Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 416

File Integrity Monitoring (FIM)

What is File Integrity Monitoring (FIM)?

File Integrity Monitoring (FIM)A security control that detects unexpected changes to critical operating-system, application, and configuration files by comparing them to a known-good cryptographic baseline.


File Integrity Monitoring (FIM) maintains cryptographic hashes (SHA-256 or stronger) of sensitive files, registry keys, or configuration objects and alerts when their content or metadata changes outside of an approved change window. Classic implementations include Gene Kim's Tripwire (1992), AIDE, OSSEC, Wazuh, Samhain, and modern offerings in Trend Micro, Tenable, Qualys, Splunk and most EDR platforms. FIM is explicitly required by PCI DSS v4.0 requirement 11.5.2 (formerly 11.5), HIPAA, and SOX. Effective FIM defines a tight scope (system binaries, web roots, sudoers, /etc, registry hives, scheduled tasks), integrates with change management to suppress approved updates, and forwards events to a SIEM for correlation with EDR, identity logs, and threat intelligence.

Examples

  1. 01

    OSSEC alerting when /etc/sudoers is modified outside of an approved Ansible playbook run.

  2. 02

    Tripwire Enterprise integrated with the change-management ticket system to flag unmatched changes to the web-server document root.

Frequently asked questions

What is File Integrity Monitoring (FIM)?

A security control that detects unexpected changes to critical operating-system, application, and configuration files by comparing them to a known-good cryptographic baseline. It belongs to the Defense & Operations category of cybersecurity.

What does File Integrity Monitoring (FIM) mean?

A security control that detects unexpected changes to critical operating-system, application, and configuration files by comparing them to a known-good cryptographic baseline.

How does File Integrity Monitoring (FIM) work?

File Integrity Monitoring (FIM) maintains cryptographic hashes (SHA-256 or stronger) of sensitive files, registry keys, or configuration objects and alerts when their content or metadata changes outside of an approved change window. Classic implementations include Gene Kim's Tripwire (1992), AIDE, OSSEC, Wazuh, Samhain, and modern offerings in Trend Micro, Tenable, Qualys, Splunk and most EDR platforms. FIM is explicitly required by PCI DSS v4.0 requirement 11.5.2 (formerly 11.5), HIPAA, and SOX. Effective FIM defines a tight scope (system binaries, web roots, sudoers, /etc, registry hives, scheduled tasks), integrates with change management to suppress approved updates, and forwards events to a SIEM for correlation with EDR, identity logs, and threat intelligence.

How do you defend against File Integrity Monitoring (FIM)?

Defences for File Integrity Monitoring (FIM) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for File Integrity Monitoring (FIM)?

Common alternative names include: FIM, Change detection, Tripwire-style monitoring.

Related terms

See also