Integrity
The information security objective of integrity refers to ensuring that information is correct, consistent and trustworthy and that it has not been altered or tampered with in an unauthorised manner. Integrity is one of the cornerstones of information security, along with confidentiality and availability. Important key aspects of integrity are:
Data accuracy
Ensuring that data remains accurate and consistent throughout its lifecycle. This means that information should be recorded and stored as intended, without any unintentional or unauthorised changes.
Data consistency
Data must remain consistent across different systems and databases. If data is duplicated or stored in multiple locations, integrity ensures that all versions of the data are identical and synchronised.
Protection against unauthorised changes
Prevent unauthorised users or processes from changing data. Integrity controls help ensure that changes to data are made only by authorised persons and that they are logged and tracked.
Detection of unauthorised changes
Implement mechanisms to detect unauthorised or accidental changes to data. This may include checksums, hash functions or cryptographic signatures that provide a way to verify that data has not been altered.
Ensuring correct processing
Ensuring that data is processed correctly by applications and systems, without errors or corruption. This includes validating input data, ensuring that processing algorithms work as intended, and protecting data from corruption or unauthorised modification during processing.
Ensuring that data is processed correctly by applications and systems, without errors or corruption. This includes validating input data, ensuring that processing algorithms work as intended, and protecting data from corruption or unauthorised modification during processing.