data System Practices
MAGENTA BOOK
AUDIT AND
CERTIFICATION OF
TRUSTWORTHY DIGITAL
REPOSITORIES
RECOMMENDED PRACTICE
CCSDS 652.0-M-1
September 2011
Recommendation for Space Data System Practices
AUDIT AND
CERTIFICATION OF
TRUSTWORTHY DIGITAL
REPOSITORIES
RECOMMENDED PRACTICE
CCSDS 6... |
ice, Issue 1
Date:
September 2011
Location:
Washington, DC, USA
This document has been approved for publication by the Management Council of the
Consultative Committee for Space Data Systems (CCSDS) and represents the consensus
technical agreement of the participating CCSDS Member Agencies. Th... |
in
the authorization of this document can be obtained from the CCSDS Secretariat at the
address below.
This document is published and maintained by:
CCSDS Secretariat
Space Communications and Navigation Office, 7L70
Space Operations Mission Directorate
NASA Headquarters
Washington, DC 20546-0001, USA
AU... |
ization officially
established by the management of its members. The Committee meets periodically to address
data systems problems that are common to all participants, and to formulate sound technical
solutions to these problems. Inasmuch as participation in the CCSDS is completely
voluntary, the results of Committ... |
the formal vehicles by which CCSDS Agencies create the standards that specify how
elements of their space mission support infrastructure shall operate and interoperate with
others; and Recommended Practices that are more descriptive in nature and are intended to
provide general guidance about how to approach a parti... |
entirely voluntary
and does not imply a commitment by any Agency or organization to implement its
recommendations in a prescriptive sense.
No later than five years from its date of issuance, this Recommended Practice will be
reviewed by the CCSDS to determine whether it should: (1) remain in effect without change;... |
ce is issued, existing
CCSDS-related member Practices and implementations are not negated or deemed to be non-
CCSDS compatible. It is the responsibility of each member to determine when such Practices
or implementations are to be modified. Each member is, however, strongly encouraged to
direct planning for its new... |
FOREWORD
This document is a technical Recommendation to use as the basis for providing audit and
certification of the trustworthiness of digital repositories. It provides a detailed specification
of criteria by which digital repositories shall be audited.
The OAIS Reference Model (reference [1]) contained a roadm... |
Libraries Group (RLG) and the National Archives and Records
Administration (NARA) created a joint task force to specifically address digital repository
certification. That task force published Trustworthy Repositories Audit & Certification:
Criteria and Checklist (TRAC—reference [B3]), on which this Recommended Pra... |
to CCSDS document management and change control procedures, which are defined in the
Procedures Manual for the Consultative Committee for Space Data Systems. Current
versions of CCSDS documents are maintained at the CCSDS Web site:
http://www.ccsds.org/
Questions relating to the contents or status of this docume... |
time of publication, the active Member and Observer Agencies of the CCSDS were:
Member Agencies
– Agenzia Spaziale Italiana (ASI)/Italy.
– Canadian Space Agency (CSA)/Canada.
– Centre National d’Etudes Spatiales (CNES)/France.
– China National Space Administration (CNSA)/People’s Republic of China.
– Deutsches Ze... |
razil.
– Japan Aerospace Exploration Agency (JAXA)/Japan.
– National Aeronautics and Space Administration (NASA)/USA.
– UK Space Agency/United Kingdom.
Observer Agencies
– Austrian Space Agency (ASA)/Austria.
– Belgian Federal Science Policy Office (BFSPO)/Belgium.
– Central Research Institute of Machine Buildin... |
y of Sciences (CAS)/China.
– Chinese Academy of Space Technology (CAST)/China.
– Commonwealth Scientific and Industrial Research Organization (CSIRO)/Australia.
– CSIR Satellite Applications Centre (CSIR)/Republic of South Africa.
– Danish National Space Center (DNSC)/Denmark.
– Departamento de Ciência e Tecnologi... |
rope.
– Geo-Informatics and Space Technology Development Agency (GISTDA)/Thailand.
– Hellenic National Space Committee (HNSC)/Greece.
– Indian Space Research Organization (ISRO)/India.
