Asset & Data Management · AD-Q12

Question: Are controls in place to ensure integrity of critical data (checks, reconciliation, tamper protection, and auditability)?

Objective — Why This Matters

Availability without integrity is dangerous. Integrity controls detect corruption or unauthorized changes early, protecting financials, logs, and safety-critical data from silent tampering.

Maturity Levels (0–5)

0 — Unaware
No integrity checks; issues found only after incidents.
1 — Ad Hoc
Manual spot checks; undocumented reconciliations.
2 — Defined
Integrity policy; checksum or reconciliation defined for critical datasets.
3 — Managed
Automated checks with alerts; WORM for evidence logs; change approval recorded.
4 — Integrated
Dual control for changes; segregation of duties; periodic independent verification.
5 — Optimized
Analytics detect anomalies; lessons learned improve control design.

How to Level Up

From → To Actions
0 → 1 Identify critical datasets (finance, audit logs, configs) and define expected integrity checks.
1 → 2 Document checksum, reconciliation, and verification cadence.
2 → 3 Automate checks and alerts; protect logs with WORM or immutability.
3 → 4 Implement maker-checker approvals and periodic independent verification.
4 → 5 Add anomaly detection and trend analysis to refine thresholds.

People / Process / Technology Enablers

Evidence Required

Metrics / KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Checksums sha256sum / file integrity tools Scheduled verification jobs.
WORM S3 Object Lock / MinIO immutability Evidence-grade retention.
Reconciliation Python scripts + Cron Compare system-of-record to downstream copies.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001 A.8.16 (integrity of information), A.8.15 (logging).
NIST CSF 2.0 PR.DS-6, DE.CM-7.
CERT-In 2022 Evidence protection expectations.
NIRMATA Scoring AD-Q12 Level ≥3 requires automated checks + WORM for evidence + approvals.