According to NIST, what goal are you supporting when you hash both evidence data and backup of the data and compare the hashes?
Hashing is used to prove integrity or prove that the data has not changed since the original hash values were generated. Confidentiality is proved by applying access controls or encryption. The goal is to prevent unauthorized viewing of data.
Availability is provided by redundancy. The goal is to maintain access to the data at all times.
Authentication is provided by assessing credentials. The goal is to only allow credentialed entities to log in.