– Institute of Space Research (IKI)/Russian Federation.
– KFKI Research Institute for Particle & Nuclear Physics (KFKI)/Hungary.
... |
nic and Atmospheric Administration (NOAA)/USA.
– National Space Agency of the Republic of Kazakhstan (NSARK)/Kazakhstan.
– National Space Organization (NSPO)/Chinese Taipei.
– Naval Center for Space Technology (NCST)/USA.
– Scientific and Technological Research Council of Turkey (TUBITAK)/Turkey.
– Space and Upper... |
POSITORIES
CCSDS 652.0-M-1
Page v
September 2011
DOCUMENT CONTROL
Document
Title
Date
Status
CCSDS
652.0-M-1
Audit and Certification of
Trustworthy Digital Repositories,
Recommended Practice,
Issue 1
September
2011
Original issue
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REP... |
........ 1-1
1.1
PURPOSE AND SCOPE
........................................................................................ 1-1
1.2
APPLICABILITY
................................................................................................... 1-1
1.3
RATIONALE
................................................ |
.................................................................................................... 1-3
1.6
CONFORMANCE
.................................................................................................. 1-6
1.7
REFERENCES ............................................................................... |
................... 2-1
2.2
EVIDENCE ............................................................................................................ 2-1
2.3
RELEVANT STANDARDS, BEST PRACTICES, AND CONTROLS ............... 2-1
3 ORGANIZATIONAL INFRASTRUCTURE
............................................................ |
ROCEDURAL ACCOUNTABILITY AND PRESERVATION POLICY
FRAMEWORK ...................................................................................................... 3-5
3.4
FINANCIAL SUSTAINABILITY ....................................................................... 3-10
3.5
CONTRACTS, LICENSES, AND LIABILITIES...... |
CONTENT
............................................................. 4-1
4.2
INGEST: CREATION OF THE AIP
...................................................................... 4-6
4.3
PRESERVATION PLANNING ........................................................................... 4-16
4.4
AIP PRESERVATION ...... |
4-23
4.6
ACCESS MANAGEMENT ................................................................................. 4-24
5 INFRASTRUCTURE AND SECURITY RISK MANAGEMENT ........................... 5-1
5.1
TECHNICAL INFRASTRUCTURE RISK MANAGEMENT
.............................. 5-1
5.2
SECURITY RISK MANAGEMENT .......... |
..........................................................B-1
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 1-1
September 2011
1 INTRODUCTION
1.1
PURPOSE AND SCOPE
The main purpose of this document is to define a CCSDS Recommended Practice on which
to base an audit and certif... |
cument is meant primarily for those responsible for auditing digital repositories and
also for those who work in or are responsible for digital repositories seeking objective
measurement of the trustworthiness of their repository. Some institutions may also choose to
use these metrics during a design or redesign pro... |
ture is the existence of a sufficient number
of trusted organizations capable of storing, migrating, and providing access to digital
collections’. The task force saw that ‘trusted’ or trustworthy organizations could not simply
identify themselves. To the contrary, the task force declared, ‘a process of certification... |
re was furthered by the
development of the Open Archival Information System (OAIS) Reference Model
(reference [1]). Designed to create a consensus on ‘what is required for an archive to provide
permanent or indefinite long-term preservation of digital information’, the OAIS addressed
fundamental questions regarding... |
nment, functional components, and
information objects within a system responsible for the long-term preservation of digital
materials. Long before it became an approved standard in 2002, many in the cultural heritage
community had adopted OAIS as a model to better understand what would be needed from
digital preser... |
‘OAIS-
compliance’ beyond being able to apply OAIS terminology to describe their archive, despite
there being a compliance section in OAIS which specifies the need to support the model of
information and fulfilling the mandatory responsibilities.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652... |
tworthy repository is and is not
has become vital.
