Data integrity schemes

Use data integrity schemes to protect data from unauthorized modifications, or from unintentional corruptions due to noise or storage defects (hashing, check values, digital signatures). SDLS provides integrity protection on the transmitted data, with the computation of a MAC. [1]

ID: M2019
Version: 1.3
Created: 29 September 2022
Last Modified: 21 April 2023

Techniques Addressed by Mitigation

Domain ID Name Use
T2014 Backdoor Installation
T2010 Modification of On Board Control Procedures modification
T1195 Supply Chain Compromise

References