Integrity

Security Operations 🛡️ • Security+ 🏆 • Difficulty: free

Definition

Integrity ensures that data and systems remain accurate, complete, and unaltered except by authorized, intentional, and documented changes.

Examples

  • A software update is validated with a vendor’s digital signature so the package cannot be tampered with without detection.
  • A financial database enforces transaction rules and audit logs so unauthorized edits are blocked and all approved changes are traceable.

Overview

Integrity is the second pillar of the CIA Triad. It focuses on keeping information trustworthy by preventing unauthorized or accidental modification and by making any legitimate changes transparent and traceable. In practice, integrity underpins decisions, compliance, and safety: if records, logs, or software can be silently altered, you cannot rely on outcomes, investigations, or controls. Integrity protections span people, processes, and technology, from strict change management to cryptographic verification.

Open the interactive lesson Browse more topics

Tip: The interactive version includes progress tracking, decks, and premium deep dives.