Integrity of information refers to protecting information from being modified by unauthorized parties
This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labelling claims to be, or assuring that a computer program is a trusted one.
Common terms used for the delivery of security testing:
M Martellini, & Malizia, A. (2017). Cyber and chemical, biological, radiological, nuclear, explosives challenges : threats and counter efforts. Springer. ↩
"Introduction to Information Security" US-CERT https://www.us-cert.gov/security-publications/introduction-information-security https://www.us-cert.gov/security-publications/introduction-information-security ↩
"Container Security Verification Standard". GitHub. 20 July 2022. https://github.com/OWASP/Container-Security-Verification-Standard ↩
"Infrastructure as Code Security - OWASP Cheat Sheet Series". https://cheatsheetseries.owasp.org/cheatsheets/Infrastructure_as_Code_Security_Cheat_Sheet.html ↩
"OWASP DevSecOps Guideline - v-0.2 | OWASP Foundation". https://owasp.org/www-project-devsecops-guideline/latest/02c-Interactive-Application-Security-Testing ↩
"Component Analysis | OWASP Foundation". https://owasp.org/www-community/Component_Analysis ↩