Watch this video on YouTube
As a cloud security architect tasked with safeguarding data against unauthorized alterations, which security principle should be the primary focus to ensure that data remains unmodified and intact?