SI-10 Information Accuracy, Completeness, Validity, And Authenticity

System and Information Integrity

Low Moderate High

Description

The information system checks information for accuracy, completeness, validity, and authenticity.

Supplemental Guidance

Checks for accuracy, completeness, validity, and authenticity of information are accomplished as close to the point of origin as possible. Rules for checking the valid syntax of information system inputs (e.g., character set, length, numerical range, acceptable values) are in place to verify that inputs match specified definitions for format and content. Inputs passed to interpreters are prescreened to prevent the content from being unintentionally interpreted as commands. The extent to which the information system is able to check the accuracy, completeness, validity, and authenticity of information is guided by organizational policy and operational requirements.

Enhancements

(0) None.

MITRE ATT&CK Techniques (101)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Initial Access 1 Execution 13 Persistence 18 Privilege Escalation 17 Defense Evasion 45 Credential Access 7 Discovery 1 Lateral Movement 4 Collection 8 Command & Control 6 Exfiltration 5 Impact 8
Show all 101 techniques grouped by tactic

Defense Evasion

Compliance Mappings

COBIT 2019

DSS06

SOC 2 TSC

CC6.6CC6.6-POF2

ISO 42001:2023

A.7.2A.7.4

IEC 62443

3-3 SR 3.5

BSI IT-Grundschutz

APP.3.1

ANSSI

Hygiene.33SecNumCloud.15.3

FINMA Circular 2023/1

IV.D(78)IV.D(80)IV.E(84)

OSFI B-13

B-13.3.2

EU GDPR

Art.5(1)(d)

EU DORA

Art.9(4)(e)

RBI CSF

Annex1.6

FISC Security Guidelines

FISC.T12FISC.T5FISC.T6FISC.T8

LGPD + BCB 4893

BCB.PIX

HKMA TM-E-1

TME1.10.1TME1.3.2

EU CRA

CRA.I.2f

SAMA CSF

3.2

NCA ECC

2-14

UAE IA

T7

CBB TM

TM-7

CBUAE

CR-6

CBE CSF

CTO-4CTO-5

SA JS2

JS2-SA

CBN CSF

Part5.2

BoG CISD

CISD-IXCISD-SDLC

POPIA

s16

BoM CTRM

3.13

IOSCO Cyber Resilience

PROT-3RR-3

BCBS 239

Principle 3Principle 7

FFIEC IS

II.C.17

HIPAA Security Rule

§164.312(c)(1)

SEBI CSCRF

PR.AS

BOT Cyber Resilience

Ch2.5

CMMC 2.0

SI

ISAE 3402

Clause 4

Solvency II

Pillar3-Reporting

Lloyd's Minimum Standards

BP2.2MS1.1MS13.2MS2.1MS5.1MS6.1

PRA SS1/23

P3.2P4.3

FCA SYSC 13

SYSC 13.7.1

HITRUST CSF v11

10.b

FDA 21 CFR Part 11

§11.10(f)

FDA Cybersecurity Guidance

ST-3

OWASP MASVS v2.1

MASVS-PLATFORM-1MASVS-CODE-4

MiCA

Art.68(1)Art.69(1)Art.76(1)

Basel SCO60

SCO60.66

ISO 17799 (legacy)

10.7.312.2.112.2.2

COBIT 4.1 (legacy)

PO2.4AI2.3AI2.4DS11.1DS11.6AC3AC4AC6