text stringlengths 195 512 |
|---|
ng time and can affect other system performance metrics. Repositories should also
consider the obsolescence of any and all hardware components within the repository system
as potential trigger events for migration. Increasingly, long-term, appropriate support for
system hardware components is difficult to obtain, ex... |
o perform media migration off
of some types of media onto better supported media based on the estimated lifetime of
hardware support rather than on the longer life expected from the media. It is important that
the process include a check that the copying has happened correctly.
AUDIT AND CERTIFICATION OF TRUSTWORTH... |
andatory responsibilities.
Supporting Text
This is necessary in order to ensure that the critical processes can be monitored to ensure that
they continue to meet the mandatory responsibilities and to ensure that any changes to those
processes are examined and tested.
Examples of Ways the Repository Can Demonstrate... |
, ingest, and
security processes. Traceability makes it possible to understand which repository processes
are required to meet each of the mandatory responsibilities.
5.1.1.6.1 The repository shall have a documented change management process that
identifies changes to critical processes that potentially affect the ... |
the prior processes that were applied to the repository holdings.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Documentation of change management process; assessment of risk associated with a process
change; analysis of the expected impact of a process change; comparison of logs of... |
storage, ingest, and security. The really important thing is to be able to know what changes
were made and when they were made. Traceability makes it possible to understand what was
affected by particular changes to the systems. If unintended consequences are later
discovered, then having this record may make it p... |
007:2003 which includes
configuration
management
planning,
configuration
identification,
change
control,
configuration status accounting and configuration audit. Configuration Management efforts
should result in a complete audit trail of decisions and design modifications.
AUDIT AND CERTIFICATION OF TRUSTWORT... |
l processes.
Supporting Text
This is necessary in order to protect the integrity of the repository’s critical processes such
that they continue in their ability to meet the repository’s mandatory requirements.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Documented testing procedu... |
where possible, pre-tested separately, the expected
behaviors documented, and roll-back procedures prepared. After changes, the systems should
be monitored for unexpected and unacceptable behavior. If such behavior is discovered the
changes and their consequences should be reversed. Whole-system testing or unit test... |
here no changes are ever evaluated or tested will have problems.
5.1.2 The repository shall manage the number and location of copies of all digital
objects.
Supporting Text
This is necessary in order to assert that the repository is providing an authentic copy of a
particular digital object.
Examples of Ways the ... |
ject on storage systems; provenance and fixity checking
information; location register/log of digital objects compared to the expected number and
location of copies of particular objects.
Discussion
A repository can have different preservation policies for different classes of objects,
depending on factors such as... |
dditional identification requirements if the data integrity
mechanisms use alternative copies to replace failed copies. The location of each digital
object must be described such that the object can be located precisely, without ambiguity.
The location can be an absolute physical location or a logical location withi... |
ing the data must be
maintained/updated, including the identification of those responsible. This is necessary in
order to track chain of custody and assert that the repository is providing an authentic copy of
a particular digital object. The repository must be able to distinguish between versions of
objects or cop... |
e mechanisms in place to ensure any/multiple copies of
digital objects are synchronized.
Supporting Text
This is necessary in order to ensure that multiple copies of a digital object remain identical,
within a time established as acceptable by the repository, and that a copy can be used to
replace a corrupted copy... |
cedures/documentation of synchronization processes.
Discussion
The disaster recovery plan should address what to do should a disaster and an update
coincide. For example, if one copy of an object is altered and a disaster occurs while the
second is being updated, there needs to be a mechanism to assure that the cop... |
ronization is attempted.
5.2
SECURITY RISK MANAGEMENT
5.2.1 The repository shall maintain a systematic analysis of security risk factors
associated with data, systems, personnel, and physical plant.
Supporting Text
This is necessary to ensure ongoing and uninterrupted service to the Designated Community.
Example... |
or control analysis.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-13
September 2011
Discussion
The repository should conduct regular risk assessments and maintain adequate security
protection in order to provide expected and contracted levels of service, following codes of ... |
tion systems are also
significant, as are means to assess personnel, management, and administration procedures,
resources, as well as operations and service delivery. Loss of income, budget and reputation
are significant threats to overall operations as is loss of mandate. On-going internal and
external evaluation ... |
e of required operating funds. Intellectual property rights
practices should also be reviewed regularly as well as the repository’s liability for regulatory
non-compliance as applicable. The repository should assess its staff’s skills against those
required in the evolving digital repository environment and ensure a... |
uality of third party
services. The repository may conduct overall risk assessments with tools such as
DRAMBORA.2
5.2.2 The repository shall have implemented controls to adequately address each of
the defined security risks.
Supporting Text
This is necessary in order to ensure that controls are in place to meet t... |
standards; system
control list; risk, threat, or control analyses; and addition of controls based on ongoing risk
detection and assessment. Repository maintains ISO 17799 certification.