In 2002, Research Libraries Group (RLG) and Online Computer Library Center (OCLC)
jointly
published
Trusted
Digital
Repositories:
Attributes
and
Responsibilities
(reference [B2]), which further articulated a framework of attributes and responsibilities for
... |
ough to accommodate different situations, technical architectures, and institutional
responsibilities while providing a basis for the expectations of a trusted repository. The
document has proven to be useful for institutions grappling with the long-term preservation
of cultural heritage resources and has been used ... |
models for digital repository
certification. It refrained from being prescriptive about the specific nature of rapidly
emerging digital repositories and archives and instead reiterated the call for certification of
digital repositories, recommending the development of certification program and articulation
of audi... |
ration (NARA) would take this particular topic forward and the later published the
TRAC (reference [B3]) document which combined ideas from OAIS (reference [1]) and
Trusted Digital Repositories: Attributes and Responsibilities (TDR—reference [B2]).
The current document follows on from TRAC in order to produce an ISO... |
view of the rationale, the
conceptual environment, some of the important design issues, and an introduction to the
terminology and concepts.
– Section 1 gives purpose and scope, rationale, a view of the overall document
structure, and the acronym list, glossary, and reference list for this document.
– Section 2 pr... |
es of effectiveness. When
evaluated together, metrics can be used to judge the overall suitability of a repository
to be trusted to provide a preservation environment that is consistent with the goals of
the OAIS. Separately, individual metrics or measures can be used to identify possible
weaknesses or pending dec... |
nst which a digital repository may
be judged. These sections provide metrics grouped as follows:
•
covers Organizational Infrastructure;
•
covers Digital Object Management;
•
covers Infrastructure and Security Risk Management.
Each section groups metrics into one or more subsections.
– Security consideration... |
Consultative Committee for Space Data Systems
DEDSL
Data Entity Specification Language (see reference [B7])
DIP
Dissemination Information Package (defined in reference [1])
FITS
Flexible Image Transport System
GIS
Geographic Information System
ISO
International Organization for Standardization
OAIS
Open A... |
Encoding Initiative
UML
Unified Modeling Language
XML
Extensible Markup Language
1.5.2 TERMINOLOGY
Digital preservation interests a range of different communities, each with a distinct
vocabulary and local definitions for key terms. A glossary is included in this document, but it
is important to draw attention ... |
provide a common
terminology made up of terms ‘not already overloaded with meaning so as to reduce
conveying unintended meanings’ (reference [1]). Because the OAIS has become a
foundational document for digital preservation, the common terms are well understood and
are therefore used within this document.
AUDIT AN... |
l preservation. In this document, the term ‘repository’ or phrase ‘digital repository’ is
used to convey the same concept in all instances except when quoting from the OAIS. It is
important to understand that in all instances in this document, ‘repository’ and ‘digital
repository’ are used to convey digital reposito... |
have a single, generalized
‘Designated Community’ (e.g., every citizen of a country), while other repositories may have
several, distinct Designated Communities with highly specialized needs, each requiring
different functionality or support from the repository; this document uses the term
Designated Community to c... |
ated, other definitions are taken from the OAIS Reference Model
(reference [1]).
Access Policy: Written statement, authorized by the repository management, that describes
the approach to be taken by the repository for providing access to objects accessioned into
the repository. The Access Policy may distinguish bet... |
measured by logs or other
evidence that record actions completed.
Preservation Implementation Plan: A written statement, authorized by the management of
the repository, that describes the services to be offered by the repository for preserving
objects accessioned into the repository in accordance with the Preservat... |
th preservation. The Preservation Strategic Plan states how the
mission will be achieved, in general terms with goals and objectives. The
Preservation Policy then declares the range of approaches that the repository will
employ to ensure preservation (that is, to implement the Preservation Strategic
Plan), and fi... |
documents, a different distribution of
subjects between documents, different document names, etc.
Preservation Policy: Written statement, authorized by the repository management, that
describes the approach to be taken by the repository for the preservation of objects
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL... |
Plan: A written statement, authorized by the management of the
repository, that states the goals and objectives for achieving that part of the mission of the
repository concerned with preservation. Preservation Strategic Plans may include long-term
and short-term plans.
Procedure: A written statement that specifies... |
led.
Provider (or Submitter): A person or system that submits a digital object to the repository.
The Provider can be the Producer.
