Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

15. Technical Infrastructure

...

R15. The repository functions on well-supported operating systems and other core infrastructural software and is using hardware and software technologies appropriate to the services it provides to its Designated Community.

Compliance Level:

  • The guideline has been fully implemented for the needs of the repository.

Reference Standards:

Dataverse follows the guidance given in the OAIS reference model across the whole of the archival process. For example, the infrastructure supports separation between the Submission Information Package, Archival Information Package and Dissemination Information Package.

...

  • Citation Metadata: compliant with DDI Lite, DDI 2.5 Codebook, DataCite 3.1, and Dublin Core’s DCMI Metadata Terms (see .tsv version). Language field uses ISO 639-1 controlled vocabulary.

  • Geospatial Metadata: compliant with DDI Lite, DDI 2.5 Codebook, DataCite, and Dublin Core (see .tsv version). Country / Nation field uses ISO 3166-1 controlled vocabulary.

  • Social Science & Humanities Metadata: compliant with DDI Lite, DDI 2.5 Codebook, and Dublin Core (see .tsv version).

  • Astronomy and Astrophysics Metadata : These metadata elements can be mapped/exported to the International Virtual Observatory Alliance’s (IVOA) VOResource Schema format and is based on Virtual Observatory (VO) Discovery and Provenance Metadata (see .tsv version).

  • Life Sciences Metadata: based on ISA-Tab Specification, along with controlled vocabulary from subsets of the OBI Ontology and the NCBI Taxonomy for Organisms (see .tsv version).

  • See also the Dataverse 4.0 Metadata Crosswalk: DDI, DataCite, DC, DCTerms, VO, ISA-Tab document.

    In addition, Dataverse is an open source web application, an application that utilizes the following components:

    o Java(dataverseisaJavaEnterpriseEdition(EE)webapplication) o Glassfish
    o PostgreSQL
    o Solr

    o SMTPserver
    o Persistentidentifierservice o R,rApache,andTwoRavens o Apache
    o Shibboleth

30

...

    • OAuth2

o Geoconnect

There are no significant deviations from the standards.

...

The TDR is hosted by Amazon Web Services. As such, the bandwidth is (likely) sufficient to the TDR’s needs. TDL also adjusts it as needed and we are constantly monitoring usage via Munin.

31

...

16. Security

Technology

R16. The technical infrastructure of the repository provides for protection of the facility and its data, products, services, and users.

Statement of Compliance Level:

  • Implemented: The guideline has been fully implemented for the needs of the repository.

Backup Procedures:

The Texas Digital Library “actively addresses the need to ensure the accuracy, integrity, authenticity, and permanence of the digital content that it manages, as well as the security of the services and platforms that it provides.” The technical infrastructure including the operational servers are located in a secure data center, where only authorized employees have access to the equipment after identification.

...

  • the copy of the data residing on the production server, which is an Amazon S3 volume;

  • nightly snapshots that can be used to restore the entire service to a particular date within the

    preceding month;

  • and one snapshot from each month, retained for one year.

    Information Security

    Backups are stored in Amazon Elastic Block Store (EBS) snapshots, which is replicated storage with regular systematic data integrity checks.

    The AWS cloud spans “55 availability zones.” Geographic distribution increases the chances that a major catastrophe will not lead to total system loss.
    https://aws.amazon.com/security/

    A white paper produced by Amazon in May of 2017, Amazon Web Services: Overview of Security Processes, discusses, among other topics, both physical and operational security processes as well as business continuity and disaster planning.

...

https://d0.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf

...