text
stringlengths
195
512
ement CCM SA-02: Security Architecture - User ID Credentials CCM SA-09: Security Architecture - Segmentation CCM SA-11: Security Architecture - Shared Networks CCM SA-14: Security Architecture - Audit Logging / Intrusion Detection 9.3 Links 1. New virtualization vulnerability allows escape to hypervisor attack...
REFERENCE Domain 1: Cloud computing architectural framework Domain 5: Information management and data security Domain 11: Encryption and key management Domain 12: Identity, entitlement, and access management Domain 13: Virtualization IS THREAT STILL RELEVANT? TOP THREAT RANKING SERVICE MODEL IaaS P...
Recommendation for Space Data System Practices MAGENTA BOOK AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES RECOMMENDED PRACTICE CCSDS 652.0-M-1 September 2011 Recommendation for Space Data System Practices AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES RECOMMENDED PRACTICE CCSDS 6...
ice, Issue 1 Date: September 2011 Location: Washington, DC, USA This document has been approved for publication by the Management Council of the Consultative Committee for Space Data Systems (CCSDS) and represents the consensus technical agreement of the participating CCSDS Member Agencies. Th...
in the authorization of this document can be obtained from the CCSDS Secretariat at the address below. This document is published and maintained by: CCSDS Secretariat Space Communications and Navigation Office, 7L70 Space Operations Mission Directorate NASA Headquarters Washington, DC 20546-0001, USA AU...
ization officially established by the management of its members. The Committee meets periodically to address data systems problems that are common to all participants, and to formulate sound technical solutions to these problems. Inasmuch as participation in the CCSDS is completely voluntary, the results of Committ...
the formal vehicles by which CCSDS Agencies create the standards that specify how elements of their space mission support infrastructure shall operate and interoperate with others; and Recommended Practices that are more descriptive in nature and are intended to provide general guidance about how to approach a parti...
entirely voluntary and does not imply a commitment by any Agency or organization to implement its recommendations in a prescriptive sense. No later than five years from its date of issuance, this Recommended Practice will be reviewed by the CCSDS to determine whether it should: (1) remain in effect without change;...
ce is issued, existing CCSDS-related member Practices and implementations are not negated or deemed to be non- CCSDS compatible. It is the responsibility of each member to determine when such Practices or implementations are to be modified. Each member is, however, strongly encouraged to direct planning for its new...
FOREWORD This document is a technical Recommendation to use as the basis for providing audit and certification of the trustworthiness of digital repositories. It provides a detailed specification of criteria by which digital repositories shall be audited. The OAIS Reference Model (reference [1]) contained a roadm...
Libraries Group (RLG) and the National Archives and Records Administration (NARA) created a joint task force to specifically address digital repository certification. That task force published Trustworthy Repositories Audit & Certification: Criteria and Checklist (TRAC—reference [B3]), on which this Recommended Pra...
to CCSDS document management and change control procedures, which are defined in the Procedures Manual for the Consultative Committee for Space Data Systems. Current versions of CCSDS documents are maintained at the CCSDS Web site: http://www.ccsds.org/ Questions relating to the contents or status of this docume...
time of publication, the active Member and Observer Agencies of the CCSDS were: Member Agencies – Agenzia Spaziale Italiana (ASI)/Italy. – Canadian Space Agency (CSA)/Canada. – Centre National d’Etudes Spatiales (CNES)/France. – China National Space Administration (CNSA)/People’s Republic of China. – Deutsches Ze...
razil. – Japan Aerospace Exploration Agency (JAXA)/Japan. – National Aeronautics and Space Administration (NASA)/USA. – UK Space Agency/United Kingdom. Observer Agencies – Austrian Space Agency (ASA)/Austria. – Belgian Federal Science Policy Office (BFSPO)/Belgium. – Central Research Institute of Machine Buildin...