Repository Mission Statement: A written statement, authorized by the management of the
repository, that, among other things, describes the commitment of the organization for the
stewa... |
imply a binding and verifiable specification;
b) the word ‘should’ implies an optional, but desirable, specification;
c) the word ‘may’ implies an optional specification;
d) the words ‘is’, ‘are’, and ‘will’ imply statements of fact.
NOTE – These conventions do not imply constraints on diction in text that is clear... |
intended to help clarify and elucidate their superior
item. Satisfaction of the sub-metrics provides evidence supporting a claim of
compliance with the hierarchically superior items.
– Each metric has one or more of the following informative pieces of text associated
with it:
•
Supporting Text: giving an explana... |
It Is Meeting This
Requirement: providing examples of the evidence which might be examined to
test whether the repository satisfies the metric;
•
Discussion: clarifications about the intent of the metric.
1.6
CONFORMANCE
An archive that conforms to this Recommended Practice shall have satisfied the auditor on ... |
tion of auditors’
guidelines, as described in the draft ISO 16919.
As described in the referenced ISO documents, the aim of the audit process is to create a
process of continuous improvement. Thus the outcome of the audit will not be a simple
yes/no but rather a judgment about areas that need improvement.
1.7
REF... |
ted
were valid. All documents are subject to revision, and users of this Recommended Practice
are encouraged to investigate the possibility of applying the most recent editions of the
documents indicated below. The CCSDS Secretariat maintains a register of currently valid
CCSDS documents.
[1]
Reference Model fo... |
as ISO 14721:2003.]
NOTE – Informative references are listed in annex B.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 2-1
September 2011
2 OVERVIEW OF AUDIT AND CERTIFICATION CRITERIA
This section provides an overview of some of the key concepts that are incorporated in the... |
ssion to provide reliable, long-term access to managed digital resources to its Designated
Community, now and into the future’ (reference [B2]). Expanding the definition has caused
great discussion both within and across various groups, from the broad digital preservation
community to the data archives or institutio... |
ions and strategy
implementation will be required of repositories to carry out their mission of digital
preservation. All of these present an expensive, complex undertaking that depositors,
stakeholders, funders, the Designated Community, and other digital repositories will need to
rely on in the greater collaborat... |
rency—will engender more trust, and
additional objective audits, potentially leading towards certification, will promote further
trust in the repository and the system that supports it. Finally, attaining trustworthy status is
not a one-time accomplishment, achieved and forgotten. To retain trustworthy status, a
re... |
of Ways the Repository Can Demonstrate It Is Meeting This Requirement:
providing examples of the evidence which might be examined to test whether the repository
satisfies the metric. These examples are illustrative rather than prescriptive, and the lists of
possible evidence are not exhaustive.
2.3
RELEVANT STAN... |
omplementary audit tools. A
few examples:
– The ISO 9000 family of standards (e.g., Quality Management Systems—
Fundamentals and Vocabulary—reference [B9]) addresses quality assurance
components within an organization and system management that, while valuable,
were not specifically developed to gauge the trustwort... |
eference [B10]) was developed specifically to address
data security and information management systems. Like ISO 9000, it has some very
valuable components to it but it was not designed to address the trustworthiness of
digital repositories. Its requirements for information security seek data security
compliance to... |
nd ISO 15489-2:2001 (references [B11] and [B12]) define a
systematic and process-driven approach that governs the practice of records managers
and any person who creates or uses records during their business activities, treats
information contained in records as a valuable resource and business asset, and
protects/... |
anagement, but, by design, addresses records
management specifically rather than applying to all types of repositories and archives.
– Finally, ISO 14721:2003, the Open Archival Information System Reference Model,
provides a high-level reference model or framework identifying the participants in
digital preservatio... |
o acknowledge that there is real value in knowing whether an institution is
certified to related standards or meets other controls that would be relevant to an audit.
