Good engineering practices with regards to the integrity mechanisms of COTS, GOTS and custom developed solutions are implemented for incoming and outgoing files, such as parity checks and cyclic redundancy checks (CRCs).
MAC / CONF | Impact | Subject Area |
---|---|---|
MACIII | Medium | Enclave Computing Environment |
Threat |
---|
Integrity of transmitted information is at risk if good engineering practices are not implemented. Â Error detection methods like parity checks, checksums, and CRCs mitigate the integrity risk of incoming and outgoing files during transmission. |
Guidance |
---|
1. COTS, GOTS, and custom developed solutions shall implement some form of error detection to enhance data integrity during transmission. 2. Schematics, diagrams, or some other form of documentation shall show system data flows, the communication mediums, and the associated protection mechanisms. 3. Integrity checkers such as Tripwire can be utilized to detect suspicious activity by searching a program or file to determine if it has been altered or changed. Integrity checkers are usually checksum based with cryptographic checksums providing the highest level of security. |