naydir You've asked about the integrity of the OS. IIUC GOS attestation is indeed the answer.
However, I wonder if a clever adversary could infect a commonly-available application (or install a new, hidden one) without your notice. Seems you'd need to maintain and monitor the hashes of your applications - as well as the hashes of the OS (through attestation).