<?xml version="1.0" encoding="utf-8" standalone="yes"?><feed xmlns="http://www.w3.org/2005/Atom"><title>Integrity on Sinetris's viewpoints</title><id>https://sinetris.info/tags/integrity/</id><link href="https://sinetris.info/tags/integrity/index.atom.xml" rel="self" type="application/atom+xml" hreflang="en" title="Integrity on Sinetris's viewpoints"/><link href="https://sinetris.info/tags/integrity/" rel="alternate" type="text/html" hreflang="en" title="Integrity on Sinetris's viewpoints"/><link href="https://sinetris.info/tags/integrity/index.atom.xml" rel="alternate" type="application/atom+xml" hreflang="en" title="Integrity on Sinetris's viewpoints"/><link href="https://sinetris.info/tags/integrity/index.rss.xml" rel="alternate" type="application/rss+xml" hreflang="en" title="Integrity on Sinetris's viewpoints"/><subtitle>Recent content in Integrity on Sinetris's viewpoints</subtitle><generator uri="https://github.com/sinetris/sine-die/">Sine Die theme for Hugo</generator><author><name>Duilio Ruggiero</name><email>duilio@sinetris.info</email></author><rights type="html">&amp;copy; 2023 - 2026, Duilio Ruggiero</rights><updated>2025-03-17T10:43:09Z</updated><entry><title>Information Assurance</title><link href="https://sinetris.info/glossary/information-assurance/" rel="alternate" type="text/html" hreflang="en" title="Integrity on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-assurance/" type="text/html"/><published>2025-03-17T10:43:09+00:00</published><updated>2025-03-17T10:43:09Z</updated><id>https://sinetris.info/glossary/information-assurance/#atom</id><summary type="html">&lt;p&gt;Information Assurance (IA) is the practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.&lt;/p&gt;
&lt;p&gt;The 5 pillars of information assurance includes protection of the &lt;strong&gt;Confidentiality&lt;/strong&gt;, &lt;strong&gt;Integrity&lt;/strong&gt;, &lt;strong&gt;Availability&lt;/strong&gt;, &lt;strong&gt;Authenticity&lt;/strong&gt;, and &lt;strong&gt;Non-repudiation&lt;/strong&gt; of information.&lt;/p&gt;
&lt;p&gt;In IT systems, when possible, assets should be tagged/labeled with proper Information Assurance level.&lt;/p&gt;
&lt;h2 id="confidentiality"&gt;Confidentiality&lt;/h2&gt;
&lt;p&gt;The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/tags/compliance" label="tag: Compliance"/><category term="/tags/confidentiality" label="tag: Confidentiality"/><category term="/tags/integrity" label="tag: Integrity"/><category term="/tags/availability" label="tag: Availability"/><category term="/tags/authenticity" label="tag: Authenticity"/><category term="/tags/non-repudiation" label="tag: Non-Repudiation"/></entry></feed>