Difference between revisions of "5.2.2 Implemented controls to adequately address each of the defined security risks"

From CLOCKSS Trusted Digital Repository Documents
Jump to: navigation, search
(Created page with "== 5.2.2 -The repository shall have implemented controls to adequately address each of the defined security risks. == The mitigations implemented for each of the threats in t...")
 

Latest revision as of 16:11, 23 September 2013

5.2.2 -The repository shall have implemented controls to adequately address each of the defined security risks.

The mitigations implemented for each of the threats in the LOCKSS threat model are described in CLOCKSS: Threats and Mitigations.

Relevant Documents

  1. CLOCKSS: Threats and Mitigations
  2. Requirements for Digital Preservation Systems: A Bottom-Up Approach