Pages Under TDR 5.0 Infrastructure and Security Risk Management
- 5.1.1 Identify and manage the risks to its preservation operations
- 5.1.1.1 Employ technology watches
- 5.1.1.1.2 Procedures in place to monitor and receive notifications
- 5.1.1.1.3 Procedures in place to evaluate when changes are needed
- 5.1.1.1.4 Procedures, commitment and funding to replace hardware
- 5.1.1.1.5 Software technologies appropriate to the services
- 5.1.1.1.6 Procedures in place to monitor and receive notifications when software changes are needed
- 5.1.1.1.7 Procedures in place to evaluate when changes are needed to current software
- 5.1.1.1.8 Procedures, commitment and funding to replace software when evaluation indicates the need to do so
- 5.1.1.2 The repository shall have adequate hardware and software support for backup functionality sufficient for preserving the repository content and tracking repository functions.
- 5.1.1.3 Effective mechanisms to detect bit corruption or loss
- 5.1.1.3.1 Record and report to its administration all incidents of data corruption or loss, and steps shall be taken to repair/replace
- 5.1.1.4 Process to record and react to the availability of new security updates based on a risk-benefit assessment
- 5.1.1.5 Defined processes for storage media and/or hardware change (e.g., refreshing, migration)
- 5.1.1.6 Identified and documented critical processes that affect its ability to comply with its mandatory responsibilities
- 5.1.1.6.1 Documented change management process that identifies changes to critical processes that potentially affect the repository’s ability to comply
- 5.1.1.6.2 Process for testing and evaluating the effect of changes to the repository’s critical processes document
- 5.1.2 Manage the number and location of copies of all digital objects document
- 5.1.2.1 Mechanisms in place to ensure any/multiple copies of digital objects are synchronized document
- 5.2.1 Maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant document
- 5.2.2 Implemented controls to adequately address each of the defined security risks
- 5.2.3 Staff shall have delineated roles, responsibilities, and authorizations related to implementing changes
- 5.2.4 Suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information