y of Sciences (CAS)/China. – Chinese Academy of Space Technology (CAST)/China. – Commonwealth Scientific and Industrial Research Organization (CSIRO)/Australia. – CSIR Satellite Applications Centre (CSIR)/Republic of South Africa. – Danish National Space Center (DNSC)/Denmark. – Departamento de Ciência e Tecnologi...
rope. – Geo-Informatics and Space Technology Development Agency (GISTDA)/Thailand. – Hellenic National Space Committee (HNSC)/Greece. – Indian Space Research Organization (ISRO)/India. – Institute of Space Research (IKI)/Russian Federation. – KFKI Research Institute for Particle & Nuclear Physics (KFKI)/Hungary. ...
nic and Atmospheric Administration (NOAA)/USA. – National Space Agency of the Republic of Kazakhstan (NSARK)/Kazakhstan. – National Space Organization (NSPO)/Chinese Taipei. – Naval Center for Space Technology (NCST)/USA. – Scientific and Technological Research Council of Turkey (TUBITAK)/Turkey. – Space and Upper...
POSITORIES CCSDS 652.0-M-1 Page v September 2011 DOCUMENT CONTROL Document Title Date Status CCSDS 652.0-M-1 Audit and Certification of Trustworthy Digital Repositories, Recommended Practice, Issue 1 September 2011 Original issue AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REP...
........ 1-1 1.1 PURPOSE AND SCOPE ........................................................................................ 1-1 1.2 APPLICABILITY ................................................................................................... 1-1 1.3 RATIONALE ................................................
.................................................................................................... 1-3 1.6 CONFORMANCE .................................................................................................. 1-6 1.7 REFERENCES ...............................................................................
................... 2-1 2.2 EVIDENCE ............................................................................................................ 2-1 2.3 RELEVANT STANDARDS, BEST PRACTICES, AND CONTROLS ............... 2-1 3 ORGANIZATIONAL INFRASTRUCTURE ............................................................
ROCEDURAL ACCOUNTABILITY AND PRESERVATION POLICY FRAMEWORK ...................................................................................................... 3-5 3.4 FINANCIAL SUSTAINABILITY ....................................................................... 3-10 3.5 CONTRACTS, LICENSES, AND LIABILITIES......
CONTENT ............................................................. 4-1 4.2 INGEST: CREATION OF THE AIP ...................................................................... 4-6 4.3 PRESERVATION PLANNING ........................................................................... 4-16 4.4 AIP PRESERVATION ......
4-23 4.6 ACCESS MANAGEMENT ................................................................................. 4-24 5 INFRASTRUCTURE AND SECURITY RISK MANAGEMENT ........................... 5-1 5.1 TECHNICAL INFRASTRUCTURE RISK MANAGEMENT .............................. 5-1 5.2 SECURITY RISK MANAGEMENT ..........
..........................................................B-1 AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 1-1 September 2011 1 INTRODUCTION 1.1 PURPOSE AND SCOPE The main purpose of this document is to define a CCSDS Recommended Practice on which to base an audit and certif...
cument is meant primarily for those responsible for auditing digital repositories and also for those who work in or are responsible for digital repositories seeking objective measurement of the trustworthiness of their repository. Some institutions may also choose to use these metrics during a design or redesign pro...
ture is the existence of a sufficient number of trusted organizations capable of storing, migrating, and providing access to digital collections’. The task force saw that ‘trusted’ or trustworthy organizations could not simply identify themselves. To the contrary, the task force declared, ‘a process of certification...
re was furthered by the development of the Open Archival Information System (OAIS) Reference Model (reference [1]). Designed to create a consensus on ‘what is required for an archive to provide permanent or indefinite long-term preservation of digital information’, the OAIS addressed fundamental questions regarding...
nment, functional components, and information objects within a system responsible for the long-term preservation of digital materials. Long before it became an approved standard in 2002, many in the cultural heritage community had adopted OAIS as a model to better understand what would be needed from digital preser...
