means of segregating internal from external usage of LC systems needs to be augmented as soon as is feasible in favor of “defense in depth” that incorporates defensive security on the individual computer systems of the Library.
Finding: The Library’s storage pool goals of maintaining current, authoritative information very reliably and keeping track of older material are muddled. The current approach, which entails high-priced storage, makes it prohibitively expensive to put most of the Library online. The disaster recovery plan will nearly double the storage requirements.
Recommendation: The Library should establish disk-based storage for online data and for an online disaster recovery facility using low-cost commodity disks. The Library should also experiment with disk mirroring across a network to two or three distant sites that maintain replicas, for availability and reliability of archives, and use tapes exclusively to hold files that are rarely needed. Some of the resources being spent on installing a separate specialized storage area network for disk sharing should instead be spent on a general, high-performance network for those and other needs.
Finding: The implementation of a robust digital repository is needed to support the Library’s major digital initiatives. The current rate of progress in implementing such a repository is not adequate.
Recommendation: The Library should place a higher priority on implementing an appropriate repository.