Data Integrity

Related to Tampering in the STRIDE model for performing threat-modeling analyses:

  • Do you ensure that all data is collected before using it?

  • Do you have a way to determine if the data is valid or out of date?

  • Are protections in place to prevent tampering?

  • Do you have a data retention/deletion policy in place for each data store?

Get Privacy What Developers and IT Professionals Should Know now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.