Data Integrity, Data Security, and the New NIST Cybersecurity Framework

Dec 5, 2023
Share this post
Sharing to FacebookSharing to LinkedInSharing to XSharing to Email

Data security and integrity are two critical concepts in the world of cybersecurity. While they are often discussed together, they have distinct definitions and implications. Data security encompasses the processes and technical safeguards established to preserve data integrity, as well as confidentiality and availability of data. In this article, we will dive into the details of what data integrity and data security entail, how they are related, and the importance of protecting against data integrity attacks. Additionally, we will discuss the recent draft update of the NIST Cybersecurity Framework (CSF) 2.0, a comprehensive tool that reflects the evolving cybersecurity landscape and offers valuable guidance for ensuring data integrity and security across all organizations.

Data Integrity

Data integrity is defined by the Committee on National Security Systems as “the property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner.” In other words, it refers to the accuracy, completeness, and consistency of data throughout its lifecycle. To maintain data integrity, then, an organization must ensure that data remains unchanged, and any modifications to data are authorized, recorded, and properly tracked. Data integrity is essential for data quality, as it helps to ensure that data is reliable, trustworthy, and can be used for sound decision-making.

Data Security

In order to protect an organization from a data integrity loss event, the data must be properly secured. Data security refers to the measures taken to protect data from unauthorized access, use, disclosure, modification, or destruction. Data security involves a range of practices and technologies that, at each stage of the life cycle of the data, from collection until its destruction, prevent unauthorized access to data, such as encryption, access controls, firewalls, and intrusion detection systems. Data security cares about more than protecting the data’s integrity; it must also ensure its confidentiality and availability. 

NIST Cybersecurity Framework 2.0

NIST has recently overhauled its Cybersecurity Framework (CFS), first released almost a decade ago, and published a draft for public commentary. The 2.0 version reflects a number of major changes to the NIST CSF Version 1.1. For example, it expands the framework's scope from protecting critical infrastructure to providing cybersecurity for all organizations regardless of type or size. Also, a new "govern" function has been added to emphasize that cybersecurity is a major source of enterprise risk, ranking alongside legal, financial, and other risks as considerations for senior leadership. The new function outlines the process by which an organization formulates and implements internal decisions to bolster its cybersecurity approach. We can expect enhanced guidance and sector-specific examples of implementation measures aiding with the management of cybersecurity risks.

Source: DRAFT NIST Cybersecurity Framework 2.0

Protecting Against Data Integrity Attacks 

Many different attacks to systems and data are possible and the NIST Framework applies to them broadly. But applied specifically to a data integrity attack, three phases can be distinguished: (1) identify assets and implement protections, (2) discover data integrity incidents, and (3) recover from the incident. 

An example of an action that must be taken in phase one is limiting access and permissions to an organization’s data to only those roles within the business that require access in order to perform their functions, which is an effective way to minimize the potential for accidental modification of data. The fewer people that are permitted to alter the data, the less likely that is to happen.

Phase two requires sophisticated tools to detect an occurring attack. By continuously comparing what has been determined as the ”normal state” with the status quo, any deviations can be surfaced and assessed to identify an attack. This phase is not particular to integrity attacks only.

A key data security measure that is geared towards recovering from a data integrity attack is having in place reliable backup systems. In case an unauthorized change, destruction, or loss of data has occurred, the data can be restored to its uncompromised form from the backup. These backup systems should enable recovery from sufficiently long ago to allow restoring data in instances where the data has been corrupted without being detected for a while. Some ransomware attacks start months before security experts become aware of them, by which time their recent backups might all be corrupt.

