PR.DS-01:

The confidentiality, integrity, and availability of data-at-rest are protected

Implementation Examples

Ex1:

Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources

Ex2:

Use full disk encryption to protect data stored on user endpoints

Ex3:

Confirm the integrity of software by validating signatures

Ex4:

Restrict the use of removable media to prevent data exfiltration

Ex5:

Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets