Encrypt Sensitive Data at Rest
Description
Encrypt sensitive data at rest on servers, applications, and databases containing sensitive data. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encryption methods may include application-layer encryption, also known as client-side encryption, where access to the data storage device(s) does not permit access to the plain-text data.
Implementation Checklist
Tool Recommendations
Data governance and compliance platform with DLP, information protection, sensitivity labels, and insider risk management
Microsoft · Per-user subscription (E5/standalone)
Cloud-native DLP and CASB platform providing inline data protection for SaaS, IaaS, web, and endpoint
Netskope · Per-user subscription
Enterprise data loss prevention covering endpoint, network, storage, and cloud channels with policy-based content inspection
Broadcom · Enterprise license
Threats & Vulnerabilities (CIS RAM)
Threat Scenarios
Database Breach Exposing Plaintext Records
ConfidentialityAttackers exploiting SQL injection or compromised database credentials access sensitive data stored in plaintext, immediately exfiltrating usable PII, PHI, or financial records.
Backup Media Theft with Unencrypted Data
ConfidentialityServer backups containing unencrypted sensitive data are stolen or improperly disposed of, providing attackers with complete access to historical sensitive records.
Vulnerabilities (When Safeguard Absent)
Sensitive Data Stored in Plaintext on Servers and Databases
Without at-rest encryption, compromising a server, database, or storage system grants direct access to all sensitive data without any additional barriers.
No Application-Layer Encryption for High-Value Data
Relying only on storage-layer encryption means that anyone with legitimate storage access (administrators, compromised service accounts) can read sensitive data.
Evidence Requirements
| Type | Evidence Item | Collection Frequency |
|---|---|---|
| Technical | Configuration screenshots or exports showing protection controls enabled | Captured quarterly |
| Document | Procedure documentation for protection measures | Reviewed annually |
| Technical | Encryption configuration evidence (disk encryption status, TLS settings) | Scanned monthly |
| Document | Key management procedures and key rotation records | Reviewed annually |
| Document | Governing policy document (current, approved, communicated) | Reviewed annually |