Conclusion

Data integrity cannot be achieved without data security, but the latter protects against broader attacks than just unauthorized change, destruction, and loss. In particular, the confidentiality and availability of data are likewise under the umbrella of data security. Private AI is first and foremost geared towards protecting personal information, which is an aspect of the broader mandate of data security, which protects all data and needs to understand the types of information that needs protecting. Personal information is a particularly sensitive corporate asset and privacy legislation requires data security measures to be implemented for its protection. One measure that Private AI is a global leader in is the redaction of personal data in unstructured data. If all else fails, it is most comforting to know that an intruder will not be able to reap any benefits from the data they gained access to because it is de-identified. To see the tech in action, try our web demo, or sign up for an API key to try it yourself on your own data.

Data Left Behind: AI Scribes’ Promises in Healthcare

Data Left Behind: Healthcare’s Untapped Goldmine

The Future of Health Data: How New Tech is Changing the Game

Why is linguistics essential when dealing with healthcare data?

Why Health Data Strategies Fail Before They Start

Private AI to Redefine Enterprise Data Privacy and Compliance with NVIDIA

EDPB’s Pseudonymization Guideline and the Challenge of Unstructured Data

HHS’ proposed HIPAA Amendment to Strengthen Cybersecurity in Healthcare and how Private AI can Support Compliance

Japan's Health Data Anonymization Act: Enabling Large-Scale Health Research

What the International AI Safety Report 2025 has to say about Privacy Risks from General Purpose AI

Private AI 4.0: Your Data’s Potential, Protected and Unlocked

How Private AI Facilitates GDPR Compliance for AI Models: Insights from the EDPB's Latest Opinion

Navigating the New Frontier of Data Privacy: Protecting Confidential Company Information in the Age of AI

Belgium’s Data Protection Authority on the Interplay of the EU AI Act and the GDPR

Enhancing Compliance with US Privacy Regulations for the Insurance Industry Using Private AI

Navigating Compliance with Quebec’s Act Respecting Health and Social Services Information Through Private AI’s De-identification Technology

Unlocking New Levels of Accuracy in Privacy-Preserving AI with Co-Reference Resolution

Strengthened Data Protection Enforcement on the Horizon in Japan

How Private AI Can Help to Comply with Thailand's PDPA

How Private AI Can Help Financial Institutions Comply with OSFI Guidelines

The American Privacy Rights Act – The Next Generation of Privacy Laws

How Private AI Can Help with Compliance under China’s Personal Information Protection Law (PIPL)

PII Redaction for Reviews Data: Ensuring Privacy Compliance when Using Review APIs

Independent Review Certifies Private AI’s PII Identification Model as Secure and Reliable

To Use or Not to Use AI: A Delicate Balance Between Productivity and Privacy

To Use or Not to Use AI: A Delicate Balance Between Productivity and Privacy

News from NIST: Dioptra, AI Risk Management Framework (AI RMF) Generative AI Profile, and How PII Identification and Redaction can Support Suggested Best Practices

Handling Personal Information by Financial Institutions in Japan – The Strict Requirements of the FSA Guidelines

日本における金融機関の個人情報の取り扱い - 金融庁ガイドラインの要件

Leveraging Private AI to Meet the EDPB’s AI Audit Checklist for GDPR-Compliant AI Systems

Who is Responsible for Protecting PII?

How Private AI can help the Public Sector to Comply with the Strengthening Cyber Security and Building Trust in the Public Sector Act, 2024

A Comparison of the Approaches to Generative AI in Japan and China

Updated OECD AI Principles to keep up with novel and increased risks from general purpose and generative AI

Is Consent Required for Processing Personal Data via LLMs?

The evolving landscape of data privacy legislation in healthcare in Germany

The CIO’s and CISO’s Guide for Proactive Reporting and DLP with Private AI and Elastic

The Evolving Landscape of Health Data Protection Laws in the United States

Comparing Privacy and Safety Concerns Around Llama 2, GPT4, and Gemini

How to Safely Redact PII from Segment Events using Destination Insert Functions and Private AI API

WHO’s AI Ethics and Governance Guidance for Large Multi-Modal Models operating in the Health Sector – Data Protection Considerations

How to Protect Confidential Corporate Information in the ChatGPT Era

Unlocking the Power of Retrieval Augmented Generation with Added Privacy: A Comprehensive Guide