‘OAIS- compliance’ beyond being able to apply OAIS terminology to describe their archive, despite there being a compliance section in OAIS which specifies the need to support the model of information and fulfilling the mandatory responsibilities. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652...
tworthy repository is and is not has become vital. In 2002, Research Libraries Group (RLG) and Online Computer Library Center (OCLC) jointly published Trusted Digital Repositories: Attributes and Responsibilities (reference [B2]), which further articulated a framework of attributes and responsibilities for ...
ough to accommodate different situations, technical architectures, and institutional responsibilities while providing a basis for the expectations of a trusted repository. The document has proven to be useful for institutions grappling with the long-term preservation of cultural heritage resources and has been used ...
models for digital repository certification. It refrained from being prescriptive about the specific nature of rapidly emerging digital repositories and archives and instead reiterated the call for certification of digital repositories, recommending the development of certification program and articulation of audi...
ration (NARA) would take this particular topic forward and the later published the TRAC (reference [B3]) document which combined ideas from OAIS (reference [1]) and Trusted Digital Repositories: Attributes and Responsibilities (TDR—reference [B2]). The current document follows on from TRAC in order to produce an ISO...
view of the rationale, the conceptual environment, some of the important design issues, and an introduction to the terminology and concepts. – Section 1 gives purpose and scope, rationale, a view of the overall document structure, and the acronym list, glossary, and reference list for this document. – Section 2 pr...
es of effectiveness. When evaluated together, metrics can be used to judge the overall suitability of a repository to be trusted to provide a preservation environment that is consistent with the goals of the OAIS. Separately, individual metrics or measures can be used to identify possible weaknesses or pending dec...
nst which a digital repository may be judged. These sections provide metrics grouped as follows: • covers Organizational Infrastructure; • covers Digital Object Management; • covers Infrastructure and Security Risk Management. Each section groups metrics into one or more subsections. – Security consideration...
Consultative Committee for Space Data Systems DEDSL Data Entity Specification Language (see reference [B7]) DIP Dissemination Information Package (defined in reference [1]) FITS Flexible Image Transport System GIS Geographic Information System ISO International Organization for Standardization OAIS Open A...
Encoding Initiative UML Unified Modeling Language XML Extensible Markup Language 1.5.2 TERMINOLOGY Digital preservation interests a range of different communities, each with a distinct vocabulary and local definitions for key terms. A glossary is included in this document, but it is important to draw attention ...
provide a common terminology made up of terms ‘not already overloaded with meaning so as to reduce conveying unintended meanings’ (reference [1]). Because the OAIS has become a foundational document for digital preservation, the common terms are well understood and are therefore used within this document. AUDIT AN...
l preservation. In this document, the term ‘repository’ or phrase ‘digital repository’ is used to convey the same concept in all instances except when quoting from the OAIS. It is important to understand that in all instances in this document, ‘repository’ and ‘digital repository’ are used to convey digital reposito...
have a single, generalized ‘Designated Community’ (e.g., every citizen of a country), while other repositories may have several, distinct Designated Communities with highly specialized needs, each requiring different functionality or support from the repository; this document uses the term Designated Community to c...
ated, other definitions are taken from the OAIS Reference Model (reference [1]). Access Policy: Written statement, authorized by the repository management, that describes the approach to be taken by the repository for providing access to objects accessioned into the repository. The Access Policy may distinguish bet...
measured by logs or other evidence that record actions completed. Preservation Implementation Plan: A written statement, authorized by the management of the repository, that describes the services to be offered by the repository for preserving objects accessioned into the repository in accordance with the Preservat...
th preservation. The Preservation Strategic Plan states how the mission will be achieved, in general terms with goals and objectives. The Preservation Policy then declares the range of approaches that the repository will employ to ensure preservation (that is, to implement the Preservation Strategic Plan), and fi...
documents, a different distribution of subjects between documents, different document names, etc. Preservation Policy: Written statement, authorized by the repository management, that describes the approach to be taken by the repository for the preservation of objects AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL...
