text
stringlengths 195
512
|
---|
ng time and can affect other system performance metrics. Repositories should also
consider the obsolescence of any and all hardware components within the repository system
as potential trigger events for migration. Increasingly, long-term, appropriate support for
system hardware components is difficult to obtain, exposing repositories to risks and
liabilities should they choose to continue to operate the hardware beyond the manufacturer or
third-party support warranties. Repositories will likely need t |
o perform media migration off
of some types of media onto better supported media based on the estimated lifetime of
hardware support rather than on the longer life expected from the media. It is important that
the process include a check that the copying has happened correctly.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-10
September 2011
5.1.1.6 The repository shall have identified and documented critical processes that
affect its ability to comply with its m |
andatory responsibilities.
Supporting Text
This is necessary in order to ensure that the critical processes can be monitored to ensure that
they continue to meet the mandatory responsibilities and to ensure that any changes to those
processes are examined and tested.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Traceability matrix between processes and mandatory requirements.
Discussion
Examples of critical processes include data management, access, archival storage |
, ingest, and
security processes. Traceability makes it possible to understand which repository processes
are required to meet each of the mandatory responsibilities.
5.1.1.6.1 The repository shall have a documented change management process that
identifies changes to critical processes that potentially affect the repository’s ability to
comply with its mandatory responsibilities.
Supporting Text
This is necessary in order to ensure that the repository can specify not only the current
processes, but |
the prior processes that were applied to the repository holdings.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Documentation of change management process; assessment of risk associated with a process
change; analysis of the expected impact of a process change; comparison of logs of actual
changes to processes versus associated analyses of their impact and criticality.
Discussion
Examples of this would include changes to processes for data management, access, archival |
storage, ingest, and security. The really important thing is to be able to know what changes
were made and when they were made. Traceability makes it possible to understand what was
affected by particular changes to the systems. If unintended consequences are later
discovered, then having this record may make it possible to reverse the changes or at least to
document the changes that were introduced. Change management is a component of the
broader topic of configuration management described by ISO 10 |
007:2003 which includes
configuration
management
planning,
configuration
identification,
change
control,
configuration status accounting and configuration audit. Configuration Management efforts
should result in a complete audit trail of decisions and design modifications.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-11
September 2011
5.1.1.6.2 The repository shall have a process for testing and evaluating the effect of
changes to the repository’s critica |
l processes.
Supporting Text
This is necessary in order to protect the integrity of the repository’s critical processes such
that they continue in their ability to meet the repository’s mandatory requirements.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Documented testing procedures; documentation of results from prior tests and proof of
changes made as a result of tests; analysis of the impact of a process change.
Discussion
Changes to critical systems should be, |
where possible, pre-tested separately, the expected
behaviors documented, and roll-back procedures prepared. After changes, the systems should
be monitored for unexpected and unacceptable behavior. If such behavior is discovered the
changes and their consequences should be reversed. Whole-system testing or unit testing can
address this requirement; complex safety-type tests are not required. Testing can be very
expensive, but there should be some recognition of the fact that a completely open regime
w |
here no changes are ever evaluated or tested will have problems.
5.1.2 The repository shall manage the number and location of copies of all digital
objects.
Supporting Text
This is necessary in order to assert that the repository is providing an authentic copy of a
particular digital object.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Random retrieval tests; validation of object existence for each registered location; validation
of a registered location for each ob |
ject on storage systems; provenance and fixity checking
information; location register/log of digital objects compared to the expected number and
location of copies of particular objects.
Discussion
A repository can have different preservation policies for different classes of objects,
depending on factors such as the producer, the information type, or its value. Repositories
may require a different number of copies for each class, or manage versions needed to meet
access requirements. There may be a |
dditional identification requirements if the data integrity
mechanisms use alternative copies to replace failed copies. The location of each digital
object must be described such that the object can be located precisely, without ambiguity.
The location can be an absolute physical location or a logical location within a storage media
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-12
September 2011
or a storage subsystem. Provenance information about copying and mov |
ing the data must be
maintained/updated, including the identification of those responsible. This is necessary in
order to track chain of custody and assert that the repository is providing an authentic copy of
a particular digital object. The repository must be able to distinguish between versions of
objects or copies and identical copies. This is necessary in order that a repository can assert
that it is providing an authentic copy of the correct version of an object.
5.1.2.1 The repository shall hav |
e mechanisms in place to ensure any/multiple copies of
digital objects are synchronized.
Supporting Text
This is necessary in order to ensure that multiple copies of a digital object remain identical,
within a time established as acceptable by the repository, and that a copy can be used to
replace a corrupted copy of the object.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Synchronization workflows; system analysis of how long it takes for copies to synchronize;
pro |
cedures/documentation of synchronization processes.
