text
stringlengths
195
512
ng time and can affect other system performance metrics. Repositories should also consider the obsolescence of any and all hardware components within the repository system as potential trigger events for migration. Increasingly, long-term, appropriate support for system hardware components is difficult to obtain, ex...
o perform media migration off of some types of media onto better supported media based on the estimated lifetime of hardware support rather than on the longer life expected from the media. It is important that the process include a check that the copying has happened correctly. AUDIT AND CERTIFICATION OF TRUSTWORTH...
andatory responsibilities. Supporting Text This is necessary in order to ensure that the critical processes can be monitored to ensure that they continue to meet the mandatory responsibilities and to ensure that any changes to those processes are examined and tested. Examples of Ways the Repository Can Demonstrate...
, ingest, and security processes. Traceability makes it possible to understand which repository processes are required to meet each of the mandatory responsibilities. 5.1.1.6.1 The repository shall have a documented change management process that identifies changes to critical processes that potentially affect the ...
the prior processes that were applied to the repository holdings. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Documentation of change management process; assessment of risk associated with a process change; analysis of the expected impact of a process change; comparison of logs of...
storage, ingest, and security. The really important thing is to be able to know what changes were made and when they were made. Traceability makes it possible to understand what was affected by particular changes to the systems. If unintended consequences are later discovered, then having this record may make it p...
007:2003 which includes configuration management planning, configuration identification, change control, configuration status accounting and configuration audit. Configuration Management efforts should result in a complete audit trail of decisions and design modifications. AUDIT AND CERTIFICATION OF TRUSTWORT...
l processes. Supporting Text This is necessary in order to protect the integrity of the repository’s critical processes such that they continue in their ability to meet the repository’s mandatory requirements. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Documented testing procedu...
where possible, pre-tested separately, the expected behaviors documented, and roll-back procedures prepared. After changes, the systems should be monitored for unexpected and unacceptable behavior. If such behavior is discovered the changes and their consequences should be reversed. Whole-system testing or unit test...
here no changes are ever evaluated or tested will have problems. 5.1.2 The repository shall manage the number and location of copies of all digital objects. Supporting Text This is necessary in order to assert that the repository is providing an authentic copy of a particular digital object. Examples of Ways the ...
ject on storage systems; provenance and fixity checking information; location register/log of digital objects compared to the expected number and location of copies of particular objects. Discussion A repository can have different preservation policies for different classes of objects, depending on factors such as...
dditional identification requirements if the data integrity mechanisms use alternative copies to replace failed copies. The location of each digital object must be described such that the object can be located precisely, without ambiguity. The location can be an absolute physical location or a logical location withi...
ing the data must be maintained/updated, including the identification of those responsible. This is necessary in order to track chain of custody and assert that the repository is providing an authentic copy of a particular digital object. The repository must be able to distinguish between versions of objects or cop...
e mechanisms in place to ensure any/multiple copies of digital objects are synchronized. Supporting Text This is necessary in order to ensure that multiple copies of a digital object remain identical, within a time established as acceptable by the repository, and that a copy can be used to replace a corrupted copy...
cedures/documentation of synchronization processes. Discussion The disaster recovery plan should address what to do should a disaster and an update coincide. For example, if one copy of an object is altered and a disaster occurs while the second is being updated, there needs to be a mechanism to assure that the cop...
ronization is attempted. 5.2 SECURITY RISK MANAGEMENT 5.2.1 The repository shall maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant. Supporting Text This is necessary to ensure ongoing and uninterrupted service to the Designated Community. Example...
or control analysis. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 5-13 September 2011 Discussion The repository should conduct regular risk assessments and maintain adequate security protection in order to provide expected and contracted levels of service, following codes of ...
tion systems are also significant, as are means to assess personnel, management, and administration procedures, resources, as well as operations and service delivery. Loss of income, budget and reputation are significant threats to overall operations as is loss of mandate. On-going internal and external evaluation ...
e of required operating funds. Intellectual property rights practices should also be reviewed regularly as well as the repository’s liability for regulatory non-compliance as applicable. The repository should assess its staff’s skills against those required in the evolving digital repository environment and ensure a...
uality of third party services. The repository may conduct overall risk assessments with tools such as DRAMBORA.2 5.2.2 The repository shall have implemented controls to adequately address each of the defined security risks. Supporting Text This is necessary in order to ensure that controls are in place to meet t...
standards; system control list; risk, threat, or control analyses; and addition of controls based on ongoing risk detection and assessment. Repository maintains ISO 17799 certification. Discussion The repository should show how it has dealt with its security requirements. If some types of material are more likely...
