Data Integrity

Current Status

This project is currently seeking technology vendors to participate in the development of an example solution. Please see our Federal Register notice for more information.

Download the "Data Integrity: Recovering from a Destructive Malware Attack" Project Description (PDF) for more detailed information or the two-page fact sheet for a quick synopsis. 

If you have additional comments, questions, or would like to join the Community of Interest helping to guide this project, please email us at


Constant threats of destructive malware, ransomware, malicious insider activity, and even honest mistakes create the imperative for organizations to be able to quickly recover from an event that alters or destroys data.  Businesses must be confident that recovered data is accurate and safe. The National Cybersecurity Center of Excellence (NCCoE)—in collaboration with members of the business community and vendors of cybersecurity solutions—is creating an example solution to address these complex data integrity challenges.

Multiple systems need to work together to prevent, detect, notify, and recover from events that corrupt data. This project will explore methods to effectively recover operating systems, databases, user files, applications, and software/system configurations. It will also explore issues of auditing and reporting (user activity monitoring, file system monitoring, database monitoring, scanning backups/snapshots for malware, and rapid recovery solutions) to support recovery and investigations. To address real-world business challenges around data integrity, the resulting example solution will be composed of open-source and commercially available components.  

The goal of this building block effort is to help organizations confidently identify: 

  • Altered data, as well as the date and time of alteration
  • The identity/identities of those who alter data
  • Other events that coincide with data alteration
  • Any impact of the data alteration
  • The correct backup version (free of malicious code and corrupted data) for data restoral

Read our two-page fact sheet, or download the "Data Integrity: Recovering from a Destructive Malware Attack" Project Description (PDF) for more detail. This project will result in a NIST Cybersecurity Practice Guide—a publicly available description of the practical steps needed to implement a cybersecurity reference design.

Collaborating Vendors

GreenTec USA logo
Hewlett Packard Enterprise logo
IBM logo
Tripwire logo
Veeam logo

The NCCoE implemented this project with technology vendor collaborators and/or its National Cybersecurity Excellence Partnership (NCEP) partners. They contributed hardware, software, and expertise on this project.


Disclaimer: Certain commercial entities, equipment, products, or materials may be identified in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose.