T 2.76 Inadequate documentation of archive accesses

Just like for other IT systems, there are manipulation options for archive systems if these are protected poorly. Users may try to store falsified documents to the archive and to assign these documents to existing administrative procedures by entering the corresponding context information or to falsify completely new procedures. System administrators may perform manipulations bypassing the archive system and hide the manipulation by changing the log files.

Normally, log files are considered less important than the documents to be archived. This is often manifested in shorter retention periods for log files and in the less careful handling of log files.

If archived documents are to be incorporated into later administrative procedures, it is absolutely necessary to be able to verify their authenticity, i.e. to be able to differentiate correct from manipulated documents, and to be able to verify the document history in the event of controversial documents. This is endangered by

If the documents to be archived are classified according to confidentiality levels, it must always be possible to trace who viewed the documents at which time. This is no longer guaranteed if read accesses and search queries are not documented.

Examples: