PR.DS-06
Does your organization implement integrity checking mechanisms to verify the authenticity and integrity of software, firmware, and information?
Explanation
Integrity checking mechanisms help ensure that software, firmware, and information have not been tampered with or corrupted, either accidentally or maliciously. These mechanisms typically use cryptographic hashes, digital signatures, or checksums to verify that data remains unchanged from its original state. Without proper integrity verification, unauthorized modifications could introduce vulnerabilities, backdoors, or other security issues into your systems. Evidence of compliance could include documentation of implemented integrity checking tools and processes (such as file integrity monitoring systems), logs showing regular integrity verification activities, code signing certificates and procedures, or configuration files for tools that perform hash verification before software installation or updates.
Context
- Function
- PR: PROTECT
- Category
- PR.DS: Data Security
- Sub-Category
- Integrity checking mechanisms are used to verify software, firmware, and information integrity

