5.1.1 Identify and manage the risks to its preservation operations and goals associated with system infrastructure
From CLOCKSS Trusted Digital Repository Documents
5.1.1 - The repository shall identify and manage the risks to its preservation operations and goals associated with system infrastructure.
The Threat Model section of CLOCKSS: Threats and Mitigations sets out the threat model upon which the LOCKSS technology was based, which was published in D-Lib in 2005. The Mitigation Strategy section of CLOCKSS: Threats and Mitigations sets out the approach the LOCKSS technology uses to mitigate these threats, and the additional mitigations employed by the CLOCKSS archive.