5.2.2 Implemented controls to adequately address each of the defined security risks

From CLOCKSS Trusted Digital Repository Documents
Revision as of 16:11, 23 September 2013 by Dshr (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

5.2.2 -The repository shall have implemented controls to adequately address each of the defined security risks.

The mitigations implemented for each of the threats in the LOCKSS threat model are described in CLOCKSS: Threats and Mitigations.

Relevant Documents

  1. CLOCKSS: Threats and Mitigations
  2. Requirements for Digital Preservation Systems: A Bottom-Up Approach