5.2.2 Implemented controls to adequately address each of the defined security risks

From CLOCKSS Trusted Digital Repository Documents
Jump to: navigation, search

5.2.2 -The repository shall have implemented controls to adequately address each of the defined security risks.

The mitigations implemented for each of the threats in the LOCKSS threat model are described in CLOCKSS: Threats and Mitigations.

Relevant Documents

  1. CLOCKSS: Threats and Mitigations
  2. Requirements for Digital Preservation Systems: A Bottom-Up Approach