On Mon, Mar 17, 2014 at 04:03:28PM -0500, Shazia Sathar wrote:
> The DSpace instance I am working on will be used to facilitate data sharing
> of very sensitive information, for example, identifiable health-related
> information. Hence, there is a need to make it a very secure application. I
> am in the process of obtaining information on what needs to be done in
> order to make it secure- server configurations, application configuration,
> database security, etc.

You will want everyone behind a good firewall, then.  Most of the work
on DSpace is done with open access in mind.  Reasonable attention is
paid to access control, but I don't think this has ever been
thoroughly audited.

To be honest, if it were my project I would not use DSpace for highly
sensitive information just yet.  (I don't know what I *would*
recommend.)

A possible work-around would be to store only assets which are already
encrypted.  If the metadata are not themselves sensitive information
then this might be workable.

> Currently,  I have setup the application on one server and the database on
> another. Upon reading the dspace documentation, however, I figured that the
> assetstore directory contains the uploaded data.
> 
> 1.  Any ideas on how I can secure this directory? Is it possible to
> retrieve the item if the directory gets compromised or does the database
> have some key which is required to retrieve the item?

Assets are not encrypted by DSpace.  They are scattered through a
moderately deep tree of subdirectories, by means of a well-known
hashing function of their content.  The database holds the
relationship.  So it's difficult to find a specific asset without
using the product, but not difficult at all to read or copy anything
you find.  Your only real defense here is to prevent shell access by
untrusted people.  (And, as usual, physical access means Game Over.)

> 2. Does it make more sense to move the assetstore directory to a secure
> location? If yes, how can I go about doing this? Since the database will
> have login credentials for all registered users, and the fact that
> registered users have access to the protected information, should I
> consider keeping the assetstore directory and database separated from where
> the application resides?

If you are going that detailed, we need to know your threat model.

> 3. Any configuration settings on Apache httpd and tomcat other than making
> dspace run on https?

Make sure that HTTPD does not itself give anyone access to the
assetstore.  Likewise Tomcat.

> 4. How can I perform an audit on the system? For example, get a list of
> users who downloaded a particular item.

All access is logged to [DSpace]/log/dspace.log* .  There are a lot of
other records in there too, but the code contains examples of dredging
specific kinds of information out of the log.

-- 
Mark H. Wood, Lead System Programmer   mw...@iupui.edu
Machines should not be friendly.  Machines should be obedient.

Attachment: signature.asc
Description: Digital signature

------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and their
applications. Written by three acclaimed leaders in the field,
this first edition is now available. Download your free book today!
http://p.sf.net/sfu/13534_NeoTech
_______________________________________________
DSpace-tech mailing list
DSpace-tech@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspace-tech
List Etiquette: https://wiki.duraspace.org/display/DSPACE/Mailing+List+Etiquette

Reply via email to