

The files only become available to the operating system and applications in readable form while the system is running and unlocked by a trusted user (data in use or in transit).

Examples for block devices are hard drives, flash drives and DVDs.ĭata-at-rest encryption should only be viewed as an adjunct to the existing security mechanisms of the operating system - focused on securing physical access, while relying on other parts of the system to provide things like network security and user-based access control.ĭata-at-rest encryption ensures that files are always stored on disk in an encrypted form. This article discusses data-at-rest encryption software, which on-the-fly encrypts / decrypts data written to / read from a block device, disk partition or directory.
