These controls are only legitimate even though the data is at rest. at the time it’s accessed or moved, DLP protections for the other states of data will apply.
Encryption for data in transit: Data is vulnerable to https://saulqnse023147.qodsblog.com/30305096/5-essential-elements-for-encrypting-data-in-use