Certainly, an institution that has undertaken any kind of certification process—even if none
of the evaluated components overlap with a digital reposi... |
during the digital repository
audit.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 3-1
September 2011
3 ORGANIZATIONAL INFRASTRUCTURE
3.1
GOVERNANCE AND ORGANIZATIONAL VIABILITY
3.1.1 The repository shall have a mission statement that reflects a commitment to the
preserva... |
access at the repository’s highest administrative level.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Mission statement or charter of the repository or its parent organization that specifically
addresses or implicitly calls for the preservation of information and/or other resource... |
ent and
access to information and/or other resources under its purview.
Discussion
The repository’s or its parent organization’s mission statement should explicitly address
preservation. If preservation is not among the primary purposes of an organization that
houses a digital repository then preservation may not ... |
as a university or a government
agency, and its narrower mission may be formalized through policies explicitly adopted and
approved by the larger organization. Government agencies and other organizations may have
legal mandates that require they preserve materials, in which case these mandates can be
substituted f... |
3.1.2 The repository shall have a Preservation Strategic Plan that defines the
approach the repository will take in the long-term support of its mission.
Supporting Text
This is necessary in order to help the repository make administrative decisions, shape
policies, and allocate resources in order to successfully p... |
which have been made.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 3-2
September 2011
Discussion
The strategic plan should be based on the organization’s established mission, and on its
defined values, vision and goals. Strategic plans typically cover a particular finite time ... |
s to operate or the
governing or funding institution substantially changes its scope.
Supporting Text
This is necessary in order to preserve the information content entrusted to the repository by
handing it on to another custodian in the case that the repository ceases to operate.
Examples of Ways the Repository C... |
sitory, and the steps taken and to be
taken to ensure continuity; escrow of critical code, software, and metadata sufficient to
enable reconstitution of the repository and its content in the event of repository failure;
escrow and/or reserve funds set aside for contingencies; explicit agreements with successor
orga... |
e rights necessary to ensure continuity of the content and repository services.
Discussion
A repository’s failure threatens the long-term sustainability of a repository’s information
content. It is not sufficient for the repository to have an informal plan or policy regarding
where its data goes should a failure oc... |
tingency plans, and/or escrow arrangements.
Supporting Text
This is necessary in order to ensure that the repository can recognize when it is necessary to
execute those plans.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Administrative policies, procedures, protocols, requirements... |
ES
CCSDS 652.0-M-1
Page 3-3
September 2011
Discussion
The management of a repository should have formal procedures in place to periodically
check on the viability of the repository. This periodic check should be used to determine if,
or when, to execute the repository’s formal succession plan, contingency plans,... |
ss to.
Supporting Text
This is necessary in order that the repository has guidance on acquisition of digital content it
will preserve, retain, manage and provide access to.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Collection policy and supporting documents; Preservation Policy... |
supports the broader mission of the repository. Without
such a policy the repository is likely to collect in a haphazard manner, or store large amounts
of low-value digital content. The collection policy helps the organization to identify what
digital content it will and will not accept for ingestion. In an organiza... |
AL STRUCTURE AND STAFFING
3.2.1 The repository shall have identified and established the duties that it needs to
perform and shall have appointed staff with adequate skills and experience to fulfill
these duties.
Discussion
Staffing of the repository should be by personnel with the required training and skills to ... |
that the repository is defining and maintaining the skills and roles that are
required for the sustained operation of the repository.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 3-4
September 2011
3.2.1.1 The repository shall have identified and established the duties that it... |
ects.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
A staffing plan; competency definitions; job descriptions; staff professional development
plans; certificates of training and accreditation; plus evidence that the repository reviews and
maintains these documents as requirements ev... |
reements. In
order to ensure long-term sustainability, a repository must be aware of all required activities
and demonstrate that it can successfully complete them. The repository can achieve these
aims by, for example, identifying the competencies and skill sets required to carry out its
activities over time—e.g.,... |
necessary in order to ensure repository staffing levels are adequate for preserving the
digital content and providing a secure, quality repository.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Organizational charts; definitions of roles and responsibilities; comparison of staffing l... |
itory should also demonstrate how it evaluates
staff effectiveness and suitability to support its functions and services.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 3-5
September 2011
3.2.1.3 The repository shall have in place an active professional development program
that ... |
ocedures change.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Professional development plans and reports; training requirements and training budgets,
documentation of training expenditures (amount per staff); performance goals and
documentation of staff assignments and achievements... |
repository must ensure that its staff’s skill
sets evolve. Ideally the repository will meet this requirement through a lifelong learning
approach to developing and retaining staff.