Plan: A written statement, authorized by the management of the repository, that states the goals and objectives for achieving that part of the mission of the repository concerned with preservation. Preservation Strategic Plans may include long-term and short-term plans. Procedure: A written statement that specifies...
led. Provider (or Submitter): A person or system that submits a digital object to the repository. The Provider can be the Producer. Repository Mission Statement: A written statement, authorized by the management of the repository, that, among other things, describes the commitment of the organization for the stewa...
imply a binding and verifiable specification; b) the word ‘should’ implies an optional, but desirable, specification; c) the word ‘may’ implies an optional specification; d) the words ‘is’, ‘are’, and ‘will’ imply statements of fact. NOTE – These conventions do not imply constraints on diction in text that is clear...
intended to help clarify and elucidate their superior item. Satisfaction of the sub-metrics provides evidence supporting a claim of compliance with the hierarchically superior items. – Each metric has one or more of the following informative pieces of text associated with it: • Supporting Text: giving an explana...
It Is Meeting This Requirement: providing examples of the evidence which might be examined to test whether the repository satisfies the metric; • Discussion: clarifications about the intent of the metric. 1.6 CONFORMANCE An archive that conforms to this Recommended Practice shall have satisfied the auditor on ...
tion of auditors’ guidelines, as described in the draft ISO 16919. As described in the referenced ISO documents, the aim of the audit process is to create a process of continuous improvement. Thus the outcome of the audit will not be a simple yes/no but rather a judgment about areas that need improvement. 1.7 REF...
ted were valid. All documents are subject to revision, and users of this Recommended Practice are encouraged to investigate the possibility of applying the most recent editions of the documents indicated below. The CCSDS Secretariat maintains a register of currently valid CCSDS documents. [1] Reference Model fo...
as ISO 14721:2003.] NOTE – Informative references are listed in annex B. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 2-1 September 2011 2 OVERVIEW OF AUDIT AND CERTIFICATION CRITERIA This section provides an overview of some of the key concepts that are incorporated in the...
ssion to provide reliable, long-term access to managed digital resources to its Designated Community, now and into the future’ (reference [B2]). Expanding the definition has caused great discussion both within and across various groups, from the broad digital preservation community to the data archives or institutio...
ions and strategy implementation will be required of repositories to carry out their mission of digital preservation. All of these present an expensive, complex undertaking that depositors, stakeholders, funders, the Designated Community, and other digital repositories will need to rely on in the greater collaborat...
rency—will engender more trust, and additional objective audits, potentially leading towards certification, will promote further trust in the repository and the system that supports it. Finally, attaining trustworthy status is not a one-time accomplishment, achieved and forgotten. To retain trustworthy status, a re...
of Ways the Repository Can Demonstrate It Is Meeting This Requirement: providing examples of the evidence which might be examined to test whether the repository satisfies the metric. These examples are illustrative rather than prescriptive, and the lists of possible evidence are not exhaustive. 2.3 RELEVANT STAN...
omplementary audit tools. A few examples: – The ISO 9000 family of standards (e.g., Quality Management Systems— Fundamentals and Vocabulary—reference [B9]) addresses quality assurance components within an organization and system management that, while valuable, were not specifically developed to gauge the trustwort...
eference [B10]) was developed specifically to address data security and information management systems. Like ISO 9000, it has some very valuable components to it but it was not designed to address the trustworthiness of digital repositories. Its requirements for information security seek data security compliance to...
nd ISO 15489-2:2001 (references [B11] and [B12]) define a systematic and process-driven approach that governs the practice of records managers and any person who creates or uses records during their business activities, treats information contained in records as a valuable resource and business asset, and protects/...
anagement, but, by design, addresses records management specifically rather than applying to all types of repositories and archives. – Finally, ISO 14721:2003, the Open Archival Information System Reference Model, provides a high-level reference model or framework identifying the participants in digital preservatio...
o acknowledge that there is real value in knowing whether an institution is certified to related standards or meets other controls that would be relevant to an audit. Certainly, an institution that has undertaken any kind of certification process—even if none of the evaluated components overlap with a digital reposi...
