5.2.2 Implemented controls to adequately address each of the defined security risks
From CLOCKSS Trusted Digital Repository Documents
5.2.2 -The repository shall have implemented controls to adequately address each of the defined security risks.
The mitigations implemented for each of the threats in the LOCKSS threat model are described in CLOCKSS: Threats and Mitigations.