3.3
PROCEDURAL ACCOUNTABILITY AND PRESERVATION POLICY
FRAMEWORK
Documentation assures stakeholders (consumers, producers, and contri... |
ects its
Mission Statement and Strategic Plan and captures its normal activities. This entails
documenting all repository processes, decision-making, and goal setting. Documentation is
provided so that the activities of the repository will be understood by stakeholders and
management. It ensures that repository pol... |
epository’s sound and standards-based practice, is
facilitated by procedural accountability and documentation.
3.3.1 The repository shall have defined its Designated Community and associated
knowledge base(s) and shall have these definitions appropriately accessible.
Supporting Text
This is necessary in order that... |
of the Designated Community.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 3-6
September 2011
Discussion
The Designated Community is defined as ‘an identified group of potential Consumers who
should be able to understand a particular set of information. The Designated Communit... |
Designated Community definitions include:
– General English-reading public educated to high school and above, with access to a
Web Browser (HTML 4.0 capable).
– For Geographic Information System (GIS) data: GIS researchers—undergraduates
and above—having an understanding of the concepts of Geographic data and havi... |
h as FITSIO, familiar with astronomical spectrographic
instruments.
– Student of Middle English with an understanding of Text Encoding Initiative (TEI)
encoding and access to an XML rendering environment.
•
Variant 1: Cannot understand TEI;
•
Variant 2: Cannot understand TEI and no access to XML rendering enviro... |
he publishers of scholarly journals and their readers, each of whom have
different rights to access material and different services offered to them.
Some repositories may call themselves, for example, a ‘dark archive’, an archive that has a
policy not to allow consumers to get access to its contents for a certain pe... |
Supporting Text
This is necessary in order to ensure that the repository can fulfill that part of its mission
related to preservation.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Preservation Policies; Repository Mission Statement.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL ... |
example, a preservation strategic plan may contain a
requirement that the repository ‘comply with current preferred preservation standards’. The
preservation policy might then require that the repository ‘monitor current preservation
standards and ensure repository compliance with the preferred preservation standar... |
of understandability by the repository’s Designated Community for each Archival
Information Package.
3.3.2.1 The repository shall have mechanisms for review, update, and ongoing
development of its Preservation Policies as the repository grows and as technology and
community practice evolve.
Supporting Text
This ... |
.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Current and past written documentation in the form of Preservation Policies, Preservation
Strategic Plans and Preservation Implementation Plans, procedures, protocols, and
workflows; specifications of review cycles for documentation; d... |
n
Preservation Policies capture organizational commitments and intents for staffing, security
and other preservation-related concerns. Preservation Implementation Plans address
preservation activities and practices such as transfer, submission, quality control, storage
management, metadata management, and access an... |
ized way) in order to document the results
of monitoring for new developments, showing the repository’s responsiveness to prevailing
standards and practice, emerging requirements, and standards that are specific to the domain,
if appropriate, and similar developments. Qualified staff and peers are an important part ... |
ion Policies and procedures must be demonstrated to be understandable and
implementable.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 3-8
September 2011
3.3.3 The repository shall have a documented history of the changes to its operations,
procedures, software, and hardware.
... |
n Demonstrate It Is Meeting This Requirement
Capital equipment inventories; documentation of the acquisition, implementation, update,
and retirement of critical repository software and hardware; file retention and disposal
schedules and policies, copies of earlier versions of policies and procedures; minutes of
mee... |
sitory practices and workflow should be available.
3.3.4 The repository shall commit to transparency and accountability in all actions
supporting the operation and management of the repository that affect the preservation
of digital content over time.
Supporting Text
This is necessary because transparency, in the ... |
y Can Demonstrate It Is Meeting This Requirement
Reports of financial and technical audits and certifications; disclosure of governance
documents, independent program reviews, and contracts and agreements with providers of
funding and critical services.
Discussion
If the repository uses software to capture informa... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.