during the digital repository audit. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 3-1 September 2011 3 ORGANIZATIONAL INFRASTRUCTURE 3.1 GOVERNANCE AND ORGANIZATIONAL VIABILITY 3.1.1 The repository shall have a mission statement that reflects a commitment to the preserva...
access at the repository’s highest administrative level. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Mission statement or charter of the repository or its parent organization that specifically addresses or implicitly calls for the preservation of information and/or other resource...
ent and access to information and/or other resources under its purview. Discussion The repository’s or its parent organization’s mission statement should explicitly address preservation. If preservation is not among the primary purposes of an organization that houses a digital repository then preservation may not ...
as a university or a government agency, and its narrower mission may be formalized through policies explicitly adopted and approved by the larger organization. Government agencies and other organizations may have legal mandates that require they preserve materials, in which case these mandates can be substituted f...
3.1.2 The repository shall have a Preservation Strategic Plan that defines the approach the repository will take in the long-term support of its mission. Supporting Text This is necessary in order to help the repository make administrative decisions, shape policies, and allocate resources in order to successfully p...
which have been made. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 3-2 September 2011 Discussion The strategic plan should be based on the organization’s established mission, and on its defined values, vision and goals. Strategic plans typically cover a particular finite time ...
s to operate or the governing or funding institution substantially changes its scope. Supporting Text This is necessary in order to preserve the information content entrusted to the repository by handing it on to another custodian in the case that the repository ceases to operate. Examples of Ways the Repository C...
sitory, and the steps taken and to be taken to ensure continuity; escrow of critical code, software, and metadata sufficient to enable reconstitution of the repository and its content in the event of repository failure; escrow and/or reserve funds set aside for contingencies; explicit agreements with successor orga...
e rights necessary to ensure continuity of the content and repository services. Discussion A repository’s failure threatens the long-term sustainability of a repository’s information content. It is not sufficient for the repository to have an informal plan or policy regarding where its data goes should a failure oc...
tingency plans, and/or escrow arrangements. Supporting Text This is necessary in order to ensure that the repository can recognize when it is necessary to execute those plans. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Administrative policies, procedures, protocols, requirements...
ES CCSDS 652.0-M-1 Page 3-3 September 2011 Discussion The management of a repository should have formal procedures in place to periodically check on the viability of the repository. This periodic check should be used to determine if, or when, to execute the repository’s formal succession plan, contingency plans,...
ss to. Supporting Text This is necessary in order that the repository has guidance on acquisition of digital content it will preserve, retain, manage and provide access to. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Collection policy and supporting documents; Preservation Policy...
supports the broader mission of the repository. Without such a policy the repository is likely to collect in a haphazard manner, or store large amounts of low-value digital content. The collection policy helps the organization to identify what digital content it will and will not accept for ingestion. In an organiza...
AL STRUCTURE AND STAFFING 3.2.1 The repository shall have identified and established the duties that it needs to perform and shall have appointed staff with adequate skills and experience to fulfill these duties. Discussion Staffing of the repository should be by personnel with the required training and skills to ...
that the repository is defining and maintaining the skills and roles that are required for the sustained operation of the repository. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 3-4 September 2011 3.2.1.1 The repository shall have identified and established the duties that it...
ects. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement A staffing plan; competency definitions; job descriptions; staff professional development plans; certificates of training and accreditation; plus evidence that the repository reviews and maintains these documents as requirements ev...
reements. In order to ensure long-term sustainability, a repository must be aware of all required activities and demonstrate that it can successfully complete them. The repository can achieve these aims by, for example, identifying the competencies and skill sets required to carry out its activities over time—e.g.,...
necessary in order to ensure repository staffing levels are adequate for preserving the digital content and providing a secure, quality repository. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Organizational charts; definitions of roles and responsibilities; comparison of staffing l...
itory should also demonstrate how it evaluates staff effectiveness and suitability to support its functions and services. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 3-5 September 2011 3.2.1.3 The repository shall have in place an active professional development program that ...
