Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Source(s):
FIPS 200
under INTEGRITY
from
44 U.S.C., Sec. 3542
NIST SP 800-12 Rev. 1
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-137
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-160 Vol. 1
under integrity (information)
from
EGovAct
NIST SP 800-172
from
44 U.S.C., Sec. 3552
NIST SP 800-172A
from
44 U.S.C., Sec. 3552
NIST SP 800-18 Rev. 1
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-30 Rev. 1
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-37 Rev. 2
NIST SP 800-39
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-53 Rev. 5
from
PL 113-283 (FISMA)
NIST SP 800-53A Rev. 5
from
PL 113-283 (FISMA)
NIST SP 800-53B
from
PL 113-283 (FISMA)
NIST SP 800-60 Vol. 1 Rev. 1
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-60 Vol. 2 Rev. 1
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-82 Rev. 2
under Integrity
from
NIST SP 800-53
NIST SP 800-171 Rev. 2
from
44 U.S.C., Sec. 3552
NIST Privacy Framework Version 1.0
under Integrity
from
44 U.S.C., Sec. 3542
NISTIR 7621 Rev. 1
under Integrity
CNSSI 4009-2015
[Superseded]
from
44 U.S.C., Sec. 3542
NIST SP 800-171 Rev. 1
[Superseded]
from
44 U.S.C., Sec. 3542
NIST SP 800-37 Rev. 1
[Superseded]
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-53 Rev. 4
[Superseded]
under Integrity
from
44 U.S.C., Sec. 3542
NIST SP 800-53A Rev. 4
[Superseded]
under Integrity
from
44 U.S.C., Sec. 3542
The term 'integrity' means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Source(s):
NIST SP 800-59
under Integrity
from
44 U.S.C., Sec. 3542 (b)(1)(A)
The property that data or information have not been altered or destroyed in an unauthorized manner.
Source(s):
NIST SP 800-66 Rev. 1
under Integrity
from
45 C.F.R., Sec. 164.304
The ability to detect even minute changes in the data.
Source(s):
NIST SP 800-113
under Integrity
A property whereby data has not been altered in an unauthorized manner since it was created, transmitted, or stored.
Source(s):
NIST SP 800-152
under Integrity
NIST SP 800-175B Rev. 1
under Data integrity
NIST SP 800-57 Part 1 Rev. 5
under Data integrity
NIST SP 800-57 Part 2 Rev.1
under Data integrity
NIST SP 800-57 Part 2
[Superseded]
under Data integrity
The property that received data has not been altered.
Source(s):
NIST SP 800-38B
under Integrity
See Data integrity.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Integrity (also, assurance of integrity)
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Integrity (also, Assurance of integrity)
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Integrity (also, Assurance of integrity)
A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored.
Source(s):
NIST SP 800-56B Rev. 2
under Integrity
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Data integrity
In the general information security context (as defined in [NIST SP 800-53]): guarding against improper modification; includes ensuring information non-repudiation and authenticity.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Integrity
In a cryptographic context: the property that sensitive data has not been modified or deleted in an unauthorized and undected manner since it was created, transmitted or stored.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Integrity
the quality of an IT system that reflects the logical correctness and reliability of the operating system; the logical completeness of the hardware and software that implements the protection mechanisms; and the consistency of the data structures and occurrence of the stored data.
Source(s):
NIST SP 800-16
under Integrity
The property that data has not been modified or deleted in an unauthorized and undetected manner.
Source(s):
NIST SP 800-175B Rev. 1
under Integrity
A property possessed by data items that have not been altered in an unauthorized manner since they were created, transmitted, or stored.
Source(s):
NIST SP 800-133 Rev. 2
under Data integrity
The state that exists when computerized data is the same as that in the source documents and has not been exposed to accidental or malicious alteration or destruction.
Source(s):
NISTIR 5153
under Integrity
from
DoD 5200.28-STD
The property that data has not been altered or destroyed in an unauthorized manner.
Source(s):
NISTIR 5153
under Integrity
from
ISO DIS 10181-2
The prevention of the unauthorized modification of information.
Source(s):
NISTIR 5153
under Integrity
from
ITSEC Ver. 1.2
The property of information that exists when data has been modified only in a specified and authorized manner (e.g., not modified or destroyed in an accidental or unauthorized, intentional manner).
Source(s):
NISTIR 4734
under Integrity
Preservation of the original quality and accuracy of data in written or electronic form.
Source(s):
NISTIR 7316
under Integrity
measures an attacker’s ability to manipulate or remove data from a product or system.
Source(s):
NISTIR 7946
under Integrity
A measure of the trust that can be placed in the correctness of the information supplied by a PNT service provider. Integrity includes the ability of the system to provide timely warnings to users when the PNT data should not be used.
Source(s):
NISTIR 8323
under Integrity
from
USG FRP (2021)
Protection against unauthorized modification or destruction of information. [NSTISSI 4009].
A state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.
Source(s):
NIST SP 800-32
[Withdrawn]
under Integrity
from
NSTISSI 4009 - plus note
A property possessed by data items that have not been altered in an unauthorized manner since they were created, transmitted or stored.
Source(s):
NIST SP 800-133
[Superseded]
under Data integrity
NIST SP 800-133 Rev.1
[Superseded]
under Data integrity
The security goal that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation).
Source(s):
NIST SP 800-27 Rev. A
[Withdrawn]
The security objective that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation).
Source(s):
NIST SP 800-33
[Withdrawn]
A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored.
In this Recommendation, the statement that a cryptographic algorithm "provides data integrity" means that the algorithm is used to detect unauthorized alterations.
Source(s):
NIST SP 800-56B Rev. 1
[Superseded]
under Data integrity
Quality of a system or product reflecting the logical correctness and reliability of the operating system; verification that the original contents of information have not been altered or corrupted.
Source(s):
NIST SP 800-70 Rev. 2
[Superseded]
under Integrity
In the general information security context: guarding against improper modification and includes ensuring information non-repudiation and authenticity [SP 800-53].
In a cryptographic context: the property that sensitive data has not been modified or deleted in an unauthorized and undetected manner.
Source(s):
NIST SP 800-57 Part 2
[Superseded]
under Integrity
from
NIST SP 800-53 - plus note
A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored. In this Recommendation, the statement that a cryptographic algorithm "provides data integrity" means that the algorithm is used to detect unauthorized alterations.
Source(s):
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Data integrity