Organizations’ data, such as database records, system files, configurations, user files, applications, and customer data, are all potential targets of data corruption, modification, and destruction. In the stages prior to an attack, companies must be able to identify their infrastructure and develop a protection capability. During a data integrity attack, companies must be able to detect the occurrence and respond in accordance with their response plan. Lastly, after an attack the company must be able to effectively and efficiently recover. In accordance to this methodology, the NCCoE has developed three data integrity projects that are dedicated to solving businesses most pressing cybersecurity challenges.
If you have questions or would like to join our Community of Interest, please email the project team at email@example.com.
Exploring methods to effectively identify and protect assets against data integrity attacks. Learn more about this project.
Detailing methods and potential tool sets that can detect, mitigate, and contain data integrity events. Learn more about this project.
Effectively recover from a data corruption event in various Information Technology (IT) enterprise environments. Learn more about this project and download the NIST Cybersecurity Practice Guide 1800-11.