Integrity is one of the three classic protection objectives in information security (alongside confidentiality and availability). It ensures that data is complete, correct, and protected against undetected modification. Integrity violations can result from technical errors, human mistakes, or deliberate manipulation. Protective measures include hash values, digital signatures, access controls, and versioning. In your ISMS, you assess for each asset how critical its integrity is. Financial data, configuration files, log data, and contracts are particularly sensitive — integrity violations here can have severe business and legal consequences.