Discussion
The repository should show how it has dealt with its security requirements. If some types of
material are more likely... |
or content were affected and describe procedures that have
been put in place to prevent similar occurrences in the future. Repositories may also conduct
2 See http://www.repositoryaudit.eu/.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-... |
ed, updated, and revised
on a regular basis.
5.2.3 The repository staff shall have delineated roles, responsibilities, and
authorizations related to implementing changes within the system.
Supporting Text
This is necessary in order to ensure that individuals have the authority to implement changes,
that adequate ... |
ting This Requirement
Repository employs the codes of practice found in the ISO 27000 series of standards;
organizational chart; system authorization documentation. Repository maintains ISO 17799
certification.
Discussion
Authorizations are about who can do what: who can add users, who has access to change
metada... |
s roles and authorizations, and that there is a consistent view of this across the
organization.
5.2.4 The repository shall have suitable written disaster preparedness and recovery
plan(s), including at least one off-site backup of all preserved information together with
an offsite copy of the recovery plan(s).
Su... |
ent with
limited disruption of services.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Repository employs the codes of practice found in the ISO 27000 series of standards; disaster
and recovery plans; information about and proof of at least one off-site copy of preserved
informatio... |
ation.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-15
September 2011
Discussion
The level of detail in a disaster plan, and the specific risks addressed need to be appropriate
to the repository’s location and service expectations. Fire is an almost universal concern, but
e... |
to a building or widespread illness among critical staff. In the event of a
disaster at the repository, the repository may want to contact local and/or national disaster
recovery bodies for assistance. Repositories may also conduct a variety of disaster drills that
may involve their parent organization or the commu... |
The use of the Audit and Certification Recommended Practice has several potential areas of
security concern.
One security concern is the possibility that the repository is fooled into undergoing an audit
by someone unqualified or even malicious.
Another concern involves the possible release of confidential informa... |
e.
There is a possibility that the person contacted is not in fact the person that the repository
believes him or her to be. Alternatively the correct person may be contacted but in fact
another, possibly malicious, person may turn up to perform the audit.
In the process of collecting evidence for the various metr... |
and expose the
repository to increased risk. Alternatively in the process of collecting evidence the repository
system may be damaged.
While these are all valid security concerns, they fall outside the purview of this
Recommended Practice, which applies only to the metrics which an auditor should use for
auditing... |
to increased risk and loss of reputation of the
repository.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page A-2
September 2011
A4 CONSEQUENCES OF NOT APPLYING SECURITY TO THE TECHNOLOGY
While these security issues are of concern, they are out of scope with respect to this
docum... |
t rely on the repository’s identification and authorization systems. Protection
against loss of confidential information in the possession of the auditor must be provided by
the security system of that auditor and the method of transmission of information which is
agreed between the repository and auditor. Protect... |
RIES
CCSDS 652.0-M-1
Page B-1
September 2011
ANNEX B
REFERENCES
(INFORMATIVE)
[B1] D. Waters and J. Garrett. Preserving Digital Information. Report of the Task Force
on Archiving of Digital Information. Washington, DC: CLIR, May 1996.
[B2] Trusted Digital Repositories: Attributes and Responsibilities. ... |
r-Archive Interface Methodology Abstract Standard. Recommendation for
Space Data System Standards, CCSDS 651.0-M-1. Magenta Book. Issue 1.
Washington, D.C.: CCSDS, May 2004.
[B5] XML
Formatted
Data
Unit
(XFDU)
Structure
and
Construction
Rules.
Recommendation for Space Data System Standards, CCSDS 661.0... |
S 644.0-B-3. Blue Book. Issue 3.
Washington, D.C.: CCSDS, July 2009.
[B7] Data Entity Dictionary Specification Language (DEDSL)—Abstract Syntax
(CCSD0011). Recommendation for Space Data System Standards, CCSDS 647.1-B-
1. Blue Book. Issue 1. Washington, D.C.: CCSDS, June 2001.
[B8] “Digital Preservation Mana... |
ry. International
Standard, ISO 9000:2005. 3rd edition. Geneva: ISO, 2005.
[B10] Information Technology—Security Techniques—Code of Practice for Information
Security Management. International Standard, ISO/IEC 17799:2005. 2nd edition.
Geneva: ISO, 2005.
[B11] Information
and
Documentation—Records
Manage... |
SO/TR 15489-2:2001. Geneva: ISO, 2001.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page B-2
September 2011
[B13] Trustworthy Information Systems Handbook. Version 4. Saint Paul, Minnesota:
Minnesota Historical Society, July 2002.
[B14] Ron Ross, et al. Guide for Assessing the... |
tz, Astrid Schoger, and Stefan Strathmann. “The nestor Catalogue of
Criteria for Trusted Digital Repository Evaluation and Certification.” Journal of
Digital Information 8, no. 2 (2007).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.