or content were affected and describe procedures that have been put in place to prevent similar occurrences in the future. Repositories may also conduct 2 See http://www.repositoryaudit.eu/. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-...
ed, updated, and revised on a regular basis. 5.2.3 The repository staff shall have delineated roles, responsibilities, and authorizations related to implementing changes within the system. Supporting Text This is necessary in order to ensure that individuals have the authority to implement changes, that adequate ...
ting This Requirement Repository employs the codes of practice found in the ISO 27000 series of standards; organizational chart; system authorization documentation. Repository maintains ISO 17799 certification. Discussion Authorizations are about who can do what: who can add users, who has access to change metada...
s roles and authorizations, and that there is a consistent view of this across the organization. 5.2.4 The repository shall have suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information together with an offsite copy of the recovery plan(s). Su...
ent with limited disruption of services. Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement Repository employs the codes of practice found in the ISO 27000 series of standards; disaster and recovery plans; information about and proof of at least one off-site copy of preserved informatio...
ation. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page 5-15 September 2011 Discussion The level of detail in a disaster plan, and the specific risks addressed need to be appropriate to the repository’s location and service expectations. Fire is an almost universal concern, but e...
to a building or widespread illness among critical staff. In the event of a disaster at the repository, the repository may want to contact local and/or national disaster recovery bodies for assistance. Repositories may also conduct a variety of disaster drills that may involve their parent organization or the commu...
The use of the Audit and Certification Recommended Practice has several potential areas of security concern. One security concern is the possibility that the repository is fooled into undergoing an audit by someone unqualified or even malicious. Another concern involves the possible release of confidential informa...
e. There is a possibility that the person contacted is not in fact the person that the repository believes him or her to be. Alternatively the correct person may be contacted but in fact another, possibly malicious, person may turn up to perform the audit. In the process of collecting evidence for the various metr...
and expose the repository to increased risk. Alternatively in the process of collecting evidence the repository system may be damaged. While these are all valid security concerns, they fall outside the purview of this Recommended Practice, which applies only to the metrics which an auditor should use for auditing...
to increased risk and loss of reputation of the repository. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page A-2 September 2011 A4 CONSEQUENCES OF NOT APPLYING SECURITY TO THE TECHNOLOGY While these security issues are of concern, they are out of scope with respect to this docum...
t rely on the repository’s identification and authorization systems. Protection against loss of confidential information in the possession of the auditor must be provided by the security system of that auditor and the method of transmission of information which is agreed between the repository and auditor. Protect...
RIES CCSDS 652.0-M-1 Page B-1 September 2011 ANNEX B REFERENCES (INFORMATIVE) [B1] D. Waters and J. Garrett. Preserving Digital Information. Report of the Task Force on Archiving of Digital Information. Washington, DC: CLIR, May 1996. [B2] Trusted Digital Repositories: Attributes and Responsibilities. ...
r-Archive Interface Methodology Abstract Standard. Recommendation for Space Data System Standards, CCSDS 651.0-M-1. Magenta Book. Issue 1. Washington, D.C.: CCSDS, May 2004. [B5] XML Formatted Data Unit (XFDU) Structure and Construction Rules. Recommendation for Space Data System Standards, CCSDS 661.0...
S 644.0-B-3. Blue Book. Issue 3. Washington, D.C.: CCSDS, July 2009. [B7] Data Entity Dictionary Specification Language (DEDSL)—Abstract Syntax (CCSD0011). Recommendation for Space Data System Standards, CCSDS 647.1-B- 1. Blue Book. Issue 1. Washington, D.C.: CCSDS, June 2001. [B8] “Digital Preservation Mana...
ry. International Standard, ISO 9000:2005. 3rd edition. Geneva: ISO, 2005. [B10] Information Technology—Security Techniques—Code of Practice for Information Security Management. International Standard, ISO/IEC 17799:2005. 2nd edition. Geneva: ISO, 2005. [B11] Information and Documentation—Records Manage...
SO/TR 15489-2:2001. Geneva: ISO, 2001. AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES CCSDS 652.0-M-1 Page B-2 September 2011 [B13] Trustworthy Information Systems Handbook. Version 4. Saint Paul, Minnesota: Minnesota Historical Society, July 2002. [B14] Ron Ross, et al. Guide for Assessing the...
tz, Astrid Schoger, and Stefan Strathmann. “The nestor Catalogue of Criteria for Trusted Digital Repository Evaluation and Certification.” Journal of Digital Information 8, no. 2 (2007).