GSC Sentinel-2 PDGS SRD - emits - ESA
GSC Sentinel-2 PDGS SRD - emits - ESA
GSC Sentinel-2 PDGS SRD - emits - ESA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>GSC</strong> <strong>Sentinel</strong>-2 <strong>PDGS</strong> <strong>SRD</strong><br />
Issue 1 Revision 2 (draft) - 25.07.2010<br />
GMES-GSEG-EOPG-RD-09-0028<br />
page 66 of 204<br />
S2-<strong>PDGS</strong>-SYS-915<br />
All <strong>PDGS</strong> elements shall be available as stand-alone systems and accessible for testing<br />
purposes through a well defined interface protocol and HMI.<br />
5.1.8 SECURITY REQUIREMENTS<br />
S2-<strong>PDGS</strong>-SEC-005<br />
The <strong>PDGS</strong> shall implement access control mechanisms to any information held inside the<br />
<strong>PDGS</strong> according to the access restriction applicable to the information.<br />
S2-<strong>PDGS</strong>-SEC-010<br />
The <strong>PDGS</strong> shall be able to use secured mechanisms provided through commercial-bestpractice-technology<br />
to support sensible information exchange internally or among its<br />
distributed sites and external interfaces (e.g. with the FOS) (e.g. VPN, peer-to-peer<br />
encryption, https).<br />
S2-<strong>PDGS</strong>-SEC-015<br />
The <strong>PDGS</strong> shall provide automatic tools with the capability to check the <strong>PDGS</strong><br />
software/applications/data for viruses or other malicious code (including location<br />
identification).<br />
S2-<strong>PDGS</strong>-SEC-020<br />
The <strong>PDGS</strong> shall include the functionality to record system activity and security relevant<br />
events including the relationship between user actions and system activity (logging) for<br />
minimum 6 months.<br />
S2-<strong>PDGS</strong>-SEC-025<br />
The logs of all <strong>PDGS</strong> systems shall be synchronised.<br />
S2-<strong>PDGS</strong>-SEC-030<br />
The <strong>PDGS</strong> systems shall provide security mechanisms to prevent accidental and/or<br />
intentional alteration to the configured versions of software and firmware, if any.<br />
S2-<strong>PDGS</strong>-SEC-035<br />
The <strong>PDGS</strong> shall be designed to require positive confirmation of the user/operator for<br />
dangerous commands or the erasure of important data files.<br />
S2-<strong>PDGS</strong>-SEC-040<br />
The <strong>PDGS</strong> shall allow the restriction of access to all its archived data based on user<br />
authentication and authorisation mechanisms.<br />
<strong>ESA</strong> UNCLASSIFIED – For Official Use<br />
© <strong>ESA</strong><br />
The copyright of this document is the property of <strong>ESA</strong>. It is supplied in confidence and shall not be reproduced, copied or<br />
communicated to any third party without written permission from <strong>ESA</strong>.