Revision Security

What is Revision Security and which criteria are essential?

The history of artefacts

The term Revision Security refers to the archiving of information and documents that must or should be retained. In dealing with these information and documents, revision security addresses structured processes, proper use, secure operation and proof of procedural documentation. In addition, Revision Security includes the verifiability of the procedure used for storing information and documents, including the technical aids used (the electronic archive systems).

In Germany, electronic archiving systems must meet the requirements of the German Commercial Code (§§ 239, 257 HGB), the German Tax Code (§§ 146, 147 AO), the principles of proper management and storage of books, records and documents in electronic form as well as data access (GoBD) and other tax and commercial law requirements.

Criteria for revision security

The following criteria are essential for the revision security:

  • regularity
  • completeness
  • traceability
  • auditability
  • safety of the overall process
  • protection against change and falsification
  • protection against loss
  • use only by authorised persons
  • compliance with retention periods
  • documentation of the procedure

Distinction to traceability and IT compliance

Revision Security differs from the terms Traceability and IT Compliance. In a system or software development process, Revision Security is understood as tracing back the history of artefacts, while Traceability represents the relationship between artefacts and IT compliance, i.e. compliance with processes and standards. All three terms are important, for example, in the development of security-critical software.

What does t2informatik do?

t2informatik - We develop software for great companies

Notes:

Here you will find additional information from our Smartpedia section:

Smartpedia: What types of Traceability exist?

What types of Traceability exist?

Smartpedia: In which areas does IT Compliance apply?

In which areas does IT Compliance apply?