Integrity in cybersecurity ensures that data and systems are not altered or tampered with in an unauthorized manner. To protect integrity, controls must verify that data originates from a trusted source and has not been changed.
Digital signatures (D) provide cryptographic proof of data origin and integrity by enabling recipients to verify that the data has not been altered since it was signed.
Firewall egress filtering (A) limits outbound traffic but primarily protects confidentiality and availability, not directly integrity.
Logging IDS alerts (B) supports detection and auditing but is reactive rather than preventive.
Centralized LDAP authentication (C) manages user authentication and access control, mainly protecting confidentiality and accountability.
GICSP highlights digital signatures as a core control to maintain data integrity, especially for firmware, configuration files, and critical commands within ICS.
[Reference:, , GICSP Official Study Guide, Domain: ICS Security Principles, , NIST SP 800-82 Rev 2, Section 6.5 (Information Integrity Controls), , GICSP Training on Cryptographic Controls and Data Integrity]
Submit