Discussion
The disaster recovery plan should address what to do should a disaster and an update
coincide. For example, if one copy of an object is altered and a disaster occurs while the
second is being updated, there needs to be a mechanism to assure that the copy will be
updated at the first available opportunity. The mechanisms to synchronize copies of digital
objects should be able to detect bit corruption and validate fixity checks before
synch |
ronization is attempted.
5.2
SECURITY RISK MANAGEMENT
5.2.1 The repository shall maintain a systematic analysis of security risk factors
associated with data, systems, personnel, and physical plant.
Supporting Text
This is necessary to ensure ongoing and uninterrupted service to the Designated Community.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Repository employs the codes of practice found in the ISO 27000 series of standards system
control list; risk, threat, |
or control analysis.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-13
September 2011
Discussion
The repository should conduct regular risk assessments and maintain adequate security
protection in order to provide expected and contracted levels of service, following codes of
practice such as ISO 27000.
‘System’ here refers to more than IT systems, such as hardware, software, communications
equipment and facilities, and firewalls. Fire protection and flood detec |
tion systems are also
significant, as are means to assess personnel, management, and administration procedures,
resources, as well as operations and service delivery. Loss of income, budget and reputation
are significant threats to overall operations as is loss of mandate. On-going internal and
external evaluation should be conducted to assess quality of service and relevance to user
community served and periodic financial audits should be secured to ascertain ethical and
legal practice and maintenanc |
e of required operating funds. Intellectual property rights
practices should also be reviewed regularly as well as the repository’s liability for regulatory
non-compliance as applicable. The repository should assess its staff’s skills against those
required in the evolving digital repository environment and ensure acquisition of new staff or
retraining of existing staff as necessary. Regular risk assessment should also address external
threats and denial of service attacks and loss of or unacceptable q |
uality of third party
services. The repository may conduct overall risk assessments with tools such as
DRAMBORA.2
5.2.2 The repository shall have implemented controls to adequately address each of
the defined security risks.
Supporting Text
This is necessary in order to ensure that controls are in place to meet the security needs of the
repository.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Repository employs the codes of practice found in the ISO 27000 series of |
standards; system
control list; risk, threat, or control analyses; and addition of controls based on ongoing risk
detection and assessment. Repository maintains ISO 17799 certification.
Discussion
The repository should show how it has dealt with its security requirements. If some types of
material are more likely to be attacked, the repository will need to provide more protection,
for instance. Repositories that have experienced incidents could record such instances,
including the times when systems |
or content were affected and describe procedures that have
been put in place to prevent similar occurrences in the future. Repositories may also conduct
2 See http://www.repositoryaudit.eu/.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-14
September 2011
a variety of disaster drills that may involve their parent organization or the community at
large. Contingency plans are especially important and need to be test |
ed, updated, and revised
on a regular basis.
5.2.3 The repository staff shall have delineated roles, responsibilities, and
authorizations related to implementing changes within the system.
Supporting Text
This is necessary in order to ensure that individuals have the authority to implement changes,
that adequate resources have been assigned for the effort, and that the responsible individuals
will be accountable for implementing such changes.
Examples of Ways the Repository Can Demonstrate It Is Mee |
ting This Requirement
Repository employs the codes of practice found in the ISO 27000 series of standards;
organizational chart; system authorization documentation. Repository maintains ISO 17799
certification.
Discussion
Authorizations are about who can do what: who can add users, who has access to change
metadata, who can access audit logs. It is important that authorizations are justified, that staff
understand what they are authorized to do, that staff have required skills associated with
variou |
s roles and authorizations, and that there is a consistent view of this across the
organization.
5.2.4 The repository shall have suitable written disaster preparedness and recovery
plan(s), including at least one off-site backup of all preserved information together with
an offsite copy of the recovery plan(s).
Supporting Text
This is necessary in order to ensure that sufficient backup and recovery capabilities are in
place to facilitate continuing preservation of and access to systems and their cont |
ent with
limited disruption of services.
Examples of Ways the Repository Can Demonstrate It Is Meeting This Requirement
Repository employs the codes of practice found in the ISO 27000 series of standards; disaster
and recovery plans; information about and proof of at least one off-site copy of preserved
information; service continuity plan; documentation linking roles with activities; local
geological, geographical, or meteorological data or threat assessments. Repository maintains
ISO 17799 certific |
ation.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page 5-15
September 2011
Discussion
The level of detail in a disaster plan, and the specific risks addressed need to be appropriate
to the repository’s location and service expectations. Fire is an almost universal concern, but
earthquakes may not require specific planning at all locations. The disaster plan must,
however, deal with unspecified situations that would have specific consequences, such as
lack of access |
to a building or widespread illness among critical staff. In the event of a
disaster at the repository, the repository may want to contact local and/or national disaster
recovery bodies for assistance. Repositories may also conduct a variety of disaster drills that
may involve their parent organization or the community at large.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page A-1
September 2011
ANNEX A
SECURITY CONSIDERATIONS
(INFORMATIVE)
A1 INTRODUCTION
|
The use of the Audit and Certification Recommended Practice has several potential areas of
security concern.
