Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

Download the Final Practice Guide

The NCCoE has released the final NIST Cybersecurity Practice Guide SP 1800-26, Detecting and Responding to Ransomware and Other Destructive Events. Use the button below to view this publication in its entirety or scroll down for links to a specific section.

Download PDF » Open Web Version »

Current Status

The National Cybersecurity Center of Excellence (NCCoE) has released the final National Institute of Standards and Technology (NIST) Cybersecurity Special Publication (SP) 1800-26, Detecting and Responding to Ransomware and Other Destructive Events. 

SP 1800-26 comprises the following volumes:

  • SP 1800-26A: Executive Summary (PDF) (web page)

  • SP 1800-26B: Approach, Architecture, and Security Characteristics (PDF) (web page)

  • SP 1800-26C: How-To-Guides (PDF) (web page)

Or download the complete guide (PDF) (web page).

Cybersecurity White Paper

The NCCoE has released Securing Data Integrity Against Ransomware Attacks: Using the NIST Cybersecurity Framework and NIST Cybersecurity Practice Guides, a white paper that provides an overview of the three Data Integrity projects and how they align with the NIST Cybersecurity Framework. This paper offers a high-level explanation of the architecture and capabilities, and it explains how these projects can be brought together into one comprehensive data integrity solution. 


The National Cybersecurity Center of Excellence (NCCoE) at NIST proposed a project that could help organizations detect and respond to data integrity events across multiple industries. This project includes the development of a reference design and uses commercially available technologies to develop an example solution that will help various organizations implement stronger security controls.

Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to an organization’s infrastructure. Database records and structure, system files, configurations, user files, application code, and customer data are all at risk should an attack occur. 

Organizations that do not implement detection and response solutions leave themselves at risk for many types of data integrity attacks. These risks could be reduced using capabilities such as:

  • integrity monitoring
  • event detection
  • vulnerability management
  • reporting capabilities
  • mitigation and containment

This project focuses on detailed methods and potential tool sets that can detect, mitigate, and contain data integrity events in the components of an enterprise network. It also identifies tools and strategies to aid in a security team’s response to such an event. The scope of the project answers specific questions pertaining to detecting and responding to data integrity events. 

To read a brief overview of the project, please download our fact sheet.

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Glasswall Solutions logo
Micro Focus logo
Tripwire logo