If every other control fails — firewall bypassed, credentials compromised, data reached — encryption ensures the attacker gets ciphertext, not customer records.
| State | Standard | Implementation |
|---|---|---|
| In transit | TLS 1.3 | All external connections. Internal: mTLS between services in zero trust. |
| At rest | AES-256 | Full-disk on all devices. Database-level for sensitive fields. Cloud storage default-on. |
| In processing | Emerging | Confidential computing: hardware enclaves. AWS Nitro, Azure Confidential, GCP Confidential VMs. |
Most organizations have in-transit covered. At-rest is inconsistent. In-processing is nascent.
AES-256 is unbreakable with current technology. But if the key is in a config file next to the data, the encryption is meaningless.
Five principles: separate, rotate, audit, hierarchy, incident plan.
Encrypt in transit (TLS 1.3), at rest (AES-256), and start planning for in-processing (confidential computing).