There are three data states of data:
- Data at rest
- Data in motion
- Data in use
Data at rest:
- Data stored in databases, file systems, or storage systems, not actively moving
- Encryption methods:
- Full Disk Encryption (FDE)
- Partition Encryption
- File Encryption
- Volume Encryption
- Database Encryption
- Record Encryption
Data in Transit (Data in Motion)
- Data actively moving from one location to another, vulnerable to interception
- Transport Encryption Methods:
- SSL (Secure Sockets Layer) and TLS (Transport Layer Security)
- VPN (Virtual Private Network)
- IPSec (Internet Protocol Security)
Data in Use
- Data actively being created, retrieved, updated, or deleted
- Protection measures:
- Encryption at the Application Level
- Access Controls
- Secure Enclaves
- Mechanisms like INTEL Software Guard