One security concern is the possibility that the repository is fooled into undergoing an audit
by someone unqualified or even malicious.
Another concern involves the possible release of confidential information which is collected
as evidence by the auditor.
A2 SECURITY CONCERNS WITH RESPECT TO THE CCSDS DOCUMENT
The repository may ask someone to perform an audit using this Recommended Practic |
e.
There is a possibility that the person contacted is not in fact the person that the repository
believes him or her to be. Alternatively the correct person may be contacted but in fact
another, possibly malicious, person may turn up to perform the audit.
In the process of collecting evidence for the various metrics the auditor may collect
information which is confidential or sensitive, for example details of security weaknesses.
There is a danger that such information may fall into the wrong hands |
and expose the
repository to increased risk. Alternatively in the process of collecting evidence the repository
system may be damaged.
While these are all valid security concerns, they fall outside the purview of this
Recommended Practice, which applies only to the metrics which an auditor should use for
auditing a repository.
A3 POTENTIAL THREATS AND ATTACK SCENARIOS
Impersonation of an auditor and/or release of confidential information could both result in
exposing the repository and its holdings |
to increased risk and loss of reputation of the
repository.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page A-2
September 2011
A4 CONSEQUENCES OF NOT APPLYING SECURITY TO THE TECHNOLOGY
While these security issues are of concern, they are out of scope with respect to this
document. This document aims to provide the basis for an audit and certification process for
assessing the trustworthiness of digital repositories. Providing protection against false
auditors mus |
t rely on the repository’s identification and authorization systems. Protection
against loss of confidential information in the possession of the auditor must be provided by
the security system of that auditor and the method of transmission of information which is
agreed between the repository and auditor. Protection against damage to the repository or its
holdings during an audit must rely on the security and safety systems of the repository.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITO |
RIES
CCSDS 652.0-M-1
Page B-1
September 2011
ANNEX B
REFERENCES
(INFORMATIVE)
[B1] D. Waters and J. Garrett. Preserving Digital Information. Report of the Task Force
on Archiving of Digital Information. Washington, DC: CLIR, May 1996.
[B2] Trusted Digital Repositories: Attributes and Responsibilities. An RLG-OCLC Report.
Mountain View, CA: RLG, May 2002.
[B3] Trustworthy Repositories Audit & Certification: Criteria and Checklist. Version 1.0.
Chicago: CRL, February 2007.
[B4] Produce |
r-Archive Interface Methodology Abstract Standard. Recommendation for
Space Data System Standards, CCSDS 651.0-M-1. Magenta Book. Issue 1.
Washington, D.C.: CCSDS, May 2004.
[B5] XML
Formatted
Data
Unit
(XFDU)
Structure
and
Construction
Rules.
Recommendation for Space Data System Standards, CCSDS 661.0-B-1. Blue Book.
Issue 1. Washington, D.C.: CCSDS, September 2008.
[B6] The Data Description Language EAST Specification (CCSD0010). Recommendation
for Space Data System Standards, CCSD |
S 644.0-B-3. Blue Book. Issue 3.
Washington, D.C.: CCSDS, July 2009.
[B7] Data Entity Dictionary Specification Language (DEDSL)—Abstract Syntax
(CCSD0011). Recommendation for Space Data System Standards, CCSDS 647.1-B-
1. Blue Book. Issue 1. Washington, D.C.: CCSDS, June 2001.
[B8] “Digital Preservation Management: Implementing Short-Term Strategies for Long-
Term Problems.” Digital Preservation Management Resources. Cornell University.
[B9] Quality Management Systems—Fundamentals and Vocabula |
ry. International
Standard, ISO 9000:2005. 3rd edition. Geneva: ISO, 2005.
[B10] Information Technology—Security Techniques—Code of Practice for Information
Security Management. International Standard, ISO/IEC 17799:2005. 2nd edition.
Geneva: ISO, 2005.
[B11] Information
and
Documentation—Records
Management—Part
1:
General.
International Standard, ISO 15489-1:2001. Geneva: ISO, 2001.
[B12] Information and Documentation—Records Management—Part 2: Guidelines.
International Standard, I |
SO/TR 15489-2:2001. Geneva: ISO, 2001.
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES
CCSDS 652.0-M-1
Page B-2
September 2011
[B13] Trustworthy Information Systems Handbook. Version 4. Saint Paul, Minnesota:
Minnesota Historical Society, July 2002.
[B14] Ron Ross, et al. Guide for Assessing the Security Controls in Federal Information
Systems. National Institute of Standards and Technology Special Publication 800-
53A. Gaithersburg, Maryland: NIST, July 2008.
[B15] Susanne Dobra |
tz, Astrid Schoger, and Stefan Strathmann. “The nestor Catalogue of
Criteria for Trusted Digital Repository Evaluation and Certification.” Journal of
Digital Information 8, no. 2 (2007).
|