ocedures change. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Professional development plans and reports; training requirements and training budgets, documentation of training expenditures (amount per staff); performance goals and documentation of staff assignments and achievements...
repository must ensure that its staff’s skill sets evolve. Ideally the repository will meet this requirement through a lifelong learning approach to developing and retaining staff. 3.3 PROCEDURAL ACCOUNTABILITY AND PRESERVATION POLICY FRAMEWORK Documentation assures stakeholders (consumers, producers, and contri...
ects its Mission Statement and Strategic Plan and captures its normal activities. This entails documenting all repository processes, decision-making, and goal setting. Documentation is provided so that the activities of the repository will be understood by stakeholders and management. It ensures that repository pol...
epository’s sound and standards-based practice, is facilitated by procedural accountability and documentation. 3.3.1 The repository shall have defined its Designated Community and associated knowledge base(s) and shall have these definitions appropriately accessible. Supporting Text This is necessary in order that...
of the Designated Community. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 3-6 September 2011 Discussion The Designated Community is defined as ‘an identified group of potential Consumers who should be able to understand a particular set of information. The Designated Communit...
Designated Community definitions include: – General English-reading public educated to high school and above, with access to a Web Browser (HTML 4.0 capable). – For Geographic Information System (GIS) data: GIS researchers—undergraduates and above—having an understanding of the concepts of Geographic data and havi...
h as FITSIO, familiar with astronomical spectrographic instruments. – Student of Middle English with an understanding of Text Encoding Initiative (TEI) encoding and access to an XML rendering environment. • Variant 1: Cannot understand TEI; • Variant 2: Cannot understand TEI and no access to XML rendering enviro...
he publishers of scholarly journals and their readers, each of whom have different rights to access material and different services offered to them. Some repositories may call themselves, for example, a ‘dark archive’, an archive that has a policy not to allow consumers to get access to its contents for a certain pe...
Supporting Text This is necessary in order to ensure that the repository can fulfill that part of its mission related to preservation. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Preservation Policies; Repository Mission Statement. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL ...
example, a preservation strategic plan may contain a requirement that the repository ‘comply with current preferred preservation standards’. The preservation policy might then require that the repository ‘monitor current preservation standards and ensure repository compliance with the preferred preservation standar...
of understandability by the repository’s Designated Community for each Archival Information Package. 3.3.2.1 The repository shall have mechanisms for review, update, and ongoing development of its Preservation Policies as the repository grows and as technology and community practice evolve. Supporting Text This ...
. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Current and past written documentation in the form of Preservation Policies, Preservation Strategic Plans and Preservation Implementation Plans, procedures, protocols, and workflows; specifications of review cycles for documentation; d...
n Preservation Policies capture organizational commitments and intents for staffing, security and other preservation-related concerns. Preservation Implementation Plans address preservation activities and practices such as transfer, submission, quality control, storage management, metadata management, and access an...
ized way) in order to document the results of monitoring for new developments, showing the repository’s responsiveness to prevailing standards and practice, emerging requirements, and standards that are specific to the domain, if appropriate, and similar developments. Qualified staff and peers are an important part ...
ion Policies and procedures must be demonstrated to be understandable and implementable. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 3-8 September 2011 3.3.3 The repository shall have a documented history of the changes to its operations, procedures, software, and hardware. ...
n Demonstrate It Is Meeting This Requirement Capital equipment inventories; documentation of the acquisition, implementation, update, and retirement of critical repository software and hardware; file retention and disposal schedules and policies, copies of earlier versions of policies and procedures; minutes of mee...
sitory practices and workflow should be available. 3.3.4 The repository shall commit to transparency and accountability in all actions supporting the operation and management of the repository that affect the preservation of digital content over time. Supporting Text This is necessary because transparency, in the ...
y Can Demonstrate It Is Meeting This Requirement Reports of financial and technical audits and certifications; disclosure of governance documents, independent program reviews, and contracts and agreements with providers of funding and critical services. Discussion If the repository uses software to capture informa...