Encryption transforms data into a locked format that cannot be read without a key.
You can encrypt stored data, data en route for communications and devices that may be used for storage. To unlock encrypted data, you need a key. Encryption is the best defense against unwanted use of data, before and/or after it is stolen.
Best Practices:
- Encrypt all data as required by organizational policies.
- Protect your encryption keys and never share them.
- Use only organizationally approved and provided encryption tools and devices.
- Encrypt the device that is used to store your encryption key.