Zum Hauptinhalt springen
Elementary Threat · BSI IT-Grundschutz

G 0.46 — Loss of Integrity of Sensitive Information

Updated on 5 min Reviewed by: Cenedril Editorial
A.5.5A.5.11A.5.14A.5.15A.5.24A.5.25A.5.26A.5.27A.5.28A.5.29A.5.34A.5.35A.5.36A.6.2A.6.6A.6.7A.6.8A.7.7A.7.9A.7.10A.8.1A.8.3A.8.4A.8.5A.8.7A.8.13A.8.15A.8.16A.8.17A.8.19A.8.20A.8.21A.8.22A.8.23A.8.24A.8.25A.8.26A.8.27A.8.28A.8.29A.8.31A.8.32A.8.34 BSI IT-GrundschutzISO 27001ISO 27002

In the finance department, an employee accidentally changes the account number in a bulk transfer — a typo, two digits swapped. The software accepts the input without warning. Over three months, monthly payments of 28,000 euros each flow to the wrong recipient. The mistake is only discovered at the quarterly reconciliation.

Loss of integrity ranks among the most insidious threats because the data is still present and appears unremarkable at first glance. The BSI lists the threat as elementary threat G 0.46. Unlike data loss (G 0.45), where the data is missing, loss of integrity delivers wrong data — and wrong data can cause greater damage than missing data.

What’s behind it?

The integrity of information can be impaired in many ways. The causes range from unintended input errors through technical defects to targeted manipulation by attackers.

Causes

Attackers modify data to gain advantages or to harm the organisation. Targeted data manipulation is often harder to detect than data theft, because no data flows out and the alteration can be subtle: a modified IBAN in a payment instruction, a changed value in an inventory database, a manipulated index database in an electronic archive.

Typing errors, mix-ups and operating errors in applications are everyday occurrences. Without plausibility checks, input validation and four-eyes review, such errors can go unnoticed for months and cascade: wrong base data leads to wrong calculations, which in turn drive wrong decisions.

  • Transmission errors — bits can flip during data transfer over networks. TCP corrects most errors, but with UDP-based communication or faulty hardware, data can arrive altered unnoticed.
  • Media ageing — magnetic and optical media lose readability over the years. Individual sectors become faulty (bit rot) without the file system giving an immediate warning.
  • Software bugs — bugs in databases, file systems or applications can corrupt data during write operations, especially with concurrent access or system crashes.

Impact

A single altered bit can render entire datasets unusable. For encrypted datasets, a minimal change causes decryption to fail. Cryptographic keys become useless after a single bit flip — and with them all data secured by that key. Electronic archives lose their evidentiary value when the integrity of stored documents cannot be proven.

Practical examples

Manipulated archive database. An electronic archive stores audit-proof documents for accounting. An attacker with database access manipulates the index table and assigns forged invoices to genuine case numbers. During a tax audit, the forged documents are accepted as authentic — until an attentive auditor verifies the checksums manually.

Input error in warehouse management. During a manual inventory correction, an employee misses a decimal place: instead of 50 units, the stock is corrected to 500. The ERP system then automatically cancels a pending reorder. Only two weeks later, when the physical stock is exhausted, is the error discovered — the production line stands still.

Bit flip in an encrypted backup file. A sector error on the backup disk changes one byte in an encrypted backup archive. The error goes undetected because no regular integrity checks take place. When the archive is needed months later for recovery, decryption fails. The backup is worthless.

Relevant controls

The following ISO 27001 controls mitigate this threat. (You’ll find the complete list of 43 mapped controls below in the section “ISO 27001 Controls Covering This Threat”.)

Prevention:

Detection:

Response:

BSI IT-Grundschutz

The BSI IT-Grundschutz catalogue links G 0.46 with the following modules:

  • CON.1 (Cryptography concept) — cryptographic methods for integrity protection (hash values, digital signatures).
  • OPS.1.2.6 (NTP time synchronisation) — precise timestamps for integrity checks and audit trails.
  • DER.3.1 (Audits and reviews) — regular verification of data integrity as part of internal audits.
  • APP.4.2 (SAP ERP system) — specific integrity requirements for standard business software.

Sources

ISO 27001 Controls Covering This Threat

A.5.5 Contact with authorities A.5.11 Return of assets A.5.14 Information transfer A.5.15 Access control A.5.24 Information security incident management planning and preparation A.5.25 Assessment and decision on information security events A.5.26 Response to information security incidents A.5.27 Learning from information security incidents A.5.28 Collection of evidence A.5.29 Information security during disruption A.5.34 Privacy and protection of PII A.5.35 Independent review of information security A.5.36 Compliance with policies, rules and standards for information security A.6.2 Terms and conditions of employment A.6.6 Confidentiality or non-disclosure agreements A.6.7 Remote working A.6.8 Information security event reporting A.7.7 Clear desk and clear screen A.7.9 Security of assets off-premises A.7.10 Storage media A.8.1 User endpoint devices A.8.3 Information access restriction A.8.4 Access to source code A.8.5 Secure authentication A.8.7 Protection against malware A.8.13 Information backup A.8.15 Logging A.8.16 Monitoring activities A.8.17 Clock synchronisation A.8.19 Installation of software on operational systems A.8.20 Networks security A.8.21 Security of network services A.8.22 Segregation of networks A.8.23 Web filtering A.8.24 Use of cryptography A.8.25 Secure development life cycle A.8.26 Application security requirements A.8.27 Secure system architecture and engineering principles A.8.28 Secure coding A.8.29 Security testing in development and acceptance A.8.31 Separation of development, test and production environments A.8.32 Change management A.8.34 Protection of information systems during audit testing

Frequently asked questions

What exactly does loss of integrity mean?

Loss of integrity occurs when information is altered, falsified or damaged unnoticed -- whether deliberately by an attacker or accidentally through input errors, software bugs or transmission faults. The data still exists, but its content is incorrect or incomplete.

How do I recognise that data has lost its integrity?

Cryptographic hash values (checksums), digital signatures and version-control systems make changes visible. Regular plausibility checks, four-eyes review for data entry and automated integrity checks (e.g. Tripwire on servers) complete the detection toolkit.

Can a single bit make the loss of integrity critical?

Yes. For encrypted or compressed data, changing a single bit is enough to render the entire dataset unusable -- because decryption or decompression fails. The same applies to cryptographic keys: a modified bit makes the key unusable.