Regulatory frameworks in the field of information security in 2024, in addition to the already known properties of information such as confidentiality, integrity, and availability, particularly highlighted authenticity. In practice, we find that in some places there is a simplification and misunderstanding of the differences between integrity and authenticity. For this purpose, the following record was created. (Partially using ChatGPT.)
The concepts of authenticity and integrity refer to two different aspects of information and system security.
Authenticity

Authenticity refers to ensuring that the identities of entities (users, devices, or systems) and the origin of data or communications are reliably verified and not falsely represented. It means that organizations can trust that:
- The users or entities accessing the systems are who they claim to be.
- Documents, data, or communications are indeed from the rightful sender.
Examples in practice:
- Using two-factor authentication to verify users.
- Digital signatures that ensure a document or message is genuinely from the author.
Integrity

Integrity refers to protecting data and systems from unauthorized changes, including preventing and detecting data tampering or corruption. It ensures that:
- Data is accurate, complete, and has not been altered without authorization.
- Systems operate as intended without external influences or errors that could affect outcomes.
Examples in practice:
Using checksums (e.g., hash functions) to verify that data remains unchanged.
Log files that record all data changes and allow for review to detect potential manipulations.
Difference between authenticity and integrity
Authenticity focuses on reliable identification and verification of identity and source of information.
Integrity ensures that information or systems remain unchanged and protected from manipulations.
Both concepts are crucial for ensuring trust and security in digital ecosystems, especially in the context of the EU Digital Operational Resilience Act (DORA), which aims to increase the resilience of financial institutions to cyber and other operational threats.