<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Integrity</id>
		<title>Integrity - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Integrity"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Integrity&amp;action=history"/>
		<updated>2026-04-20T18:11:24Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Integrity&amp;diff=195212&amp;oldid=prev</id>
		<title>MelDrews: Initial page creation with control description</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Integrity&amp;diff=195212&amp;oldid=prev"/>
				<updated>2015-05-24T21:33:52Z</updated>
		
		<summary type="html">&lt;p&gt;Initial page creation with control description&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Data and system integrity is one of the primary goals of security, which is why we see it reflected in the common litany of C-I-A (Confidentiality, Integrity and Availability). Within the STRIDE threat modeling approach, tampering directly attacks information integrity and controls preventing spoofing and repudiation support integrity requirements.&lt;br /&gt;
&lt;br /&gt;
Data integrity controls guard against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.&lt;br /&gt;
&lt;br /&gt;
U.S. National Institute of Standards and Technology (NIST) Special Publication 800-53 includes the following controls that address integrity and may be directly reflected within software implementations:&lt;br /&gt;
*Tamper resistance and detection (SA-18)&lt;br /&gt;
*Transmission confidentiality and integrity (SC-8)&lt;br /&gt;
*Protection of information at rest (SC-28)&lt;br /&gt;
*Software, firmware and information integrity (SI-7)&lt;br /&gt;
*Information input validation (SI-10)&lt;br /&gt;
*Memory protection (SI-16)&lt;br /&gt;
&lt;br /&gt;
Accuracy of data processing and transmissions is a critical business requirement, both for decision support processes and for regulatory compliance reasons (Sarbanes-Oxley).&lt;br /&gt;
&lt;br /&gt;
ISO 27001:2013 includes controls related to correct processing within applications in the System acquisition, development and maintenance group.&lt;br /&gt;
&lt;br /&gt;
#Hernan, S., Lambert, S., Ostwald, T., and Shostack, A. ''Uncover Security Design Flaws Using the STRIDE Approach''.  MSDN Magazine.  Microsoft.  (2006). https://msdn.microsoft.com/en-us/magazine/cc163519.aspx&lt;br /&gt;
# Joint Task Force Transformation Initiative. ''Security and Privacy Controls for Federal Information Systems and Organizations''. Special Publication 800-53 revision 4. (2013) U.S. National Institute of Standards and Technology. http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;br /&gt;
#ISO/IEC 27001:2013. Wikipedia. Retrieved from http://en.wikipedia.org/wiki/ISO/IEC_27001:2013 on 25 May 2015.&lt;/div&gt;</summary>
		<author><name>MelDrews</name></author>	</entry>

	</feed>