A3.2 Repository has procedures and policies in place, and mechanisms for their review, update, and development as the repository grows and as technology and community practice evolve.
The policies and procedures of the repository must be complete, written or available in a tangible form,
remain current, and must evolve to reflect changes in requirements and practice. The repository must
demonstrate that a policy and procedure audit and maintenance is in place and regularly applied. Policies
and procedures should address core areas, including, for example, transfer requirements, submission,
quality control, storage management, disaster planning, metadata management, access, rights
management, preservation strategies, staffing, and security. High-level documents should make
organizational commitments and intents clear. Lower-level documents should make day-to-day practice
and procedure clear. Versions of these documents must be well managed by the repository (e.g., outdated
versions are clearly identified or maintained offline) and qualified staff and peers must be involved in
reviewing, updating, and extending these documents. The repository should be able to document the
results of monitoring for relevant developments; responsiveness to prevailing standards and practice,
emerging requirements, and standards that are specific to the domain, if appropriate; and similar
developments. The repository should be able to demonstrate that it has defined "comprehensive
documentation" for the repository. See Appendix 3: Minimum Required Documents for more
Evidence: Written documentation in the form of policies, procedures, protocols, rules, manuals,
handbooks, and workflows; specification of review cycle for documentation; documentation
detailing review, update, and development mechanisms. If documentation is embedded in system
logic, functionality should demonstrate the implementation of policies and procedures.
A deliverable for a recent contract was something the client called an information system security plan. Our understanding was that in past contracts this was always understood to be a short document (2-3 pages) that summarized ICPSR's IT systems, and described the measures taken by ICPSR to protect them from unauthorized use. No big deal, right?
In this most recent contract the security plan implementation details changed; rather than a brief summary document, the requirement was now two-fold.
The first deliverable consisted of a document showing the Federal Information Processing Standards (FIPS) categorization of the risks associated with our IT systems. This document was based on a standard known as FIPS Publication 199. It turns out that this methodology and level of documentation is relatively lightweight.
In brief, one asserts one of three levels (Low, Medium, High) of risk. There was never a question of asserting High risk, and so the choice as to select either Low or Medium. We worked with the University of Michigan's central IT security office, and based on the type of data preserved at ICPSR, they recommended that we select Low.
The second part required us to document the security controls defined by the National Institute of Standards and Technology related to a FIPS-199 categorization of Low risk. This standard is described in NIST Special Publication 800-53, and requires a very high level of documentation. (The standard is very heavy on policy and documentation, but very light on measurement and audit, and therefore some critics believe that this is a major flaw in the approach.)
Our NIST 800-53 security control documentation ran nearly 200 pages(!), and this page-count does not include documents which are required, but external, to 800-53. For example, if 800-53 requires one to assert that there is a policy on topic X, one does not need to include the policy within the 800-53 security controls documentation, but it does require one to write the policy on topic X (if it does not already exist). And so between the 800-53 controls and the external documents, our guess is that this ran well over 250 pages.
And so we are very well supplied with policies and procedures, and we even have the documentation to prove it now.