Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

5.2.1 - The repository shall maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant.

Introduction

A summary of our practices in relation to our objectives, commitments, and context. May include:

  1. Standards met or industry best practices employed, and their applicability to Scholars Portal; certifications achieved or audits undertaken if applicable
  2. Differences from standards or best practices and our rationale for those differences if applicable
  3. Parties involved in the creation of the document if applicable\

The complete text of the SOMETHING is available through the link below. The SOMETHING fulfills all or part of this criteria by describing SOMETHING, SOMETHING, and SOMETHING. (repeat for all documents linked)

Responsibility

Digital Preservation Policy Librarian - Ensures proper functioning of overall system.

Potential Risks (delete if not needed)

Significant risks, threats, changes, or dependencies that could affect our ability to satisfy this criteria or deliver this service in the future. How are we addressing these risks?

Monitoring Commitments (delete if not needed)

How frequently we intend to monitor the situation or review the document. Mention automated reports if applicable.

Future Plans (delete if not needed)

Things we are planning to do in the future. Things we would like to do in the future.

Relevant Document(s) (delete if not needed)

  1. Document Title (link)

Key Resources Consulted (delete if not needed)

Comprehensive, systematic risk assessment is essential to the long-term security and reliability of SP and its archived information. Risk assessment helps the repository identify and evaluate threats that could disrupt normal operations or impair its ability to meet its Mandatory Responsibilities and contracted obligations. SP began formally documenting and analyzing risks in the fall of 2011. The participants included key personnel from SP, OCUL, and the  University of Toronto Libraries. In many cases, the risk analysis documented threats that librarians, systems administrators, and programmers had already addressed in the design and implementation of the repository.

At present, SP does not employ a third-party code of practice for risk analysis. Instead, SP reviewed risk assessment practices used by a variety of revelant institutions and organizations in order to avoid being 'locked in' to a particular code of practice. Following the review, SP designed a risk analysis model that suited the repository's operating conditions and technical environment.

Please see the Risk Analysis and Management Strategies document for details. This document identifies threats, assesses their probability and potential impact, and provides an overview of the repository's risk-minimization and prevention strategies.

Responsibility

Digital Preservation Policy Librarian

OCUL Executive Director

OCUL Library Directors

Potential Risks

The chief risks associated with risk analysis are (1) failure to review and update the analysis in a timely and consistent manner and (2) failure to acknowledge and analyze foreseeable risks. To minimize the first risk, SP has monitoring commitments in place (see Monitoring Commitments below). To minimize the second risk, SP uses a comprehensive typology of threats as a model for identifying foreseeable and relevant risks (described in the Risk Analysis and Management Strategies document).

Monitoring Commitments

The repository will assess its risk analysis on a regular basis, according to the Review Cycle for Documentation Policy, or whenever there are major changes to its operating environment such as hardware refreshment, significant staffing level changes, or security incidents.

Future Plans

SP recognizes that formal security audits and third-party vulnerability assessments could be valuable.

Relevant Document

  1. Risk Analysis and Management Strategies
  2. Review Cycle for Documentation Policy

...