Leveraging ChatGPT and other AI Tools for Legal Services

Leveraging ChatGPT and other AI tools for HR

Leveraging ChatGPT in the Banking Industry

Law 25 and Data Transfers Outside of Quebec

The Colorado and Connecticut Data Privacy Acts

Unlocking Compliance with the Japanese Data Privacy Act (APPI) using Private AI

Tokenization and Its Benefits for Data Protection

Private AI Launches Cloud API to Streamline Data Privacy

Processing of Special Categories of Data in Germany

End-to-end Privacy Management

Privacy Breach Reporting Requirements under Law25

Migrating Your Privacy Workflows from Amazon Comprehend to Private AI

A Comparison of the Approaches to Generative AI in the US and EU

Benefits of AI in Healthcare and Data Sources (Part 1)

Privacy Attacks against Data and AI Models (Part 3)

Risks of Noncompliance and Challenges around Privacy-Preserving Techniques (Part 2)

Enhancing Data Lake Security: A Guide to PII Scanning in S3 buckets

The Costs of a Data Breach in the Healthcare Sector and its Privacy Compliance Implications

Navigating GDPR Compliance in the Life Cycle of LLM-Based Solutions

What’s New in Version 3.8

How to Protect Your Business from Data Leaks: Lessons from Toyota and the Department of Home Affairs

New York's Acceptable Use of AI Policy: A Focus on Privacy Obligations

Safeguarding Personal Data in Sentiment Analysis: A Guide to PII Anonymization

Changes to South Korea’s Personal Information Protection Act to Take Effect on March 15, 2024

Australia’s Plan to Regulate High-Risk AI

How Private AI can help comply with the EU AI Act

Comment la Loi 25 Impacte l'Utilisation de ChatGPT et de l'IA en Général

Endgültiger Entwurf des Gesetzes über Künstliche Intelligenz – Datenschutzpflichten der KI-Modelle mit Allgemeinem Verwendungszweck

How Law25 Impacts the Use of ChatGPT and AI in General

Is Salesforce Law25 Compliant?

Creating De-Identified Embeddings

Exciting Updates in 3.7

EU AI Act Final Draft – Obligations of General-Purpose AI Systems relating to Data Privacy

FTC Privacy Enforcement Actions Against AI Companies

The CCPA, CPRA, and California's Evolving Data Protection Landscape

HIPAA Compliance – Expert Determination Aided by Private AI

Private AI Software As a Service Agreement

EU's Review of Canada's Data Protection Adequacy: Implications for Ongoing Privacy Reform

Acceptable Use Policy

ISO/IEC 42001: A New Standard for Ethical and Responsible AI Management

Reviewing OpenAI's 31st Jan 2024 Privacy and Business Terms Updates

Comparing OpenAI vs. Azure OpenAI Services

Quebec’s Draft Regulation Respecting the Anonymization of Personal Information

Version 3.6 Release: Enhanced Streaming, Auto Model Selection, and More in Our Data Privacy Platform

Brazil's LGPD: Anonymization, Pseudonymization, and Access Requests

LGPD do Brasil: Anonimização, Pseudonimização e Solicitações de Acesso à Informação

Canada’s Principles for Responsible, Trustworthy and Privacy-Protective Generative AI Technologies and How to Comply Using Private AI

Private AI Named One of The Most Innovative RegTech Companies by RegTech100

Data Integrity, Data Security, and the New NIST Cybersecurity Framework

Safeguarding Privacy with Commercial LLMs

Cybersecurity in the Public Sector: Protecting Vital Services

Privacy Impact Assessment (PIA) Requirements under Law25

Elevate Your Experience with Version 3.5

Fine-Tuning LLMs with a Focus on Privacy

GDPR in Germany: Challenges of German Data Privacy (Part 2)

Comply with US Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence using Private AI

How to Comply with EU AI Act using PrivateGPT