Implement cryptographic mechanisms to detect unauthorized changes to information.
No STIG checks reference this CCI.